{"id":31625,"date":"2017-03-09T21:41:07","date_gmt":"2017-03-10T02:41:07","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/has-the-cia-killed-encryption-for-mobile-connected-devices-mediapost-communications.php"},"modified":"2017-03-09T21:41:07","modified_gmt":"2017-03-10T02:41:07","slug":"has-the-cia-killed-encryption-for-mobile-connected-devices-mediapost-communications","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/has-the-cia-killed-encryption-for-mobile-connected-devices-mediapost-communications.php","title":{"rendered":"Has The CIA Killed Encryption For Mobile, Connected Devices? &#8211; MediaPost Communications"},"content":{"rendered":"<p><p>    WikiLeaks dumped another batch of classified documents on    Tuesday depicting the CIAs methods for bypassing encrypted    mobile devices and applications.  <\/p>\n<p>    Dubbed #Vault7, Tuesdays leak of thousands of Web pages    describes the types of technology the Central Intelligence    Agency (CIA) uses to hack targeted citizens and foreign    governments. WikiLeaks claims this is the first part of a    series of leaks it has titled Year Zero, allegedly taken from    the CIAs Center for Cyber Intelligence unit in Langley,    Virginia.  <\/p>\n<p>    In what may be the largest CIA breach in history, the Vault7    files describe the software tools the agency uses to break into    computers and devices connected to the Internet, including    televisions.  <\/p>\n<p>    The leaked documents also reveal that the CIA has developed    sophisticated technology for hacking Apple and Android mobile    devices, collecting audio and messaging data and bypassing    encryption on mobile applications like Signal and Whatsapp.  <\/p>\n<p>      advertisement    <\/p>\n<p>      advertisement    <\/p>\n<p>    ProtonMail, an end-to-end encrypted email service, has    confirmed that none of the Vault7 documents indicate the    company's encryption has been compromised.  <\/p>\n<p>    We can state unequivocally that there is nothing in the leaked    CIA files which indicates any sort of crack of ProtonMails    encryption, states Andy Yen, co-founder of ProtonMail, in a    blog post.And    despite claims to the contrary, there is also no evidence that    Signal\/Whatsapp end-to-end encryption has been breached.  <\/p>\n<p>    Founded in 2013 after Edward Snowdens NSA revelations,    ProtonMail has since become a popular and secure email service    for journalists, activists, dissidents and privacy fans.   <\/p>\n<p>    Over the past three years, the CIA has put together a    formidable arsenal of cyberweapons specially designed to gain    surveillance capabilities over end-user devices such as mobile    phones and laptop\/desktop computers, writes Yen. These    advanced malwares enable the CIA to record actions such as    keystrokes on a mobile device, allowing them to conduct    surveillance without breaking encryption. Through this    technique, US intelligence agencies can gain access to    databeforethey have been encrypted.  <\/p>\n<p>    The core cryptography underlying encrypted services like    ProtonMail or WhatsApp have not been compromised by    intelligence agencies, but the CIA has seemingly disrupted the    security of end-user devices.  <\/p>\n<p>    The use ofend-to-end encryption means services such as    ProtonMail are not actually able to decrypt user data, writes    Yen. Even if we wanted to compromise user data, we do not have    the technical means to decrypt the user    emails.Furthermore, even if an attacker breached    ProtonMail servers, all the emails stored on our servers are    encrypted, so an attacker also would not be able to read user    emails.  <\/p>\n<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.mediapost.com\/publications\/article\/296735\/has-the-cia-killed-encryption-for-mobile-connecte.html\" title=\"Has The CIA Killed Encryption For Mobile, Connected Devices? - MediaPost Communications\">Has The CIA Killed Encryption For Mobile, Connected Devices? - MediaPost Communications<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> WikiLeaks dumped another batch of classified documents on Tuesday depicting the CIAs methods for bypassing encrypted mobile devices and applications. Dubbed #Vault7, Tuesdays leak of thousands of Web pages describes the types of technology the Central Intelligence Agency (CIA) uses to hack targeted citizens and foreign governments. WikiLeaks claims this is the first part of a series of leaks it has titled Year Zero, allegedly taken from the CIAs Center for Cyber Intelligence unit in Langley, Virginia<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-31625","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31625"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=31625"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31625\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=31625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=31625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=31625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}