EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

10.25.15

How to Securely Provide Techrights With Information, Documents

Posted in Site News at 6:35 am by Dr. Roy Schestowitz

The key is anonymity

A lock

Summary: Advice for potential whistleblowers, or sources with evidence of abuse that they wish to anonymously share with the world (via Techrights)

OVER the years Techrights has received critical information from dozens of sources, all of which remained safe (unexposed). But this does not mean that all of them did this safely. This article provides advice for those who wish to pass to us information in the safest of ways, without having to do a lot of complicated things.

Why Not Off-the-shelf, Self-contained Secure Software?

Over the past 6 months or so we have looked into various bits of Free/libre software, e.g. Briefkasten (no longer actively maintained, as of 2013) and SecureDrop, which is too big a project (massive also in the source code sense compared to Briefkasten, not to mention difficult to set up). After much effort we decided to settle for something which is simpler to use and is much faster to use. To facilitate leaking of sensitive documents (e.g. evidence of misconduct) we mostly require anonymity, as the content of the material does not — in its own right — do much (if anything) to expose the source.

Typically, whole frameworks are built for distributed and de-centralised leaking. This requires quite a bit of hardware, which in turn needs to be set up and properly configured. It’s complicated for both sides (source and receiver) and it’s usually developed for large teams of journalists, for constant interaction with sources, or a regular flow of material. We do not require something this advanced. In practice, a one-time document drop is usually enough.

Our Proposed Solution

We have decided that the following method would be good enough given the nature of leaks we normally receive. They are typically about technology, rather than some military or surveillance apparatus such as the CIA’s assassination (by drones) programme or the NSA’s mass surveillance programme.

For extra security, we kindly ask people to ensure anonymity/privacy tools are used, notably Tor. Without it, privacy/anonymity cannot be assured to a high degree. It’s possible, but it would not be unbreakable (meaning too great an effort and a challenge for spies to take on).

Establishing a Secure (Anonymous) Session

Follow the following steps, with (1) for extra assurance of anonymity.

  1. Install Tails or prepare a Tails device (e.g. Live CD) to boot on a laptop, in order to simplify session creation with Tor (for those who insist on using Windows we have this guide [PDF]).
  2. Irrespective of (1), seek public wireless/wired access in something like a mall (preferably not a sit-down like a coffee shop, where cameras are operated and situated in a way that makes it easy to track individuals by faces, payment with debit/credit cards and so on). The idea is to seek a place — any place — where it is hard to know the identity of the connected party, even by association (e.g. friend or family). Do not use a portable telephone (these are notoriously not secure and regularly broadcast location).
  3. Refrain from doing any browsing that can help identify patterns or affiliations of the user (e.g. session cookies). In fact, unless Tails is used, it might be worth installing a new browser (Opera for instance) and doing nothing on it prior to the sending of material. This reduces the cookie trail/footprint.

Send the material

Once logged in anonymously, anonymously (do not log in) submit text through Pastebin and take the resultant URL for later pasting. Do not pass PDFs for non-textual material. Instead take shots of them, to reduce/eliminate metadata which is often being passed along with them. Then submit to Anonmgur and make a note of the resultant URL for later pasting.

This is typically a one-way communication channel, so add any context which is necessary, then link to the above material as follows:

  • Log in to the #techrights IRC Channel via the Web browser.
  • Choose a pseudonym and sooner or later we will get around to seeing the new arrival and checking what there is to be said (there are dozens of us there).
  • Drop the link/s in the channel. If someone is on the keyboard at the time, there might even be time for interaction. Do not say anything that can help reveal identity (sometimes the language itself is revealing).

Caveats

While not impenetrable, it would take an enormous amount of effort (and connections in several high places) to unmask a source who follows the steps above. Unless it’s a high-profile political leak, such an unmasking effort would be well beyond what’s worth pursuing (expensive and complicated). MAC address-level spying often assumes access to very high places (and deep into back rooms), so therein lies no significant danger, especially when the best anonymity tools are properly used and the incentive to unmask isn’t great enough at high places (usually the political or military establishments).

