OF THE
TIMES
"The technology built into today's iPhone represents the best data security available to consumers, and we're constantly working to keep it that way," it said.Samsung:
"Our products and software are designed to quickly get security updates into the hands of our customers, with nearly 80% of users running the latest version of our operating system.
"While our initial analysis indicates that many of the issues leaked today were already patched in the latest iOS, we will continue work to rapidly address any identified vulnerabilities.
"We always urge customers to download the latest iOS to make sure they have the most recent security update."
"Protecting consumers' privacy and the security of our devices is a top priority at Samsung," it said.Microsoft:
"We are aware of the report in question and are urgently looking into the matter."
"We are aware of the report and are looking into it," a spokesman from Microsoft said.Google declined to comment.
"We will initiate an investigation if we see evidence of concrete criminal acts or specific perpetrators. We're looking at it very carefully," a spokesman for the federal prosecutor's office said, Reuters reported Wednesday.Update: Anonymous "US intelligence and law enforcement officials" have allegedly told Reuters that the CIA was aware of the impending leak since the end of last year, and their investigation is focusing on contractors as the source of the leak:
A German Foreign Ministry spokesman told Reuters that the authenticity of the documents was still to be verified and that Berlin would be in touch with Washington.
The unnamed officials also confirmed that an internal investigation by the agency into the source of the leak is focused primarily on contractors, who the agency believe passed the documents to WikiLeaks.Update (March 9): More recent coverage:
They also stated their belief that the 8,761 documents contained within the current "Year Zero" leak, the first of the "Vault 7" series, appear to be authentic.
...
WikiLeaks says that the classified information contained in the leaked documents was "lost" by the CIA and subsequently "circulated among former US government hackers and contractors in an unauthorized manner."
One of those individuals is then said to have provided the whistleblowing website with the relevant content.
U.S. cyber security expert Robert Graham said WikiLeaks provided enough detail to recognize some known vulnerabilities.Dennis Kucinich writes for Fox News that Vault 7 is proof that the U.S. is "sliding down the slippery slope toward totalitarianism". (Anti-Trumpers, please note that these leaks cover CIA activity during the Obama administration.)
"One anti-virus researcher has told me that a virus they once suspected came from the Russians or Chinese can now be attributed to the CIA, as it matches the description perfectly to something in the leak," Graham said in a blog post.
CNN asked whether it was legal for the CIA to do this, per US law, provided the hacking techniques are used overseas. In response, Assange referenced the CIA's history of "behaving badly" inside the US as well.Assange also addressed the need for a "Digital Geneva Convention", hinting at WikiLeaks cooperation with the tech community toward that end. Some more highlights:
"It is an unusual time in the United States to see an intelligence agency so heavily involved in domestic politics," Assange said, when asked if the CIA was experiencing turmoil within its ranks.
When questioned about redactions, Assange said 78,000 pieces of information were withheld, consisting of IP addresses of both target and attack machines. The IPs will be investigated and identified before the redaction is removed.
Assange said further material to be released would be recent but would not identify a time from which it came. He said WikiLeaks have more material on the "throwing off" mechanism used by the hacks to cover their traces. Tuesday's leak revealed details of the CIA's ability to hide its own hacking fingerprint and attribute it to others.
...
Assange said 'Vault 7' contained too much work for WikiLeaks to do on its own. He said the latest leak has a number of exploits of code that it needs to disarm before it can be published, rendering it useless to "cyber mafia." He did not give details on when it would be published.
...
When asked by ABC if he had ever been paid by either the Russian government or RT he answered "No, but quite interesting to see ABC taking that line." Criticising mainstream media, Assange described it as a "pretty sad question" which tried to divert from the publication of the CIA's documents.
Lt. Col. Tony Shaffer: "ATP2829, the so-called Russian tool that we used to hack the DNC. Sean, we did it. Not me, our guys. Former members of NSA, retired intelligence officers use these tools to break in there and get the information out. That's what the Democrats don't want to talk about, because it doesn't fit their narrative."
Sean Hannity: "You know that for a fact. You know the Democrats did it, or that former operatives did it using the malware techniques, they put the Russians' fingerprints and they can appear that the Russians...you're telling me...The whole Russian story that the media has been running with for month and months and months, that it was our people that did it, and they just put the fingerprints of the Russians."
Lt. Col. Tony Shaffer: "That's right. I don't have proof, but this is what I have heard."
"The evidence is not that the Russians did it, but that it was a Russian tool."
Kommentar: Oversat af Sott.net fra Thierry Meyssan interview on his new book: 'Right Under Our Eyes: From September 11 to Donald Trump' med anvendelse af den franske original.
Se også Thierry Meyssan: Revelations - Lafarge-Holcim's jihad against the Syrian government
Bogen Sous nos yeux: Du 11 septembre à Donald Trump lader til være billigst fra Amazon Tyskland