Skip to main content

What the CIA WikiLeaks dump tells us: Encryption works

According to the purported CIA documents, spies have found ways to exploit holes in phone and computer software to grab messages when they haven't been encrypted yet. Although Apple, Google and Microsoft say they have fixed many of the vulnerabilities alluded to in the CIA documents, it's not known how many holes remain open. Cohn said people should still use encryption, even with these bypass techniques. "It's better than nothing," she said. "The answer to the fact that your front door might be cracked open isn't to open all your windows and walk around naked, too."

Sunday, March 12, 2017
Associated Press

Related Issues

JavaScript license information