{"id":66874,"date":"2022-01-11T19:26:31","date_gmt":"2022-01-11T19:26:31","guid":{"rendered":"https:\/\/yogaesoteric.net\/?p=66874"},"modified":"2022-01-11T19:26:31","modified_gmt":"2022-01-11T19:26:31","slug":"forget-whatsapp-cia-has-tools-to-hack-almost-all-social-media-platforms","status":"publish","type":"post","link":"https:\/\/yogaesoteric.net\/en\/forget-whatsapp-cia-has-tools-to-hack-almost-all-social-media-platforms\/","title":{"rendered":"Forget WhatsApp \u2013 CIA has tools to hack almost all social media platforms"},"content":{"rendered":"<p>However, what is not being reported by media is that CIA has developed tools which can hack not just WhatsApp, but bypass the encryption of<br \/>\n\u2022 Signal<br \/>\n\u2022 Telegram<br \/>\n\u2022 Wiebo<br \/>\n\u2022 Confide<br \/>\n\u2022 Cloackman,<br \/>\nby hacking your smartphones itself.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-66875 aligncenter\" src=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2022\/01\/1-5.jpg\" alt=\"\" width=\"560\" height=\"315\" srcset=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2022\/01\/1-5.jpg 700w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2022\/01\/1-5-300x169.jpg 300w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/p>\n<p>On March 7th, 2017, <em>Wikileaks<\/em> released a giant file of 8,761 documents from the U.S. Central Intelligence Agency (CIA) codenamed, \u201c<em>Vault 7<\/em>\u201d. <em>Wikileaks<\/em> called the leak the first full part of the series \u201c<em>Year Zero<\/em>\u201d. The documents were stolen from a network that supposedly was \u201c<em>isolated<\/em>\u201d within the CIA itself.<\/p>\n<p>The files include details on CIA\u2019s software capabilities, such as the ability to compromise<br \/>\n\u2022 cars<br \/>\n\u2022 smart TVs<br \/>\n\u2022 web browsers<br \/>\n\u2022 the operating systems of most smartphones<br \/>\n\u2022 other operating systems such as Microsoft Windows, macOS, and Linux.<\/p>\n<p>A CIA internal audit identified 91 malware tools out of more than 500 tools in use in 2016 being compromised by the release. The leaks outlined how the CIA could pretty much hack into any device with a suite of tools designed to read and copy data from electronic devices. The documents detailed how, for example, authorities found a way to bypass encryption in a host of secure messaging apps such as WhatsApp and Telegram.<\/p>\n<figure id=\"attachment_66878\" aria-describedby=\"caption-attachment-66878\" style=\"width: 560px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-66878\" src=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2022\/01\/2-3.jpg\" alt=\"\" width=\"560\" height=\"420\" srcset=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2022\/01\/2-3.jpg 600w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2022\/01\/2-3-300x225.jpg 300w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2022\/01\/2-3-86x64.jpg 86w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><figcaption id=\"caption-attachment-66878\" class=\"wp-caption-text\"><em>The image illustrates the structure of CIA Cyber Weapons development according to Wikileaks<\/em><\/figcaption><\/figure>\n<p>The CIA\u2019s covert hacking division had found a way to bypass vastly popular end-to-end encryption apps used on phones to prevent hacking and spying. This was accomplished by hacking the smartphone first. The code would run in the background and collect audio and text message traffic before encryption was applied through the apps. What this means is that apps like<br \/>\n\u2022 WhatsApp<br \/>\n\u2022 Signal<br \/>\n\u2022 Telegram,<br \/>\nhugely popular because of their security features \u2013 were vulnerable. People using these apps could still be spied on by the CIA.<\/p>\n<p>By the end of 2016, the CIA\u2019s hacking division, which formally falls under the agency\u2019s Center for Cyber Intelligence (CCI), had over 5,000 registered users and had produced more than a thousand<br \/>\n\u2022 hacking systems<br \/>\n\u2022 trojans<br \/>\n\u2022 viruses,<br \/>\nand other \u2018weaponized\u2019 malware.<\/p>\n<p>These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the \u201csmart\u201d phones that they run on and collecting audio and message traffic before encryption is applied.<\/p>\n<p>According to <em>WikiLeaks<\/em>, once an Android smartphone is penetrated CIA can collect, \u201c<em>audio and message traffic before encryption is applied<\/em>\u201d. Some of CIA\u2019s software is reportedly able to gain access to messages sent by instant messaging services. This method of accessing messages differs from obtaining access by decrypting an already encrypted message.<\/p>\n<p>While the encryption of messengers that offer end-to-end encryption, such as Telegram, WhatsApp and Signal, wasn\u2019t reported to be cracked, their encryption can be bypassed by capturing input before their encryption is applied, by methods such as keylogging and recording the touch input from the user.<\/p>\n<p>The news is important to all people because it is where we come to know new aspects about the world, which leads to the development of more life goals that lead to life wisdom.<\/p>\n<p>The news also serves as a social connection tool, as we tend to relate to those who know about and believe the work we do. With the power of an open truth-seeking conscience in hand, the individual can grow wise and the collective can prosper.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>yogaesoteric<br \/>\nJanuary 11, 2022<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>However, what is not being reported by media is that CIA has developed tools which can hack not just WhatsApp, but bypass the encryption of \u2022 Signal \u2022 Telegram \u2022 Wiebo \u2022 Confide \u2022 Cloackman, by hacking your smartphones itself. On March 7th, 2017, Wikileaks released a giant file of 8,761 documents from the U.S. [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[980],"tags":[],"class_list":["post-66874","post","type-post","status-publish","format-standard","hentry","category-about-perverse-masonic-manipulations-3480-en"],"_links":{"self":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/66874","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/comments?post=66874"}],"version-history":[{"count":1,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/66874\/revisions"}],"predecessor-version":[{"id":66881,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/66874\/revisions\/66881"}],"wp:attachment":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/media?parent=66874"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/categories?post=66874"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/tags?post=66874"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}