Autonomous Next Generation Leaks

John Young jya at pipeline.com
Mon Jun 3 03:33:31 PDT 2019


Quite helpful suggestions. Probably should give 
up use of "leak" due to it becoming a marketing 
term, It now exaggerates, over-emphasizes 
content, "coutures," vaunts the predictable and 
traceable process from source to outlet.

Public library could work, just deposit material 
in a place to be found, discovered, almost 
accidentally, belatedly, maybe never, or right 
away, rather than greedily hyped to the max by 
media monsters which twist the content to favor 
the commercial industry (including the 
promo-addled gov, NGO, op-ed, essay, speech, SM, mail lists, et al).

Searching for and possibly sharing (or not) 
material on your own, at your own pace, at your 
own method, in a widely varying terrain, without 
spoon feeding by computer, print, TED, 
influencer, headliner, hustlers and promoters is 
far better because it limits external, 
highly-biased management of understanding and subsequent action.

Marketing has fucked consumers (marketing term) 
online and offline, not just with illusory 
privacy and security, but by excluding and 
demeaning "unimportant" information. It 
deliberately distorts, okay, lies and thereby 
encourages consumers to do the same as normality.

It may take an effort to overcome what 
"education" has instilled in its consumers about 
significance, obedience, careerism, language, 
technology, finance, arts, the works.

Leaks scream, most often incoherently, and induce 
screaming and babbling in response.

Silence is worth practicing, avoid being noticed, 
angered, goaded, offended and responsive behavior 
documented. Trust and truth these days are cheap 
desperate houswifey brands. So too democracy.

