Alleged Wikileaks Use of P2P to Siphon Documents
John Young
jya at pipeline.com
Thu Jan 20 14:53:15 PST 2011
It may be that the cybersec wizard encountered a TLA sting being
run on P2P -- those exact six IP addresses among tens of thousands,
each wearing a sign that says Wikileaks right here, log us.
Someone writes that the USG has been seeding P2P with bogus files
for quite a while in order to trace their arranged discovery and
appearance elsewhere. Following the lead and using the means
and methoids of the copyright pig kissers.
To be sure that is what the USG and its contractors would claim to
cover their ineptitude. Meanwhile, using old style bribing, burgling,
paying lawyers and journalists and whistleblowers and hackers and
goofy soldiers to entrap would-be info liberators, then turning those
captured into pig kissers.
No disrespect to pig kissers, they happily admit to doing whatever
is necessary to outwit professionals.
More information about the cypherpunks-legacy
mailing list