{"id":40285,"date":"2021-04-25T20:20:15","date_gmt":"2021-04-25T20:20:15","guid":{"rendered":"https:\/\/yogaesoteric.net\/?p=40285"},"modified":"2021-04-25T20:20:15","modified_gmt":"2021-04-25T20:20:15","slug":"cia-able-to-access-encrypted-data-on-telegram-whatsapp-wikileaks","status":"publish","type":"post","link":"https:\/\/yogaesoteric.net\/en\/cia-able-to-access-encrypted-data-on-telegram-whatsapp-wikileaks\/","title":{"rendered":"CIA Able to Access Encrypted Data on Telegram, WhatsApp \u2013 WikiLeaks"},"content":{"rendered":"<p>The US Central Intelligence Agency (CIA) can hack smartphones and access encrypted information from Telegram, WhatsApp, Signal and Wiebo messengers, the whistleblowing website <em>WikiLeaks<\/em> said recently, citing confidential information leaked from the CIA.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-40286\" src=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2021\/04\/encryption.jpg\" alt=\"\" width=\"550\" height=\"413\" srcset=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2021\/04\/encryption.jpg 550w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2021\/04\/encryption-300x225.jpg 300w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2021\/04\/encryption-86x64.jpg 86w\" sizes=\"auto, (max-width: 550px) 100vw, 550px\" \/><\/p>\n<p>According to the organization, the CIA has several units specializing in malware designed for specific smartphone operating systems, with dedicated branches for Apple\u2019s iOS and Google\u2019s Android.<\/p>\n<p>\u201c<em>These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the \u2018smart\u2019 phones that they run on and collecting audio and message traffic before encryption is applied<\/em>,\u201d the <em>WikiLeaks<\/em> press release said.<\/p>\n<p>The CIA reportedly failed to disclose serious vulnerabilities, also known as \u201c<em>zero days<\/em>,\u201d of various technology products and proceeded to use them to target the relevant software.<\/p>\n<p>Earlier, the <em>WikiLeaks<\/em> began to release what it said was an unprecedentedly large archive of CIA-related classified documents. The first part of the leaks, dubbed \u201c<em>Year Zero<\/em>\u201d, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA\u2019s Center for Cyber Intelligence in Langley, Virgina.<\/p>\n<p>The quantity of published pages in \u201c<em>Vault 7<\/em>\u201d part one (\u201c<em>Year Zero<\/em>\u201d) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.<\/p>\n<p>Some wonder why such so-called \u201econspiracy\u201d news are being presented by spiritual websites. Such news is important to all people, because it is where we come to know more about the world we live in, which leads to the development of our wisdom and understanding. With the power of an open truth-seeking consciousness, the people can make choices that are beneficial for them, and thus the collective can prosper.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>yogaesoteric<\/strong><br \/>\n<strong>April 25, 2021<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The US Central Intelligence Agency (CIA) can hack smartphones and access encrypted information from Telegram, WhatsApp, Signal and Wiebo messengers, the whistleblowing website WikiLeaks said recently, citing confidential information leaked from the CIA. According to the organization, the CIA has several units specializing in malware designed for specific smartphone operating systems, with dedicated branches for [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[1383],"tags":[],"class_list":["post-40285","post","type-post","status-publish","format-standard","hentry","category-censored-news-social-5127-en"],"_links":{"self":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/40285","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/comments?post=40285"}],"version-history":[{"count":1,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/40285\/revisions"}],"predecessor-version":[{"id":40289,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/40285\/revisions\/40289"}],"wp:attachment":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/media?parent=40285"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/categories?post=40285"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/tags?post=40285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}