so i'm a little late to the drama party [0], but enjoying the entertainment none the less. a few things are particularly amusing, including the email header, no doubt sailing across a multitude of narus taps in plaintext, forever tying the WL alias to it's intended subject, """ This is a restricted internal development mailinglist for w-i-k-i-l-e-a-k-s-.-o-r-g. Please do not mention that word directly in these discussions; refer instead to 'WL'. """ as well as a dollar figure behind the psyphon scam, US $3,000,000 dollars, no doubt rationally allocated to posturing and vaporware rather than extending existing best of class solutions. (Tor needs help, in case people haven't noticed :) so much talk of security, social network analysis, urgent privacy [1], and not a single link to SNA avoiding Tor/i2p routing? i'm not one to harsh on the merits of a nice session layer, but when it clearly addresses only half of the stated equation, the implications are not positive. (to be fair, the wikileaks faq and links remedy this [2]) there is lots of talk of super architecture, "WikiLeaks integrates technologies including modified versions of FreeNet, Tor, PGP and software of our own design." [3] but very little details. a freenet and Tor combo would seem to accentuate the deficiencies of each, but perhaps my ignorance is overly jaded. i hope an infrastructure entrusted with critical privacy will display the necessary transparency required for reasonable trust when launched. some interesting bits are also found within, with this judicial position making me wonder when they'll come no-knocking for cable plats and transit schedules: """Although existing authorities do not directly address the subject, it appears that reasonable restrictions upon the possession and dissemination of catastrophically dangerous information can be constitutionally implemented," suggests Stewart Harris of the Appalachian School of Law. See "Restrictions are justifiable," National Law Journal, December 11, 2006. """ (one day you may need a license for intelligence and autonomy! now take your pills and report to your cube...) and nothing makes me chuckle like some fiat ethics: "1. Ethics. We favour, and uphold, ethical behaviour in all circumstances." (a good example, like Ellsberg/pentagon papers mentioned in detail later, is a much better representation of the ethical reasoning desired) did they take up your suggestion, JYA? """If fleecing the CIA is the purpose, I urge setting a much higher funding goal, in the $100M range and up.""" LOL keep "losing it", John. may your age related dementia continue for many score... *grin* 0. WikiLeaks http://cryptome.org/wikileaks/wikileaks-leak.htm http://cryptome.org/wikileaks/wikileaks-leak2.htm 1. riseup security overview and measures http://help.riseup.net/security/about/ http://help.riseup.net/security/measures/ 2. WikiLeaks Links (heheh, sorry, i need sleep. but try and say it out loud, i dare you!) http://www.wikileaks.org/links.html [i2p, pgp, privoxy, freenet, gnupg, Tor] 3. WikiLeaks FAQ http://www.wikileaks.org/faq.html 99. someone inevitably wonders why i'm geeking out on privacy from a gmail account. lest you question my sanity (it's eroded in different dimensions), i have no expectation of privacy from plaintext nor hosted service. Tor is a minimum best effort, and in reality it takes more skill and effort than most have at their disposal (for now). so i tentatively concur with this advice, unless you know enough and are skilled enough to know your known unknowns and your unknown unknowns (ah, such wisdom, rummy!): """The Internet is a spying machine and no use of it free of surveillance is possible due to the system's design to allow continuous monitoring by service providers, website operators, security peddlers and government communications regulators across and up and down the transmission stream. Hazards planted in users' boxes are the least threat compared to the Internet's inherent capability of siphoning and archiving data at multiples points without users' knowledge or control. Any website privacy policy which promises protection is a lie, same for any communications or government medium.""" - http://cryptome.org/
participants (1)
-
coderman