It 1st infects a Net-linked Personal computer inside the Firm (called "Key host") and installs the BrutalKangerooThe leak outlined a broad variety of flaws in smartphones and other devices that the agency makes use of to intercept communications and spy on its targets, generating even China and Germany worried about the CIA's capability to hack all