Your feedback is important to us!
We invite all our readers to share with us their views and comments about this article.
Disclaimer: Comments submitted by third parties on this site are the sole responsibility of the individual(s) whose content is submitted. The Daily Star accepts no responsibility for the content of comment(s), including, without limitation, any error, omission or inaccuracy therein. Please note that your email address will NOT appear on the site.
Alert: If you are facing problems with posting comments, please note that you must verify your email with Disqus prior to posting a comment. follow this link to make sure your account meets the requirements. (http://bit.ly/vDisqus)
The hacking community, of which WikiLeaks and the CIA's cyberwarriors are both aggressive offshoots, has been invading and exploiting every device in sight since the dawn of the digital age. It would be nice if governments, criminals and self-appointed do-gooders didn't invade privacy and steal things from the internet, but we don't live in that world.Everyone was scouting the best hacking tools and cleverest code writers.The hardest question here is whether the CIA and other government agencies have a responsibility to disclose to software vendors the holes they discover in computer code, so they can be fixed quickly.The government even has a little-known program, called the "Vulnerability Equities Process," which posits that U.S. agencies should share such exploits whenever the public benefit outweighs the cost to the government.U.S. intelligence agencies buy some of these exploits; so do other countries' spy services, criminal gangs, and the software vendors themselves.
Score one for American diplomacy
Chance to reset the table in Afghanistan
Trump’s diplomacy in China has no clear policy
FOLLOW THIS ARTICLE