For years, the CIA has been developing tools for violating Apple products, and today thanks to WikiLeaks, we have more information.
Today, WikiLeaks publishes new documents called "Dark Matter" or "Dark Matter," and came to add to its existing data Vault 7 which includes information on the hacking tools developed, purchased and used by the CIA. Today's papers focus specifically on Apple products, and detail the methods the CIA uses to smash MacBooks and iPhones.
Most of the leaked documents have been in existence for more than seven years. So you might think that the company's current products are probably not at risk. But despite the aging of the papers, there are persistent secret service efforts to find and exploit weaknesses in Apple's products.
One of the tools, called "Sonic Screwdriver," was used to infect MacBooks via USB or the Thunderbolt port, and to operate the CIA should have physical access to a device. Other exploits reported by current leaks are installed in the computer firmware, making them undetectable through conventional forensic techniques.
The CIA seems to have been more difficult with the first versions of the iPhone. Only one of the tools available to the service targets the phone. The so-called "beacon"Is designed to be installed on the devices before they are released on the market.
Considering how old the bugs are, it's unlikely that any of them will still work against Apple's modern products.
Of course, it is very likely that the CIA has developed new tools that target today's MacBooks and iPhones.
WikiLeaks is committed to revealing all the vulnerabilities listed in Vault 7 to the companies directly concerned for repair. At the moment he has not kept his promise, as according to information he requires a number of conditions before he reveals the errors.