ICLOAK - WikiLeaks CIA Dump Proves iCloak.me Strategy

By Eric B. Delisle March 8, 2017 General No comments yet


With yet ANOTHER giant WikiLeaks dump of the US Governments most secret techniques for hacking into digital lives, much of the media will generally screw up the details on what this all means to everyone.

Interestingly, what the details reveal is the strategy for security tools developed by iCloak® are spot on. Namely, if you are using security and privacy tools on a compromised system where someone is viewing your screen or recording your keystrokes, camera, and microphone, all the encryption in the world isn't going to help you.


Case-in-point: the reports that WhatsApp, Signal, Telegram, and pretty much any other encrypted messaging service can be "bypassed by the CIA". A couple examples of inaccurate reports...

Bloomberg Tweet reported,  "WikiLeaks says CIA hackers can break into WhatsApp and Signal"

New York Times Tweet reported,  "WikiLeaks release said CIA managed to bypass encryption on popular services such as Signal, WhatsApp and Telegram"

among others... https://icloak.me/s/6FWnfrt

There are challenges with crappy media reports that are partially accurate, sensationalized and poorly sourced. However, that topic deserves an many articles of its own. This article is to point out the less sensationalized details from the reports which imply something very different than implying the CIA or Hackers can get defeat encryption.

Buried in the Times article is the more accurate sentence... "According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect ‘audio and message traffic before encryption is applied."

Translation: the CIA can install software on certain phones and record the screen or keystrokes in real time.

This is basically the same as having someone sitting behind your computer screen with a video camera recording you working and typing a message you are ABOUT TO encrypt and send to someone via encryption software.


Unfortunately for the ordinary computer user, almost nothing they will learn to do on their existing devices in a practical sense is going to be enough. There are simply too many attack vectors for someone who is not a serious geek to deal with and many that even serious technologists would have trouble finding or avoiding. We have had encryption for years and years and "Johnny" still can't encrypt his email.
If you really want to geek out read this paper... http://www.ccs.neu.edu/course/csg256/johnny.pdf


When we started developing the iCloak® Stik in 2013 after the Edward Snowden leaks, we considered all of the possible solutions and almost ever one failed to address the problem of a "spook in the machine".

The reason iCloak is effective is that if spyware was installed on your computer, it would have to be stored somewhere. That "somewhere" is on your hard drive. When you use iCloak, you completely replace your entire computer operating system and have no access to anything stored on your hard drive. Therefore, no spyware can load when you start up a computer with an iCloak Stik.

Because iCloak loads and works only in RAM (temporary, volatile memory), even if a super-hacker was able to infect you during a time you were using iCloak, when you restart the machine again everything that was stored in RAM will be wiped out forever. Poof! Restart in iCloak again and you are safe once more.

The approach of starting with a secure computer is the only approach we can think of to defeat an attack of this type.

Note: this article has been first published in Linked In Pulse

Eric B. Delisle

A serial Entrepreneur, With a broad base of experience from being a pet shop owner, working in radio, putting the first Virtual Reality Systems in Disney World, fundraising, import/export, cyber security, everything technology related, sales and marketing, to market research and channel distribution working for MTV Networks/Viacom, consultant to the National Science Foundation on SBIR funding proposals, and currently investing in real estate, startups, and founding and running ICLOAK, Inc.

No comments yet

No comments yet. Start a new discussion.

Add Comment