Bitcoin Forum
May 03, 2024, 03:21:37 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: [2017-03-24] Vault 7 Volume II: Apple Patch Claims “Duplicitous,” Says WikiLeaks  (Read 337 times)
bitlamp (OP)
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile
March 24, 2017, 11:48:29 AM
 #1

https://cointelegraph.com/images/725_Ly9jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy8yZTc2NWEzZDc3NTlmOTBhZmViYmFlZmI5YWNkMDkzYi5qcGc=.jpg

A day after WikiLeaks released the second volume of its Vault 7 data, the organization described Apple as “duplicitous” for saying it had fixed security flaws.

Information unveiled on Thursday, titled Dark Matter by WikiLeaks, focuses on CIA spying methods directly affecting Apple.

Responding to the latest claims, the company stated it had “fixed” the security weak links concerned, something WikiLeaks refuted.

“Apple's claim that it has "fixed" all "vulnerabilities" described in DARKMATTER is duplicitous. EFI is a systemic problem, not a zero-day,” it wrote on Twitter.

Echoing the lack of trust in Apple was entrepreneur Kim Dotcom, who has been vocal on Vault 7 since the publication of the first vat of evidence earlier this month.

Dark Matter details how Apple consumer devices contain “back doors” which allow them to be monitored, while the company’s “entire supply chain” could be subject to interference from the CIA.

“While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization's supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise,” WikiLeaks summarizes.

https://cointelegraph.com/news/vault-7-volume-ii-apple-patch-claims-duplicitous-says-wikileaks
1714749697
Hero Member
*
Offline Offline

Posts: 1714749697

View Profile Personal Message (Offline)

Ignore
1714749697
Reply with quote  #2

1714749697
Report to moderator
1714749697
Hero Member
*
Offline Offline

Posts: 1714749697

View Profile Personal Message (Offline)

Ignore
1714749697
Reply with quote  #2

1714749697
Report to moderator
1714749697
Hero Member
*
Offline Offline

Posts: 1714749697

View Profile Personal Message (Offline)

Ignore
1714749697
Reply with quote  #2

1714749697
Report to moderator
"You Asked For Change, We Gave You Coins" -- casascius
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714749697
Hero Member
*
Offline Offline

Posts: 1714749697

View Profile Personal Message (Offline)

Ignore
1714749697
Reply with quote  #2

1714749697
Report to moderator
1714749697
Hero Member
*
Offline Offline

Posts: 1714749697

View Profile Personal Message (Offline)

Ignore
1714749697
Reply with quote  #2

1714749697
Report to moderator
veleten
Legendary
*
Offline Offline

Activity: 2016
Merit: 1106



View Profile
March 26, 2017, 12:57:04 PM
 #2

makes me laugh ... "patch" as if this is done without their knowledge or cooperation
what Wikileaks doesn't post is that this would never be possible without insiders in the company or direct cooperation by Apple with the agencies
basically,any electronic device can spy on you nowadays,but it is easier with the smartphones because they are usually
in your pocket or nearby,it is easy to track through the cell network,easy to install spy malware etc.
ironicly,nobody gives a damn,Iphones will keep number one spot,people will continue buying them and life will go on
carry on "free" people

          ▄▄████▄▄
      ▄▄███▀    ▀███▄▄
   ▄████████▄▄▄▄████████▄
  ▀██████████████████████▀
▐█▄▄ ▀▀████▀    ▀████▀▀ ▄▄██
▐█████▄▄ ▀██▄▄▄▄██▀ ▄▄██▀  █
▐██ ▀████▄▄ ▀██▀ ▄▄████  ▄██
▐██  ███████▄  ▄████████████
▐██  █▌▐█ ▀██  ██████▀  ████
▐██  █▌▐█  ██  █████  ▄█████
 ███▄ ▌▐█  ██  ████████████▀
  ▀▀████▄ ▄██  ██▀  ████▀▀
      ▀▀█████  █  ▄██▀▀
         ▀▀██  ██▀▀
.WINDICE.████
██
██
██
██
██
██
██
██
██
██
██
██
████
      ▄████████▀
     ▄████████
    ▄███████▀
   ▄███████▀
  ▄█████████████
 ▄████████████▀
▄███████████▀
     █████▀
    ████▀
   ████
  ███▀
 ██▀
█▀

██
██
██
██
██
██
██
██
██
██
██
██
     ▄▄█████▄   ▄▄▄▄
    ██████████▄███████▄
  ▄████████████████████▌
 ████████████████████████
▐████████████████████████▌
 ▀██████████████████████▀
     ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
     ▄█     ▄█     ▄█
   ▄██▌   ▄██▌   ▄██▌
   ▀▀▀    ▀▀▀    ▀▀▀
       ▄█     ▄█
     ▄██▌   ▄██▌
     ▀▀▀    ▀▀▀

██
██
██
██
██
██
██
██
██
██
██
██
                   ▄█▄
                 ▄█████▄
                █████████▄
       ▄       ██ ████████▌
     ▄███▄    ▐█▌▐█████████
   ▄███████▄   ██ ▀███████▀
 ▄███████████▄  ▀██▄▄████▀
▐█ ▄███████████    ▀▀▀▀
█ █████████████▌      ▄
█▄▀████████████▌    ▄███▄
▐█▄▀███████████    ▐█▐███▌
 ▀██▄▄▀▀█████▀      ▀█▄█▀
   ▀▀▀███▀▀▀
████
  ██
  ██
  ██
  ██
  ██
  ██
  ██
  ██
  ██
  ██
  ██
  ██
████


▄▄████████▄▄
▄████████████████▄
▄████████████████████▄
███████████████▀▀  █████
████████████▀▀      ██████
▐████████▀▀   ▄▄     ██████▌
▐████▀▀    ▄█▀▀     ███████▌
▐████████ █▀        ███████▌
████████ █ ▄███▄   ███████
████████████████▄▄██████
▀████████████████████▀
▀████████████████▀
▀▀████████▀▀
iePlay NoweiI
I
I
I
[/t
Carlton Banks
Legendary
*
Offline Offline

Activity: 3430
Merit: 3071



View Profile
March 26, 2017, 01:11:57 PM
 #3

Quote from: Wikileaks
“While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization's supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise,”

this would never be possible without insiders in the company or direct cooperation by Apple with the agencies
basically

Exactly.

Look at the quote from Wikileaks above. How can mailed packages containing iPhones look brand new and un-tampered with, if the packaging for the phone itself has been opened to infect the device?

There is only one foolproof way to get the phone looking like new again: send it back to the Apple factory assembly line to replace all the transparent plastic packaging needed to infect the phone. Wouldn't that take a while? Wouldn't the time spent waiting seem a bit strange to the customer Huh

And isn't all this a little too elaborate?  If you need corrupt factory workers working for the CIA at Apple assembly lines (which are gonna be mostly in China, of course), why bother with all the messing around? Why not just infect each and every phone as it comes off the production line, it's far cheaper and easier (and then, only the more senior staff need to be corrupt CIA workers, not regular factory floor workers)

How come Wikileaks can't figure this out for themselves, surely they're not so badly informed that they really believe any of this "intercepting mail" nonsense

Vires in numeris
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!