Wikileaks, the CIA, and Apple's iPhones and Macs back on the front page

We have been dragging the topics, news and rumors for some time about the possible attempt to hack Apple, iPhone and Mac devices by the CIA. Apple is not outside these issues and a while ago our colleague Luis, published the news in which the Cupertino company denies the hacking of iCloud accounts "for a ransom" that really did not make much sense. But in this case what we have on the table are the documents leaked by the CIA's Wikileaks, in which the safety of Apple products is questioned.

The Central Intelligence Agency, whose original name in English is Central Intelligence Agency (CIA), has been working for a long time to access Apple devices and now a series of documents are coming to light that show some of the procedures that have been carried out. out to breach the security of Macs and iPhones by referring to the Sonic Screwdriver or Sonic Screwdriver as code names. These documents bear the title "Dark Matter" and it is not that they are vulnerabilities or current access attempts, they are from a few years ago - from 2008 in some cases - so today it would be impossible to use them thanks to the updates and current security.

Among the options or access possibilities, it is argued that it was necessary to direct access to device, being necessary to connect a USB in the case of Macs, using an Apple Thunderbolt to Ethernet adapter with the modified firmware or with the Lightning connection in the case of iPhones. In any case, they are documents that show the attempts to access Apple devices by the CIA and at the moment those of Cupertino have not commented on the matter, but taking into account the previous occasions in which these access attempts have been filtered, it is certain that we will have its version soon.


Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.