Chapter 5-3

1284 Words

The documents contain CIA’s capabilities to conduct mass surveillance and cyber warfare. They can use the program to compromise cars, smart TVs, web browsers and computers' operating systems. The leak also caused the tech companies to update the security patches on their software. The last thing they want is for CIA to snoop on the civilian. Dad then turns to Ms. Chiyo after that. “When did the encryption backdoor exists on their smartwatch?” He asks her. Ms. Chiyo begins to search for the timestamp on her surveillance program. She then displays the timestamp on the large screen for everyone to see. “It looks like the encryption backdoor already existed for such a long time. It was way before Incognito exposed the Transhuman Development Project to the public. Not only that, their smartwa

Free reading for new users
Scan code to download app
Facebookexpand_more
  • author-avatar
    Writer
  • chap_listContents
  • likeADD