At 07:51 PM 6/2/2019, you wrote:
>Continuing...
>https://lists.cpunks.org/pipermail/cypherpunks/2019-June/075229.html
>
> > shut the fuck up
>
>Unacceptable... this complicit architechting of immorality...
>preserving the thieving means, murderous lives, and lying
>facades of those pouring hostile architecture from articulated
>tentacles of concrete pumpers, the structures of secret and
>dishonest malactors, the puppetmasters safehouses, topped
>with feedhorns for amplifying their own wet dreams.
>
> > Tell what you know
> > unfettered revelation, "dumping" and
> > failing to abide the rules of rigging.
>
>Much better... this weathering acid rain against the lime.
>Distributed anonymous tech offers additional options.
>Dump all, for all to see, and for none to takedown or filter.
>No redaction, but to preserve self for more action or escape.
>No gatekept interpreters, no contracted terms,
>no filtered pump and dumps, no clawbacks permitted.
>An unfound autonomous mole, if tis your delight, yet always
>prepared ahead for instant escape, a last deadman script ensuring
>redundant release of the Family Jewels liberated from their
>concrete and copper Presidios lit at night by sparkly fiber optic trees.
>The delivery girl, janitor, Lady of the Night, secretary, maintenance
>crew, executive director, computer nerd, brilliant analyst, or researcher...
>all can be equally effective in such operations. Perhaps data even
>distributed by speech in Central or Gorky Park, or the sprinkling of many
>Gigabytes on many USB's around the next cryptocurrency meetup,
>a distributed filestore retrieval hash sent via shitexpress.com
>message field to the haters for lols, whatever is interesting,
>leaving behind a whirlwind in the dust of your coattails.
>Take time, be safe from capture, survive... if that is of import.
>Is the point of leaking not impact toward whatever change
>may come... don't hold back, cut deep and let the cards fall.
>
>
>
>
>
>https://www.counterpunch.org/2019/05/31/edward-who-the-snowden-affair-ends-with-a-whimper/print/
>Edward Who? The Snowden Affair Ends with a Whimper
>By Bill Blunden On May 31, 2019
>
>     “Do not send to those who tout secure drops, Tor, crypto-comms ­
>these are traceable, diagrammable via basic net transmission tech.”
>
>     ­Cryptome
>It’s been more than six years since Edward Snowden went public. After
>all the breathless headlines, Hollywood movies, book deals, Pulitzer
>prizes, and glossy primetime biopics. What, pray tell, has come of it?
>For the average American ­ bupkis. In fact, mass surveillance is
>actually growing by leaps and bounds. Such that those who wish to
>salvage the remnants of their individual privacy will be forced to
>make some tough choices in the years ahead.
>
>Ed Snowden, holed up in Russia, has faded into history. At the
>forefront of the Snowden disclosures, the news outlet known as The
>Intercept has officially shuttered its archives. They made their
>moulah and moved on. And what of the considerable streak of
>confidential sources who’ve been thrown in the pokey? The editors
>aren’t talking much about how that happened. In fact they seem more
>interested in selling people email servers in a box. Hey, is this web
>page supposed to be an advertisement or an article? In the era of
>social media it can be hard to tell the difference.
>
>History offers a glimpse behind the curtain. During the early days of
>the Cold War it was common practice for the political leaders in the
>Soviet Union to purge the KGB every so often. Because over time
>Russian spymasters accrued enough political dirt and power that they
>threatened to take over. With the ascendance of Vladimir Putin one
>might argue that the rebranded KGB finally succeeded.
>
>In a similar manner, American intelligence escaped the Snowden
>revelations largely unscathed. That, dear reader, ought to tell you
>something. Sure there was lots of grandstanding and feigned outrage.
>Sure CEOs made bold statements of renunciation (ahem, after being
>caught in bed with spies). Keeping the kayfabe alive, as Jesse Ventura
>might say. Rest assured, claims Apple CEO Tim Cook, your iPhone would
>never ever spy on you. Yeah, and the relationship between Silicon
>Valley and government spies is completely adversarial, they can’t
>stand each other. Just like the blood feud Andre the Giant and Hulk
>Hogan back in the late 1980s. Uh-huh, just like that. A total
>farce which the media enables because that’s what they’re paid to do.
>
>But ultimately what matters is concrete institutional change. And
>there’s been zero of that, as in nada. Because genuine privacy
>threatens advertising revenue, quarterly returns, and spy power. And
>the elites want to keep the money train chugging along. Perhaps it no
>surprise then that the legislative response to Snowden was so watered
>down that one former spy chief publicly lampooned it. Let’s hear three
>cheers for state capture.
>
>You can almost hear Otis Pike weeping in his grave.
>
>Most advocates prefer to end their op-eds on a hopeful note. But
>sometimes hope is just a lightweight form of denial. The kind of
>“hope” that keeps Silicon Valley in business. Though it’s painful to
>concede, the spies at Fort Meade hit the nail on the head: we’re
>mostly zombies who pay for our own surveillance. Please go back and
>re-read the previous sentence. Short of a massive political upheaval
>things aren’t going to change. Which means that, for the immediate
>future, the really big changes will have to take place on a personal
>level.
>
>And so we arrive at the “tough choices” mentioned at the beginning.
>Members of the establishment often whine about discussing tradecraft
>because they believe that doing so might aid and abet terrorists. But
>the truth is that the channel of useful information is actually
>flowing in the opposite direction. From wanted fugitives to the
>public.
>
>The kernel of an approach can be found out in the field. Where poor
>security is fatal. Hunted by the world’s most formidable military, the
>head of ISIS is still alive thanks to solid operations security, also
>known as OPSEC. Abu Bakr al-Baghdadi is definitely a leader who
>appreciates OPSEC. According to the New York Times, “he eschews all
>electronic devices, which could identify his location, and probably
>communicates through a series of couriers.” The key to staying
>vertical, then, is the process surrounding the couriers. How they’re
>compartmented, screened, and arranged to create a resilient
>communication network. No doubt al-Baghdadi is aware that a flawed
>courier scheme was a significant factor in the downfall of Osama bin
>Laden.
>
>Edward Snowden likes to promote strong cryptography. Leaving people
>with the notion that staying under the radar is a matter of leveraging
>a technical quick fix. But recent history shows that trusting your
>life to an allegedly secure communication platform is an act of faith.
>And not an advisable one, especially when state sponsored operators
>enter the picture. Achieving higher levels of security requires a
>disciplined process which is anything but a quick fix and which often
>entails giving up technology. Even cartel bosses learn this lesson:
>security technology fails. Both my design and by accident. Spies win
>either way.




More information about the cypherpunks mailing list