{"id":31647,"date":"2017-03-09T21:46:04","date_gmt":"2017-03-10T02:46:04","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/julian-assange-says-wikileaks-will-share-cia-code-with-tech-companies-npr.php"},"modified":"2017-03-09T21:46:04","modified_gmt":"2017-03-10T02:46:04","slug":"julian-assange-says-wikileaks-will-share-cia-code-with-tech-companies-npr","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/julian-assange-2\/julian-assange-says-wikileaks-will-share-cia-code-with-tech-companies-npr.php","title":{"rendered":"Julian Assange Says WikiLeaks Will Share CIA Code With Tech Companies &#8211; NPR"},"content":{"rendered":"<p><p>            WikiLeaks founder Julian Assange stands on the balcony            of the Ecuadorean Embassy in London. Frank Augstein\/AP            hide caption          <\/p>\n<p>          WikiLeaks founder Julian Assange stands on the balcony of          the Ecuadorean Embassy in London.        <\/p>\n<p>    Updated at 2:10 p.m. ET  <\/p>\n<p>    WikiLeaks will be sharing alleged CIA hacking techniques with    major technology companies such as Apple and Google to allow    them to develop fixes for vulnerabilities in their phones and    other electronic devices, according to Julian Assange.  <\/p>\n<p>    In a lengthy address from Ecuador's Embassy in London, where he    remains holed up since 2012, the WikiLeaks founder said the    group would work with manufacturers to \"disarm\" purported CIA    hacking tools. When the fixes are in place, he said, WikiLeaks    would publish the code for those tools online.  <\/p>\n<p>    On Tuesday, the group published what it calls a trove of    internal CIA documents describing agency techniques and    programs for hacking into phones, computers and    Internet-connected appliances. Many of the techniques take    advantage of flaws in software that make programs or devices    vulnerable.  <\/p>\n<p>    The document dump did not include the code itself. Instead, it    consisted of user guides, troubleshooting manuals, program    specifications and developer chatter.  <\/p>\n<p>    WikiLeaks said Tuesday it was \"avoiding the distribution of    'armed' cyberweapons\" until there was a \"consensus\" on how to    disable the tools. On Wednesday, the group suggested    on Twitter that it might work with major tech companies to    fix the vulnerabilities that allow the tools to work.  <\/p>\n<p>    On Thursday, Assange confirmed that would be the group's    strategy.  <\/p>\n<p>    \"We have decided to work with [manufacturers] to give them    exclusive access to the additional technological details we    have so that fixes can be developed and pushed out,\" Assange    said. \"Once this material is effectively disarmed by us we will    publish additional details.\"  <\/p>\n<p>    He did not give a timeline for that publication.  <\/p>\n<p>    It was not immediately clear how the tech companies would    respond to the WikiLeaks offer. Apple, for example, said    Tuesday that it had already patched many of the problems cited    in the WikiLeaks document dump, which allegedly covers the    period of 2013 to 2016.  <\/p>\n<p>    The CIA hasn't confirmed the authenticity of the documents    released in the dump, but has criticized WikiLeaks for what it    says is an attempt to undermine the agency's operations.  <\/p>\n<p>    Immediately after Assange spoke on Thursday, CIA spokeswoman    Heather Fritz Horniak responded by saying that the \"CIA    continues to aggressively collect foreign intelligence overseas    to protect America from terrorists, hostile nation states and    other adversaries.\"  <\/p>\n<p>    She added: \"As we've said previously, Julian Assange is not    exactly a bastion of truth and integrity.\"  <\/p>\n<p>    In the news conference, which was livestreamed online, Assange    repeated WikiLeaks' assertion that the CIA has lost control of    its vast collection or hacking techniques.  <\/p>\n<p>    \"This is an historic act of devastating incompetence to have    created such an arsenal and stored it all in one place and not    secured it,\" he said.  <\/p>\n<p>    Assange appeared in a dark suit and red tie, occasionally    shuffling papers as he spoke. Over his shoulder, the WikiLeaks    icon was present.  <\/p>\n<p>    He also suggested it was possible the CIA was using some of the    tools against Americans, which is prohibited by law. He said    WikiLeaks is investigating IP addresses associated with U.S.    computers, to determine if they are \"attack systems\" controlled    by the CIA or \"victims\" targeted by the CIA.  <\/p>\n<p>    WikiLeaks has not released those IP addresses. On Wednesday,    the CIA denied that it targets Americans through electronic    surveillance, saying the agency \"is legally prohibited\" from    targeting Americans and that it \"does not do so.\"  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Visit link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.npr.org\/sections\/thetwo-way\/2017\/03\/09\/519441618\/julian-assange-says-wikileaks-will-share-cia-code-with-tech-companies\" title=\"Julian Assange Says WikiLeaks Will Share CIA Code With Tech Companies - NPR\">Julian Assange Says WikiLeaks Will Share CIA Code With Tech Companies - NPR<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> WikiLeaks founder Julian Assange stands on the balcony of the Ecuadorean Embassy in London. Frank Augstein\/AP hide caption WikiLeaks founder Julian Assange stands on the balcony of the Ecuadorean Embassy in London. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1599],"tags":[],"class_list":["post-31647","post","type-post","status-publish","format-standard","hentry","category-julian-assange-2"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31647"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=31647"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31647\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=31647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=31647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=31647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}