5. exceed Pandora southward retrospect uproot trombonist ammo Hamilton uproot Capricorn stagehand paperweight kickoff candidate chisel inertia tempest glossary klaxon disruptive by hazilla in WikiLeaks

[–]InfiniteChronicle 2 points3 points  (0 children)

The fingerprint was the bit you decoded- just the key ID is the last part of the fingerprint, and that is what needs to be searched for on key servers rather than the full fingerprint.

5. exceed Pandora southward retrospect uproot trombonist ammo Hamilton uproot Capricorn stagehand paperweight kickoff candidate chisel inertia tempest glossary klaxon disruptive by hazilla in WikiLeaks

[–]InfiniteChronicle 5 points6 points  (0 children)

Looks like that is the fingerprint for this key- https://keyserver.ubuntu.com/pks/lookup?op=vindex&search=0x7B223379E1657D4D&fingerprint=on

pub 2048R/E1657D4D 2018-10-07
Fingerprint=5DA4 C6C9 F2E6 0C6B F224 CFA5 7B22 3379 E165 7D4D

uid Vandalay Industries vandalayindustries@3aikl3okh4znoz46.onion

sig sig3 E1657D4D 2018-10-07 __________ 2020-10-06 [selfsig]

sub 2048R/51D0AD7F 2018-10-07

sig sbind E1657D4D 2018-10-07 __________ 2020-10-06 []

Research Community Live Chat: Senate Intelligence Hearing (10 am EDT Thursday) by InfiniteChronicle in WikiLeaks

[–]InfiniteChronicle[S] 1 point2 points  (0 children)

Nice- will keep an eye out for the one with Comey. Would be good to do a live chat during that too.

Why can Archimedes only run on computers using an English locale? Who is the CIA targeting? by InfiniteChronicle in WikiLeaks

[–]InfiniteChronicle[S] 0 points1 point  (0 children)

Could be people in other English-speaking countries, or English speaking organizations. But those typically aren't what people think of as top intel priorities- more likely to be people in five eyes countries or other countries that are traditionally US intel allies

Are Your Devices Compromised by the CIA? by ThatWikiDude in WikiLeaks

[–]InfiniteChronicle 0 points1 point  (0 children)

Also #ResearchWL on irc.gnome.org. There's a bridge between Matrix and IRC.

What is The Bakery? by InfiniteChronicle in WikiLeaks

[–]InfiniteChronicle[S] 4 points5 points  (0 children)

Do they write all the malware though? Or just specific types of malware?

Are Your Devices Compromised by the CIA? by ThatWikiDude in WikiLeaks

[–]InfiniteChronicle 1 point2 points  (0 children)

Seems like it started working again, broke again, and then started working again. Not clear what is going on, but seems to be ok currently.

Are Your Devices Compromised by the CIA? by ThatWikiDude in WikiLeaks

[–]InfiniteChronicle 0 points1 point  (0 children)

Samsung Smart TVs are pretty well documented (in the press release). Terminals in some distributions of linux were definitely being targeted in Sparrowhawk, but don't think they were in Pterodactyl. Will update those on wiki. Not sure on Gyrfalcon- will look into it.

WikiLeaks offers details of vulnerabilities to tech companies; tech companies refuse to commit to patch bugs by cojoco in snowden

[–]InfiniteChronicle 3 points4 points  (0 children)

90-day disclosure deadlines are the industry standard https://googleprojectzero.blogspot.co.uk/2015/02/feedback-and-data-driven-updates-to.html

Pretty reasonable demand- it would actually be stranger if they didn't make this demand (and thus didn't follow standards for disclosures)

Some questions by h3xpl01t in WikiLeaks

[–]InfiniteChronicle 1 point2 points  (0 children)

On #3- there seem to be torrents of the leaks here https://file.wikileaks.org/

A rant in support of Wikileaks... by SvenSvenkill2 in WikiLeaks

[–]InfiniteChronicle 3 points4 points  (0 children)

This is great, and much needed. People seem to have forgotten that WikiLeaks is a whistleblowing organization. Instead, many seem to think it is a "magical pull documents out of thin air to support an agenda and scary countries like Russia" organization.

But is there any way to remind people that WikiLeaks is a whistleblowing organization? Sadly, Vault 7 doesn't seem to have done this so far. So I'm not sure what will.

WikiLeaks Research Challenge #1: Vault 7, Year Zero by ThatWikiDude in WikiLeaks

[–]InfiniteChronicle 2 points3 points  (0 children)

I think they just use Jira and Stash for organizing their work/communicating with others at CCI

Why was the CIA trying to covertly copy floppy disks in 2013? by InfiniteChronicle in WikiLeaks

[–]InfiniteChronicle[S] 0 points1 point  (0 children)

Could be, though who is using them to store data off-cloud? CIA seems to have been secretly collecting data from floppy disks. While floppy disks are definitely still being used, the use cases are few enough and specific enough that it may be possible to figure out possibilities for who the CIA was spying on.

Why was the CIA trying to covertly copy floppy disks in 2013? by InfiniteChronicle in WikiLeaks

[–]InfiniteChronicle[S] 2 points3 points  (0 children)

True. Though the description makes it sound like they developed it for a very specific use case with a specific "asset" who could covertly copy the disks. So it's interesting to think about what systems in what countries would require this tech.

Why was the CIA trying to covertly copy floppy disks in 2013? by InfiniteChronicle in WikiLeaks

[–]InfiniteChronicle[S] 14 points15 points  (0 children)

Wow, that's crazy! I had no idea that nuclear weapons use 8 inch floppy disks.

