Researchers are investigating the sources of information “leaks” that could provide information to hackers about what computers and cellphones are doing.