【update Archives】
Apple has responded to the latest crop of WikiLeaks documents that allege the CIA had a number of projects meant to compromise Apple products.
"Based on update Archivesour initial analysis, the alleged iPhone vulnerability affected iPhone 3G only and was fixed in 2009 when iPhone 3GS was released. Additionally, our preliminary assessment shows the alleged Mac vulnerabilities were previously fixed in all Macs launched after 2013," Apple said Thursday in a statement provided to Mashable.
SEE ALSO: Wikileaks' CIA dump contained WAY more bad memes than you would thinkThe statement refers to two exploits described in separate WikiLeaks documents released earlier in the day.
One detailed a project called "NightSkies," which allegedly enabled CIA operatives to install malicious software on a "factory fresh" iPhone. That software could then be used to remotely download everything from call logs and contacts lists to SMS records and browser data. That "alleged vulnerability" was "fixed in 2009 when the iPhone 3GS was released," according to Apple.
A separate document described a project called "Sonic Screwdriver," that involved using a modified ethernet adapter to implant malicious code into MacBooks. That exploit was "previously fixed in all Macs launched after 2013."
Additionally, Apple says it has "not negotiated with Wikileaks for any information," an apparent reference to earlier reports the organization had given tech companies a list of demands in exchange for details on the CIA's hacking techniques. "Thus far, we have not received any information from them that isn’t in the public domain."
Here's the full statement:
We have preliminarily assessed the Wikileaks disclosures from this morning. Based on our initial analysis, the alleged iPhone vulnerability affected iPhone 3G only and was fixed in 2009 when iPhone 3GS was released. Additionally, our preliminary assessment shows the alleged Mac vulnerabilities were previously fixed in all Macs launched after 2013.
We have not negotiated with Wikileaks for any information. We have given them instructions to submit any information they wish through our normal process under our standard terms. Thus far, we have not received any information from them that isn’t in the public domain. We are tireless defenders of our users' security and privacy, but we do not condone theft or coordinate with those that threaten to harm our users.
Featured Video For You
Paranoid like 'Snowden'? Here's where to put cellphones
Topics Apple
Search
Categories
Latest Posts
Get Rid of Windows 10 Ads, Office Offers and Other Annoyances
2025-06-26 23:20Digital Book Signings, and Other News by Sadie Stein
2025-06-26 22:30Low Boil by Tallis Eng
2025-06-26 21:19The Underground Library by Sadie Stein
2025-06-26 21:16Trump's DEI keyword crusade hits the country's defense archives
2025-06-26 21:12Popular Posts
Time to Unite
2025-06-26 23:08Chicken Poetry, and Other News by Sadie Stein
2025-06-26 22:42What We’re Loving: Crapalachia, Welty, Animalia by The Paris Review
2025-06-26 22:22Story Time! by Sadie Stein
2025-06-26 21:30Operation Mensch
2025-06-26 21:06Featured Posts
Best speaker deal: Save $30 on the JBL Clip 5
2025-06-26 23:38Happy Birthday, Telephone Book by Sadie Stein
2025-06-26 23:19Happy Birthday, Elizabeth Barrett Browning by Sadie Stein
2025-06-26 22:51Popular Articles
Story Time! by Sadie Stein
2025-06-26 23:09Built of Books, and Other News by Sadie Stein
2025-06-26 21:49On the Road iPad by Stephen Hiltner
2025-06-26 21:14The Biggest Tech Fails of the Last Decade
2025-06-26 21:04Newsletter
Subscribe to our newsletter for the latest updates.
Comments (35924)
Quality Information Network
A Decade Later: Does the Q6600 Still Have Game in 2017?
2025-06-26 23:35Charm Information Network
Emoji Classics, and Other News by Sadie Stein
2025-06-26 22:49Miracle Information Network
Maps by Ben Lytal
2025-06-26 22:35Exciting Information Network
Car Trouble, Part 1 by Pamela Petro
2025-06-26 22:21Heat Information Network
Amazon Spring Sale 2025: Best deals on cleaning supplies
2025-06-26 21:40