The electronic tools can reportedly compromise equally Apple's iOS and Google's Android working systems. By adding malware into the Android functioning process, the equipment could obtain entry to protected communications designed on a tool.[ninety six]If it is true that the CIA is exploiting zero-working day vulnerabilities, then it may be in cont