If you can use Tor, but must contact WikiLeaks for other reasons use our secured webchat available atNot long ago, the CIA lost Charge of the vast majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero working day" exploits, malware remote control devices and connected documentation. This incredible selection, which a