Keep in mind that these are old techniques, relying on vulnerabilities many of which have been patched. Wikileaks has hyped this story for their own reasons.
Remember, if anyone has physical possession of your iPhone or Mac and enough time, data can be retrieved. And if you expect to be any place where your iPhone might be stolen or confiscated, the best encryption is that provided by a longish password. Past investigations of security in apps show that the iPhone's own encryption is much safer than any app's encryption.
And, given the Lightning cord exploit mentioned here, it's wise to never plug anything into your Mac or iPhone unless you know for sure where the cord or device came from, and know that it hasn't been in anyone else's hands since purchase.
Here are two sober assessments of this Wikileaks story.
https://www.nytimes.com/aponline/2017/0 ... ption.html
NEW YORK — If the tech industry is drawing one lesson from the latest WikiLeaks disclosures, it's that data-scrambling encryption works, and the industry should use more of it.
https://www.nytimes.com/aponline/2017/0 ... s-cia.html
Security experts say the exploits are plausible, but suggest they pose little threat to typical users. They say that many of the tricks are older — the iPhone hack involves the 3G model from 2008, for instance. The techniques also typically require physical access to devices, something the CIA would only use for individuals it is targeting, not a broader population.