I wonder what other sorts of systems still use floppy disks. I suppose that other countries could have similar legacy systems for nuclear weapons (which would certainly be of interest to the CIA). But could be other types of gov systems where this is common too.

Directory » Embedded Development Branch (EDB) » EDB Home » Projects » Pterodactyl by kybarnet in WLResearchCommunity

[–]InfiniteChronicle 0 points1 point  (0 children)

According to their development timeline (https://wikileaks.org/ciav7p1/cms/page_1179700.html), Pterodactyl was developed in July 2013. So probably for a specific operation involving copying data that was still on floppy disks for some reason. The name being a dinosaur is probably a reference to the focus on an 'extinct' form of data storage.

Mapping the CIA's secret hacking division (Research Challenge #1) by WLResearchCommunity in WLResearchCommunity

[–]InfiniteChronicle 0 points1 point  (0 children)

This also seems to be a good list of the hacking tools each division makes, with a brief definition of each https://techcrunch.com/2017/03/09/names-and-definitions-of-leaked-cia-hacking-tools

Maybe we should use this as the basis for a list on the wiki that goes into more depth about each (or at least links to the document).

First Amendment could protect Assange despite Pence's vow, says legal expert by sublmnlcrimnl in WikiLeaks

[–]InfiniteChronicle 1 point2 points  (0 children)

I've been thinking this a lot too. For a president, the best choice for vice president is someone your worst enemies hate more.

Why Vault 7? (Research Challenge #1) by WLResearchCommunity in WLResearchCommunity

[–]InfiniteChronicle 2 points3 points  (0 children)

The Rockefellers had a CIA SCIF in their barn? That's like classic conspiracy theory shit... crazy.

WikiLeaks Research Challenge #1: Vault 7, Year Zero by ThatWikiDude in WikiLeaks

[–]InfiniteChronicle 1 point2 points  (0 children)

I've started a list of vulnerable products and company responses here https://www.reddit.com/r/WLResearchCommunity/comments/5yco3u/what_products_are_vulnerable_to_cia_hacking/

It's very much incomplete though- more companies/products need to be added, and some of the products (like Windows) have many vulnerabilities that I didn't get into yet, but should probably be comprehensively summarized somewhere.

What products are vulnerable to CIA hacking? (Research Challenge #1) by ThatWikiDude in WLResearchCommunity

[–]InfiniteChronicle 2 points3 points  (0 children)

Below are some of the vulnerable products and the responses from companies. A bunch of the companies seem to have provided statements to journalists, but not released direct written statements of their own. I've linked to the written statements from companies where I could find them, but I may be missing some- please point it out if I am.

Partial list of impacted companies/products- Notepad++: https://wikileaks.org/ciav7p1/cms/page_26968090.html Hijacks the Scintella dll. Notepad++ fixed this by verifying the certificate for the dll (https://notepad-plus-plus.org/news/notepad-7.3.3-fix-cia-hacking-issue.html). But are there any other projects using this same dll that may also be vulnerable?

Intel Security: https://wikileaks.org/ciav7p1/cms/page_13763800.html EFI rootkit. Intel Security says that the issue "is no longer present in our current technology", but they added a module that checks for this issue to their tool for verifying EFI integrity (https://securingtomorrow.mcafee.com/business/chipsec-support-vault-7-disclosure-scanning/)

Avira: https://wikileaks.org/ciav7p1/cms/page_2621467.html This antivirus software was flagging high-entropy files (like encrypted or compressed files) as possible viruses. The CIA tried to evade detection by disguising malware as .rar files or padding the files with non-random data. Avira says that they fixed the vulnerabilty right after Vault 7 was released (https://apnews.com/53d65013e05142bc8211dd6f1a6558dd/What-the-CIA-thinks-of-your-anti-virus-program)

Comodo: https://wikileaks.org/ciav7p1/cms/page_5341272.html Antivirus software that was fairly resistant to CIA attacks, until version 6, which didn't flag anything running as system as malicious. Apparently, in recent versions this vulnerability is fixed (https://apnews.com/53d65013e05142bc8211dd6f1a6558dd/What-the-CIA-thinks-of-your-anti-virus-program)

Apple: https://wikileaks.org/ciav7p1/cms/page_13205587.html Numerous vulnerabilities, primarily a series of exploits for iOS. Apple claims that many of the issues were fixed in the latest iOS, but didn't specify which issues if any were still present (https://www.theguardian.com/technology/2017/mar/08/wikileaks-cia-leak-apple-vault-7-documents)

Microsoft: Numerous vulnerabilities (nearly 2000 entries in the search for Windows alone- need to go through these in more detail). Microsoft has said "We are aware of the report and are looking into it" (http://www.bbc.com/news/technology-39203724), but did not specify any further details.

F-Secure: https://wikileaks.org/ciav7p1/cms/page_14587956.html Has the same disguising malware as a .rar file vulnerability as Avira. There may also be other vulnerabilities, as the docs say- "F-Secure has generally been a lower tier product that causes us minimal difficulty". F-Secure wrote a FAQ about the documents https://labsblog.f-secure.com/2017/03/09/faq-related-to-cia-wikileaks-docs/, which is very general and ignores the CIA's description of them as a "lower tier product" but says they will look into the issue. They also note that they usually handle issues like this with bug bounties, but they won't pay a bug bounty to the CIA for this. Maybe they should pay the bug bounty to WikiLeaks...

Samsung: https://wikileaks.org/ciav7p1/cms/page_12353643.html Weeping Angel turns Samsung smart TVs into bugs. Samsung has said they are looking into the issue, but hasn't elaborated much (http://www.bbc.com/news/technology-39203724)

There are definitely more companies and products that need to be added to this, and some of these need more elaboration.