Every week I browse YouTube for the latest trending videos. There are always hidden gems that you would otherwise miss on Google's massive video site. I tend to stay away from music, sports or politics videos unless there's something really interesting going on. But if there's ever a cool tech angle, I don't discriminate. Here are the videos I found this week that you should check out. Be respectful, keep it civil and stay on topic. We delete comments that violate our policy, which we encourage you to read. Discussion threads can be closed at any time at our discretion.
But what's really going on?, Updated March 8 at 2:40p.m, PT with CIA statement, WikiLeaks, the organization notorious for credit card case with rigid cover for iphone 7 leaking highly secure government data, published a cache of documents that reportedly exposes tactics the CIA uses to hack into our devices, WikiLeaks released more than 8,700 documents and files -- codenamed "Vault 7" -- on Tuesday, which it says are part of a CIA archive, We haven't yet independently verified the information, According to WikiLeaks, the CIA lost control of an archive that details the ways in which it hacks devices, The archive landed in the hands of "former US government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive."Here's the TL;DR: If the info WikiLeaks exposed is accurate, the CIA may be equipped with a variety of tools that let it hack into your phone, smart TV (kind of, more on that later), computer and router, That's basically all the things you own that are connected to the internet..
CIA's mission is to aggressively collect foreign intelligence overseas to protect America from terrorists, hostile nation states and other adversaries. It is CIA's job to be innovative, cutting-edge, and the first line of defense in protecting this country from enemies abroad. America deserves nothing less. It is also important to note that CIA is legally prohibited from conducting electronic surveillance targeting individuals here at home, including our fellow Americans, and CIA does not do so. CIA's activities are subject to rigorous oversight to ensure that they comply fully with U.S. law and the Constitution.
The American public should be deeply troubled by any Wikileaks disclosure designed to damage the Intelligence Community's ability to protect America against terrorists and other adversaries, Such disclosures not only jeopardize US personnel and operations, but also equip our adversaries with tools and information to do us harm."If the report is true, the CIA can hack devices such as, WikiLeaks' data dump suggests that, yes, the CIA could read your private messages before credit card case with rigid cover for iphone 7 they even got encrypted, But again, that's if the info is real, We don't know that yet..
Those apps do employ encryption, but that's useless if the CIA can hack your phone. If you crack the operating system, you don't need to crack the app. The OS shows what's on screen, listens to you typing or dictating words, and captures that unencrypted original data. If software -- like the alleged CIA hacking software -- can access the phone at that privileged level, it doesn't matter whether data is encrypted at rest (stored on disk/flash memory) or in flight (sent over a network). One thing we're unsure of is which versions of Google's Android, Apple's iOS, Mac OS X and smart TV software and other operating systems, including from Microsoft, may have been hacked.