protocol for high-profile dissenters to leak without being deaded/murdered/killed/eliminated/shot/heart-attacked etc

Razer g2s at riseup.net
Sun Jul 23 11:13:49 PDT 2017



On 07/23/2017 11:07 AM, Marina Brown wrote:

> I don't think the gov even needed to compromise networks or sites to
> catch her.

I agree with  that. I thought the government figured her out due to a
steganographic watermark in the dox along with the short list of people
who had accessed them, but I wasn't following carefully.

Rr


> On 07/23/2017 08:55 AM, John Young wrote:
>> Keep in mind any prominent leak site/dark net is thoroughly compromised,
>> wittingly or unwittingly upstream, downstream, inside, outside. Not a few
>> were, continue to be, established and run for that purpose, the rest
>> evolved
>> by publicity and notoriety into perfect nodes for capturing leakers,
>> discovering
>> networks (Tor a prime example), sending contaminated loads to recipients
>> eager to receive material for which sources can be denied, or simply
>> disclosed
>> to officials through consultation, vetting, ass-covering after
>> laundering through
>> amateurishly secure drop boxes
>>
>> Reality Winner is merely one among many others gulled into believing
>> what should be by now unbelievable due to insertion of loggers along
>> transmission paths from suppressed leakers to highly advertised,
>> incessantly bragging, outlets who never admit to being de facto
>> honey pots.
>>
>> Outlets all too readily check with officials authenticity of material to
>> protect
>> themselves from being duped, burned, tricked by a range of parties out to
>> disrupt the ancient practice of deception by "unauthorized" disclosure.
>> Above all they aim to protect their financial stability, assured by
>> government
>> regulation, from attack.
>>
>> The bind leaks/secrets suffer from is converting from unknown by the
>> public to known by the public. Far too much leaked is tampered with
>> in the inevitably failure-proned process. Far too much leaked is based
>> on blind faith in the inevitable insecurity of transfer from source to
>> outlet.
>>
>> WikiLeaks has become the global leader in deception about leaks
>> and the vulnerability leak sites and news outlets pose to leakers.
>> Privileges of journalists in avoiding culpabililty is the fly in the
>> ointment.
>> As WikiLeaks reinvented itself as a journalistic operation to protect
>> itself, it adopted the practices of government-bestowed-and-protected
>> organizations, and in the process accepted self-serving corruption as
>> inherent, indeed, essential, to survival.
>>
>> No need to have a formal relationship with authorities to betray and
>> harm leakers, merely operate a highly publicized, promoted, bragging
>> of security and transparency, albeit secret about itself, leak site,
>> a watering hole in the desert for thirsty prey to seek.
>>
>> Not too soon to forego the nightmare of secure leak outlets.
>>
>>
>>
>>> - Make sure that AT LEAST ONE of the people you leak to
>>>   simultaneously, know how to get your leak to Wikileaks and the dark
>>>   net, so that your leak persists in the case that you are
>>>   posth-leakishly murdered!
>>
>>
> Correct me if i am wrong, but my understanding is that Reality Winner
> essentially exposed her own activities by contacting the intercept using
> a NSA controlled and monitored network. She was one of a very few who
> printed out the document and then mailed a document with a barium meal
> to the intercept. The intercept verified the doc to the gov and they
> tracked Winner with the barium meal.
>
> I don't think the gov even needed to compromise networks or sites to
> catch her.
>
> -- Marina
>




More information about the cypherpunks mailing list