[[[ To any NSA and FBI agents reading my email: please consider ]]]
[[[ whether defending the US Constitution against all enemies, ]]]
[[[ foreign or domestic, requires you to follow Snowden's example. ]]]
[[[ Use this signature in you own emails to campaign for it. ]]]
IceCat should release new versions from the upstream release as _soon_
as it has been released. Users of delayed libre-upstream forks are
exploited by the NSA:
From https://en.wikipedia.org/wiki/Vault_7
*Vault 7* is a series of documents that WikiLeaks
<https://en.wikipedia.org/wiki/WikiLeaks> began to release on March 7,
2017 that detail activities of the United States
<https://en.wikipedia.org/wiki/United_States> Central Intelligence
Agency <https://en.wikipedia.org/wiki/Central_Intelligence_Agency> to
perform electronic surveillance and cyber warfare
<https://en.wikipedia.org/wiki/Cyber_warfare>. According to WikiLeaks
founder Julian Assange <https://en.wikipedia.org/wiki/Julian_Assange>,
Vault 7 is the most comprehensive release of US spying files ever made
public.^[1]
<https://en.wikipedia.org/wiki/Vault_7#cite_note-Inde_7_Mar_2017_Vault_7-1>
The files, dated from 2013–2016, include details on software
capabilities of the agency, such as the ability to compromise smart TVs
<https://en.wikipedia.org/wiki/Smart_TV>,^[2]
<https://en.wikipedia.org/wiki/Vault_7#cite_note-NYT_7_Mar_2017_CIA_leaks-2>
smartphones <https://en.wikipedia.org/wiki/Smartphone>, including Apple
<https://en.wikipedia.org/wiki/Apple_Inc.>'s iPhone
<https://en.wikipedia.org/wiki/IPhone> and phones running Google
<https://en.wikipedia.org/wiki/Google>'s Android
<https://en.wikipedia.org/wiki/Android_%28operating_system%29> operating
system, as well as operating systems
<https://en.wikipedia.org/wiki/Operating_system> such as Microsoft
Windows <https://en.wikipedia.org/wiki/Microsoft_Windows>, macOS
<https://en.wikipedia.org/wiki/MacOS>, and Linux
<https://en.wikipedia.org/wiki/Linux>.
It also said that it would postpone releasing the source code for the
cyber weapons, which is reportedly several hundred million lines long,
"until a consensus emerges on the technical and political nature of the
C.I.A.'s program and how such 'weapons' should be analyzed, disarmed and
published."
The CIA lost control of the majority of its hacking arsenal including
malware <https://en.wikipedia.org/wiki/Malware>, weaponized zero day
exploits <https://en.wikipedia.org/wiki/Zero-day_%28computing%29>,
malware remote control systems
<https://en.wikipedia.org/wiki/Command_and_control_%28malware%29> and
associated documentation. This extraordinary collection, which amounts
to more than several hundred million lines of code, gives its possessor
the entire hacking capacity of the CIA
--
David Hedlund
--
http://gnuzilla.gnu.org