How Secure are our Devices?

How Secure are our Devices?

The CIA’s exploitation of vulnerabilities in Android phone use surfaced a few weeks ago via the collaborative site WikiLeaks, an online platform used to release highly confidential or censored information to the public. WikiLeaks claimed the CIA and other agencies have developed and qualified the capacity to bypass encryption and other security methods in popular messaging apps. In counter, Google has released a series of updates to its Android smartphone software to diminish the capacity of the government to obtain information. However, due to the contracts Google has with phone makers, not all phones have been updated with the latest software that protects against the potential hacks. The concept of the CIA employing hacking to obtain personal information is an issue of policy, which questions the security of the content we keep in our personal devices. This recent release in Wikileaks raises the important topic of recognizing and determining if this ability is a breach of personal security, or if it reveals the issue that our personal information and our technology use is not as safe as we once thought.


Leave a Reply

Your email address will not be published. Required fields are marked *

Skip to toolbar