Today, Wikileaks has started releasing amazing ground-breaking revelations about CIA capabilities – to scalably and critically compromise the most modern communication security systems, and connected cars safety – and, especially, their supposed widespread inability to keep innumerable others from finding and exploiting them. Here is a post about it by the World most esteemed IT security expert.
The Wikileaks statement said: ”This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA,” the site said in a statement. “The archive appears to have been circulating among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”
If such statement is even half true, it would be historical. We’d need to conclude that all enterprises, banks, public institutions and everyone, are much more naked to both scalable and targeted, than they thought they were. Not only against advanced state actors or determined actors, but to much smaller competitors, criminals, states and stalkers. It would be orders of magnitude bigger than the release of Hacking Team tool sets.
For 3 years, we at TRUSTLESS.AI and the Trustless Computing Consortium have been building technologies, standards and strategic partnerships to, not just increase, but radically increase the state-of the art of cybersecurity by (a) completely removing the need or assumption of unverified trust along the entire supply-chain and lifecycle of all critical IT service components (down to CPU, fabrication and standard setting) and (b) applying to them consistently-extreme levels of independent expert review relative to complexity.
If our approach have seemed paranoid to many, we invite you to read this week’s news and analysis of the huge Wikileaks revelations about CIA capabilities – to scalably and critically compromise the most modern communication security systems, and connected cars safety – and especially they inability to keep other from finding those capabilities. Though much was known or desumable from Snowden revelations, this new revelations clears away much CIA/NSA and cybersecurity vendors media deception over these years, and may well drive mainstream the demand for approaches to cybersecurity as extreme and uncompromising as those of TRUSTLESS.AI and the Trustless Computing Consortium are pursuing, which no one in the World is even getting close to do to our knowledge.