White House insists new health care law will reach Trump’s desk
Cindy Cohn, an attorney and executive director at the Electronic Frontier Foundation said using USA law to penalize vendors would be a “gross misuse”. However, there are several critical points we would like to make.
Apple and Google have responded to the leaks by saying that some of the vulnerabilities listed in the documents have already been patched; Apple said it was working “rapidly” to fix others.
Another reporter wondered whether the pin was a promo for the upcoming new season of “House of Cards”, which features an upside-down American flag as its logo.
Samsung said: “Protecting consumers’ privacy and the security of our devices is a top priority at Samsung. What does he know that we don’t??” tweeted WGN reporter Ben Bradley. Numerous techniques take advantage of flaws in software that make programs or devices vulnerable.
While it’s no secret that the CIA will use any means to gather intelligence, this is apparently the largest leak of its files in history. A former WikiLeaks release stated that in 2011the NSA eavesdropped on Chancellor Angela Merkel’s government.
Microsoft said that it’s aware of the CIA’s alleged tools and that it’s “looking into it”.
It takes many separate vulnerabilities to craft a full malware kit that can be used to remotely take control of a smartphone.
WikiLeaks itself said the documents, hacking tools and code came from an archive that had circulated among United States government hackers and private contractors.
One of the documents even discussed hacking vehicle systems.
To be clear, it’s very, very unlikely that Spicer was actually referencing the show, but there are some striking comparisons between the Underwood administration and the Trump administration that people latched onto pretty quickly online.
The CIA hasn’t confirmed the authenticity of the documents released in the dump, but has criticized WikiLeaks for what it says is attempting to undermine the agency’s operations. “It’s exactly the opposite of what they (the US government) should be doing”.
Assange’s press conference is the latest turn in a drama that has potentially blown open how the Central Intelligence Agency uses our own devices to spy on us.