Log in

Hey CIA, You Held On To Security Flaw Information—But Now It's Out. That's Not How It Should Work

https://www.flickr.com/photos/143601516@N03/29972713206 https://www.flickr.com/photos/143601516@N03/29972713206
Wikileaks today released documents that appear to describe software tools used by the CIA to break into the devices that we all use at home and work. While we are still reviewing the material, we have not seen any indications that the encryption of popular privacy apps such as Signal and WhatsApp has been broken. We believe that encryption still offers significant protection against surveillance.

The worst thing that could happen is for users to lose faith in encryption-enabled tools and stop using them. The releases do reaffirm that users should make sure they are using the most current version of the apps on their devices.  And vendors should move quickly to patch these flaws to protect users from both government and criminal attackers.

The dark side of this story is that the documents confirm that the CIA holds on to security vulnerabilities in software and devices—including Android phones, iPhones, and Samsung televisions—that millions of people around the world rely on. The agency appears to have failed to accurately assess the risk of not disclosing vulnerabilities to responsible vendors and failed to follow even the limited Vulnerabilities Equities Process. As these leaks show, we're all made less safe by the CIA's decision to keep --  rather than ensure the patching of -- vulnerabilities. Even spy agencies like the CIA have a responsibility to protect the security and privacy of Americans. 

Related Cases: 

EFF v. NSA, ODNI - Vulnerabilities FOIA


Read more

Last modified on Wednesday, 08 March 2017 20:43

Comments (0)

There are no comments posted here yet

Leave your comments

Posting comment as a guest.
Attachments (0 / 3)
Share Your Location