Shockingly Unshocking: More Wikileaks Competitors Pop Up

from the gee,-who-could-have-expected-that... dept

Just recently, we noted that the attempts by Wikileaks critics to try to “shut down” the site (or physically harm its leaders) were misguided, because it wouldn’t take long for other sites to step up and offer the same functionality. In fact, there already are a few similar sites (with a somewhat lower profile). Now comes the news that some of the disgruntled former Wikileaks insiders are planning to create a new Wikileaks-like service. Who knows if this new project will be a success, but it certainly seems to highlight the fact that these kinds of sites are going to exist one way or another, and pretending that they can be stopped is a naive position.

Filed Under: ,
Companies: wikileaks

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Shockingly Unshocking: More Wikileaks Competitors Pop Up”

Subscribe: RSS Leave a comment
20 Comments
Anonymous Coward says:

quick way to kill sites like this, the gov builds lots of honey pot sites, then starts charging those who would leak information with Treason.

You cant put information on the net with out some kind of fingerprints that the FBI cant follow. I suspect loading files from a spoofed IP address from a public airport on public wifi using an account you have never used on a computer you stole from the guy in the bathroom then swaping tickets with someone on your flight and finally just going home could be enough, but you’ll just get caught when they look up the security cams anyway.

Rich Kulawiec says:

Re: Re:

There is no doubt that this method would yield some results, but the easily-forseeable outcome of that is that such an approach would simple accelerate the evolutionary process, and that would in turn select for those whose methods and tools made them highly resistant to such tactics.

And contrary to your assertion, it’s trivially easy to put information on the net that the FBI can’t follow. Keep in mind that there 100-200 million fully-compromised systems on the ‘net at the moment, and more every day. It’s quite easy to acquire access to those, either by (a) creating them (b) wresting them away from their current owners or (c) renting them from their current owners. (I trust everyone knows that the “owners” are NOT the people whose desks they reside on or whose briefcases they ride around in.) Those aren’t the only resources available, of course, but they’re essentially inexhaustible at the moment (and for the forseeable future), so in conjunction with a little crypto here and a little port-knocking there and a pinch of spread-spectrum communication, they provide an easy way to make it very very obvious that someone else is responsible.

This isn’t say that people won’t screw up: they will. Some of them will screw up badly and will get caught. But those who are clueful and diligent won’t be.

out_of_the_blue says:

You people are gravely wrong about the political climate.

The gov’t has turned against whistle-blowers — all by intent. Every totalitarian *needs* enemies — and Osama Bin Dead for some years by all non-gov’t reports, so he can’t be play the Emmanuel Goldstein role — but “treasonous spies” everywhere will do even better. It’s part of what the 850,000 quasi-gov’t spooks in the US do.

The police state is escalating, cheered on by most of the media and the ignorant thugs who actually do the killing in the perpetual war. Glenn Greenwald writes about war-monger Jonah Goldberg, who asks “Why is Assange still alive?”

http://www.salon.com/news/opinion/glenn_greenwald/2010/10/29/goldberg/index.html

The number of people willing to risk their lives for nebulous principles of freedom will continue to decrease.

Anonymous Coward says:

Funny how leaking info on the government is met with such blase attitudes anymore. No one cares. If the leak is about the United States government, most of us expect them to be corrupt and to be war mongers. I have lived my entire life in the US under the spectre of one war (police action) or another. We are always fighting someone under the guise of liberty and freedom while at home our freedoms get voted away by the politicians in charge. The government is controlled by those who can afford to have their view paid attention to.
This is interesting. In Oregon where I live there are 3,006,767 people of voting age. But only 1,418,133 voted for Governor. So anyone thinking that this was a victory and you got 50% of the vote. That meant that only 25% of actual voters believe in you. My point is: If you don’t vote you get what you deserve.

Anonymous Coward says:

Ideally they should encrypt their most critical data and ensure that those who have access to the keys are trustworthy.

If they want to add some checks and balances, they can encrypt it three times with three different keys and have each key reside with different departments. No one person should ever be able to see all three (or even any two of the three) keys. When it’s time to view the data, one person from each department must physically meet at a central location with a USB key that has their key. Each has their own laptop and one has a “designated, trustworthy” laptop that the information gets decrypted onto. Whoever needs to view the information can come with them. To view the information requires booting from a read only boot CD, each person first verifies the contents of the CD (ie: by putting it in their laptop and running a hashsum and file checker to ensure the CD is the correct CD and data hasn’t been tampered with) and then the CD gets booted from the designated laptop (checking that the laptop hardware isn’t compromised is a whole different issue) and each person verifies that the CD was booted. Each person enters their USB drive with their code and the information gets decrypted, viewed by the interested parties, and then the decrypted version gets deleted. The information should never touch any hard drive unencrypted, it should only be decrypted in ram alone. If it’s too much information to be decrypted into ram all at once then portions at a time can be decrypted and loaded into and removed from ram as needed (I believe truecrypt already has such a feature).

Sure, the method is not foolproof (some hardware based spyware could be installed on the designated laptop by one person without anyone else’s knowledge, for example. Sure, tamper evident seals can help alleviate this possibility and placing the laptop in a safe and protected place can help, but nothing is foolproof) but it’s much better than what we have now.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...