For years, the CIA has been developing tools to infringement of Apple products, and today thanks to WikiLeaks, we have more information.
Today, the website WikiLeaks released new documents it called “dark matter" or "Dark Matter," and came to be added to its already existing data Vault 7 which includes information on the hacking tools developed, purchased and used by the CIA. Today's papers focus specifically on Apple products, and detail the methods the CIA uses to smash MacBooks and iPhones.
Most of the leaked documents have been in existence for more than seven years. So you might think that the company's current products are probably not at risk. But despite the aging of the papers, there are persistent secret service efforts to find and exploit weaknesses in Apple's products.
One of the tools, called the “Sonic Screwdriver,” was used to infect MacBooks via USB or the Thunderbolt port, and for it to work the CIA would have to have physical access to a device. Other exploits mentioned in today's leaks are installed in its firmware computer, καθιστώντας τα μη ανιχνεύσιμα μέσω συμβατικών forensic τεχνικών.
The CIA seems to have had more trouble with the early versions of the iPhone. Only one of the tools available to service targets the phone. The so-called tool "beacon"Is designed to be installed on the devices before they are released on the market.
Considering how old the bugs are, it's unlikely that any of them will still work against Apple's modern products.
Of course, it is very likely that the CIA has developed new tools that target today's MacBooks and iPhones.
WikiLeaks is committed to revealing all the vulnerabilities listed in Vault 7 to the companies directly concerned for repair. At the moment he has not kept his promise, as according to information he requires a number of conditions before he reveals the errors.