Skip To Content
BuzzFeed News Home Reporting To You

Utilizamos cookies, próprios e de terceiros, que o reconhecem e identificam como um usuário único, para garantir a melhor experiência de navegação, personalizar conteúdo e anúncios, e melhorar o desempenho do nosso site e serviços. Esses Cookies nos permitem coletar alguns dados pessoais sobre você, como sua ID exclusiva atribuída ao seu dispositivo, endereço de IP, tipo de dispositivo e navegador, conteúdos visualizados ou outras ações realizadas usando nossos serviços, país e idioma selecionados, entre outros. Para saber mais sobre nossa política de cookies, acesse link.

Caso não concorde com o uso cookies dessa forma, você deverá ajustar as configurações de seu navegador ou deixar de acessar o nosso site e serviços. Ao continuar com a navegação em nosso site, você aceita o uso de cookies.

No, WikiLeaks Didn't Just Reveal That The Government Has Access To Your Secure Messaging Apps

Take a breath and reread what was in the documents released by WikiLeaks Tuesday morning.

Posted on March 7, 2017, at 12:18 p.m. ET

Reuters File Photo / Reuters

SAN FRANCISCO — A misreading of new WikiLeaks documents published Tuesday morning led to mass panic over whether the CIA and allied intelligence organizations could hack into secure messaging apps trusted by millions of people across the world.

The claims were made off a cache of almost 9,000 documents and files that WikiLeaks said came from the CIA's Center for Cyber Intelligence and allegedly detail how the CIA hacks into phones, laptops, and other connected devices. A number of news outlets reported that the documents revealed that Signal, WhatsApp, and other messaging apps that use high-level encryption to ensure that messages are sent and received safely had been compromised.

WikiLeaks #Vault7 confirms CIA can effectively bypass Signal + Telegram + WhatsApp + Confide encryption

Cybersecurity experts, however, were quick to point out that the documents simply stated that if a phone was compromised — which is to say if the CIA hacked into the phone itself — any apps on that phone would no longer be secure. This is the equivalent of saying that if your house is broken into and bugged, whispering softly on your phone in your bedroom is not going to make that conversation secure.

PSA: This incorrectly implies CIA hacked these apps / encryption. But the docs show iOS/Android are what got hacked…

In other news, if somebody looks over shoulder while you text somebody in Signal, your comms aren't secure.

That's not what it says. Not about Signal. If your phone is hacked, *nothing* is foolproof. Iphones are hardest to…

There isn't an encryption protocol in the world that will protect you if your phone/computer/device is compromised

The Wikileaks documents do confirm that the US actively seeks ways to hack into cell phones, computers, and any other smart, connected devices, by collecting what are known as "zero days." Zero days are the names given for bugs or other issues with a piece of technology that the original manufacturer doesn't know about yet. Essentially it's a problem that the manufacturer has had zero days to fix, so whether its a app within your iPhone or Microsoft Word, hackers can use it to get into your system without you (or the manufacturer) knowing about it.

In their release, Wikileaks wrote that, "'Year Zero' introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones."

Zero days, however, are difficult to find and cost millions of dollars to develop or buy from private cybersecurity researchers who uncover them. So while the CIA — or any other intelligence agency — could use a zero day to compromise a phone or laptop, it would need to be a very high value target for them to do so.

The leak is the latest to become public by WikiLeaks, which has come under fire for failing to adequately redact certain documents and also for its role in the US election. Last year the group released thousands of emails detailing the communications of top Democratic Party leaders — which were widely believed to originate from a Russian government–sponsored hack. US intelligence agencies accused Russia of trying to meddle in the US elections and said WikiLeaks had assisted in that cause.

  • Picture of Sheera Frenkel

    Sheera Frenkel is a cybersecurity correspondent for BuzzFeed News based in San Francisco. She has reported from Israel, Egypt, Jordan and across the Middle East. Her secure PGP fingerprint is 4A53 A35C 06BE 5339 E9B6 D54E 73A6 0F6A E252 A50F

    Contact Sheera Frenkel at

    Got a confidential tip? Submit it here.

A BuzzFeed News investigation, in partnership with the International Consortium of Investigative Journalists, based on thousands of documents the government didn't want you to see.