Do you use encryption to protect you stuff? Well the CIA can still see all of it. They are not impressed with your LAME encryption methods.
the C.I.A. and allied intelligence services had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp and Telegram.
According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”
the source, in a statement, set out policy questions that “urgently need to be debated in public, including whether the C.I.A.’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency.”
(there is no oversight of the CIA. They do whatever they want, to whoever they want, whenever they want. There is nothing anyone can do about it. There was one president who tried to do something about it but he ended up dead.)
The source, the group said, “wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.”
(4 years after Snowden nothing has changed.)
code-named Weeping Angel, uses Samsung “smart” televisions as covert listening devices. According to the WikiLeaks news release, even when it appears to be turned off, the television “operates as a bug, recording conversations in the room and sending them over the internet to a covert C.I.A. server.”
In early 2015, Samsung appeared to acknowledge the televisions posed a risk to privacy. The fine print terms of service included with its smart TVs said that the television sets could capture background conversations, and that they could be passed on to third parties.
The company also provided a remarkably blunt warning: “Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition.”
(Every electronic devise in your home (that has a microphone) could be listening to you. 24 hours a day 7 days a week.....it is just you....your electronics....and the CIA)
large number of techniques allows the C.I.A. to mask the origin of some of its cyberattacks and confuse forensic investigators.