What do you mean the recent Wikileaks scandal about the CIA? Explanation of Year Zero and 7 Vault

A large group of new facts revealed by WikiLeaks about US intelligence and ability to penetration by not only encrypted chat applications such as WhatsApp and Talegram but extended for smartphones and tablet computers and smart TVs and even cars.
Wikileaks revealed a set of documents, dubbed Year Zero as well as penetration tools dubbed Vault 7 group, what does this mean simply?
Let's start with the year zero, to imagine Castle at the foot of a mountain, the castle is, for example, the application of a secure chat like WhatsApp, Talegram, Signal or others. The mountain is the operating system of the device, whether Android or iOS that hosts the application (the castle).

If the castle was well fortified, but the mountain that stands it is an active volcano, this threatens not fully Thsneha benefit greatly from exposure to destroy.

Thus when we say that the CIA penetrated WhatsApp and Talegram and other Although encryption, this talk is not "entirely accurate" because the penetration here being on the operating system level regardless of the application that runs it. Consequently, there is no application that can prevent the keyboard from knowing the button you press, as well as the application can not hide what you want the operating system displayed on the screen, the application here is not a problem but the system problem.

How can we protect the castle? The problem on the mountain which is a volcano and not well fortified castle encryption system. Thus solving the serious problem now is in the hands of device manufacturers as well as the developer of operating systems such as Google and Apple so they can damping volcano and remove the danger.

In fact, the mountain is not an active volcano (it did not reach for that bad yet) but it is a mountain contains a lot of secret passages and tunnels to reach inside the castle.

7 cellar is a set of tools and programs from viruses and other techniques and provides a detailed map of these secret tunnels that if Sketha you up to the castle and beyond large fortifications abroad.

What did WikiLeaks extremely important, since revealed that map and secret passageways and submitted to the Department of the castle where Apple and Google to see them and study them bridge those gaps and secret tunnels leading to the castles Android and iOS filling.

Fortunately, this landfill is very easy through a security update urgently send hardware and need for the cooperation of the manufacturers also to develop update and send it as soon as possible before it reaches the map "of the wrong hands."

Also luckily subject does not mean that anyone can easily Achtrack and looking at their own conversations, one can say that you should worry about Achtrack only if you're a US intelligence targets, and restore and affirm that the gaps are not in the applications and the system of encrypted but is in the operating system itself will therefore be Achtrack even if you are using Talegram or WhatsApp which encodes the talks not be able to until the company developed for application access.

Tips for prevention

With it you can not protect yourself now but there are some things that if I did it would reduce the likelihood of your exposure to risk.

1. Do not break the protection of the iPhone or get a root powers to Android
2. does not install applications from sources outside the store or unreliable
3. Get security updates for the operating system and installed aphid
Source Agencies