Did The iCloud Celebrity Nude Picture Scandal Have Something To Do With Harvey Weinstein?
In September of 2014, Apple was getting ready to announce a massive iPhone upgrade: bigger iPhones than anything it sold before. But just a few days ahead of the iPhone 6 press event, an iCloud security scandal broke out. Nude pictures belonging to Jennifer Lawrence and many other celebrities leaked online, originating from iPhone backups.
Apple explained at the time that its iCloud security was not breached and that hackers probably used phishing schemes to obtain the usernames and passwords of the celebrities.
Here is a conspiracy thought: What if it wasn’t an iCloud hack? What if the pictures came from Harvey Weinstein’s phone? Was it hacked into, stolen or lost? What if Jennifer Lawrence’s pictures were intended for Harvey?
Apple has always maintained there was no hack and if you’ve seen any of the leaked the photos, some looked like what could be casting couch sessions more than random personal photos. In all honesty though, there’s no way of knowing. Jennifer Lawrence’s pictures in particular were way too well-done to be selfies; she had to have someone take them. Who is the question? An Assistant, a friend… that’s a good theory to ponder on.
In case you haven’t heard, Harvey Weinstein has been accused by Ashley Judd and a few other celebrities of requesting aspiring and established Hollywood starlets to accept his sexual advances in exchange for big studio roles, especially the Oscar bait career-making roles. Jennifer Lawrence is one of those that’s suspected of being made into Hollywood’s new “It Girl” out of nowhere probably due to her odd close relationship Weinstein. A lot of other starlets like Emma Watson, Scarlett Johansson, Jessica Alba, Brie Larson etc. are suspected to have done the same for roles. Weinstein’s apparently been doing this for decades. He’s already admitted to vague wrongdoings and his legal team and family are all circling the wagons.
The craziest thing of it all is how absolutely silent almost all of the entertainment industry has been about it, considering their treatment of Trump for just locker room banter, or their previous claims of caring about women’s issues, etc. It is also interesting how none of the late night show hosts have mentioned it even though it’s the most lurid Hollywood scandal in years. It’s almost as if they’re afraid they won’t get any more work if they speak ill of a certain segment of the Hollywood aristocracy.
So is it possible to assume Harvey Weinstein was taking some of those leaked Jennifer Lawrence pictures? Or were they meant for only him to see?
Yesterday, Wikileaks released another series from their ‘Vault 7’ CIA hacks called ‘Dark Matter’ where they reveal how Apple products are infected.
According to Wikileaks, ‘Dark Matter’ contains documentation for several CIA projects that infect Apple MAC computer firmware developed by the CIA’s Embedded Development Branch (EDB). Interestingly… the infection persists even if the operating system is re-installed.
23 March, 2017
Today, March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.
Among others, these documents reveal the “Sonic Screwdriver” project which, as explained by the CIA, is a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software for example from a USB stick “even when a firmware password is enabled”. The CIA’s “Sonic Screwdriver” infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.
“DarkSeaSkies” is “an implant that persists in the EFI firmware of an Apple MacBook Air computer” and consists of “DarkMatter”, “SeaPea” and “NightSkies”, respectively EFI, kernel-space and user-space implants.
Documents on the “Triton” MacOSX malware, its infector “Dark Mallet” and its EFI-persistent version “DerStarke” are also included in this release. While the DerStarke1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.
Also included in this release is the manual for the CIA’s “NightSkies 1.2” a “beacon/loader/implant tool” for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.
While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization’s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.
This no-nonsense chef has no problem peeling dozens of apples. In this video, Jasper van Ramshorst, he breezes his way through a huge pile of apples by sticking each apple on a power drill and spinning them at super-fast speed while holding it against a peeler, skinning each one in just a couple of seconds.
|You visit a friend’s place and are offered an apple that seems so delicious you can’t resist to take a bite. But when you do that, you find a worm in the apple. Still you are relieved of one thing as you know it could have been even worse.
What could have been even worse ?
If you found a half worm, that would have been worse.