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Video: LinuxWorld 1999, Torvalds and Stallman

    LinuxWorld 1999, Torvalds and Stallman



  2. GNU World Order is a Personal Sacrifice, LinuxWorld Just Business

    As the Linux Foundation shows, Linux is just business (and proprietary software) as usual, software patents included, whereas it’s GNU that continues the Free Software Movement’s battles



  3. Links 20/2/2020: Oracle Solaris 11.4 SRU18, Mesa 20, VirtualBox 6.1.4

    Links for the day



  4. Open Source Did Not Win, It Was Assimilated to and by Proprietary Software

    Don’t fall for the whole “Open Source has won!” spiel; You know we’ve lost the battle (and were in effect gradually conquered) at OSI and elsewhere when those who speak for the OSI are Michael Cheng (Facebook), Max Sills (Google), and Chris Aniszczyk (Linux Foundation); they say “Open Source Under Attack” (FOSDEM talk) but their employers are the ones attacking and they downplay openwashing



  5. Former Microsoft Employees Don't Like Talking About Past and Present Microsoft Back Doors (Designed for Spy Agencies)

    In a typical Microsoftian fashion, once they cannot defend the illusion/delusion that Microsoft values security the 'Softers' run away and block any further debate



  6. Techrights Warns Against Impending Extradition Efforts (Passage of Julian Assange to His Death in the United States)

    Imprisonment of journalists who are effective at exposing crimes (of the powerful, not petty crimes) must never be condoned



  7. Team UPC: Many Mouths and No Ears

    The mental condition of Team UPC gets more worrisome by the week



  8. Team UPC Insults Judges Because the UPC is Dead and UPC Lobbyists Have Nothing Left to Lose

    More judge-shaming tactics are in the mix; Team UPC seems to feel like there's nothing left to lose as the UPC is already dead (hope itself is next to die)



  9. IRC Proceedings: Wednesday, February 19, 2020

    IRC logs for Wednesday, February 19, 2020



  10. China Bashing is Grounded in Fear (That They Can Simply Do Better Than the West)

    The atmosphere of hate towards China — fuelled partly by a white supremacist in the White House — is unhelpful and insulting; dignity and understanding is the way to go



  11. IRC Proceedings: Tuesday, February 18, 2020

    IRC logs for Tuesday, February 18, 2020



  12. FFII Press Release: Germany Can No Longer Ratify the Unitary Patent Due to Brexit and the Established AETR Case-law, says FFII

    Germany cannot ratify the current Unitary Patent due to Brexit and the established AETR case-law. The ratification of the UPC (Unified Patent Court) by Germany would constitute a violation of the AETR case-law, which was used during the EPLA negotiations in 2006 to consider a deal with non-EU countries, such as Switzerland.



  13. DRM (Proprietary Software) Already Makes Mozilla Firefox Broken, Unreliable, Undependable (Dependent on Binary Blobs)

    More people are beginning to realise that Mozilla resorted to self-harming DRM and self-inflicted damage that impacts Firefox; can Mozilla (re)join the anti-DRM coalitions?



  14. EPO and Other Patent Updates Over RSS

    Site syndication (over RSS feeds or XML/Atom) is vastly better than what became popular in recent years (censored, centralised, discriminatory "Social Control Media"); here are some feeds of interest



  15. When It Comes to a Unitary Patent System, Bad (or Intentionally Dishonest) Legal Advice Has Become the Norm

    The Unified Patent Court and Unitary Patent (UPC and UP, respectively) reinforce the old saying about lawyers being liars, doing anything to attract clients (to take their money); the UPC is basically dead, but fiction, falsehoods and outrageous fantasies still find their way into Web sites of law firms



  16. Links 19/2/2020: KDE Plasma 5.18.1, GNOME 3.36 Beta 2 and WordPress 5.4 Beta 2

    Links for the day



  17. Is Linux Foundation a Microsoft Branch Now?

    The so-called ‘Linux’ Foundation (LF) nowadays helps Microsoft cement its monopoly — the very opposite of what ages ago it said the LF would do



  18. Are Songs Property? And Maths Also Property? Artificial Monopolies Are Not Property...

    Patent maximalists continue to face stronger arguments from their sceptics, who rightly allege that words are being intentionally misused and numbers fabricated so as to distort underlying facts



  19. Battistelli Blocked Techrights at EPO (Banned for More Than 5 Years), So CEIPI Won't Respect Access to Information Either

    The use of censorship to confront people who talk about (not even expose) corruption isn't novel; but the adoption of this approach in Europe (not just places like Russia and China) is definitely noteworthy



  20. IRC Proceedings: Monday, February 17, 2020

    IRC logs for Monday, February 17, 2020



  21. Links 18/2/2020: Linux 5.6 RC2, Wine 5.2, GNU Social Contract and Sparky 2020.02 Special Editions

    Links for the day



  22. IRC Proceedings: Sunday, February 16, 2020

    IRC logs for Sunday, February 16, 2020



  23. Links 16/2/2020: MX Linux 19.1 and MyPaint 2.0

    Links for the day



  24. IRC Proceedings: Saturday, February 15, 2020

    IRC logs for Saturday, February 15, 2020



  25. Guest Article: Au Revoir, GNU/Linux

    "Funny how OSI just ended up being another vehicle for their takeover of the computing world..."



  26. Former Microsoft Employee: ZDNet is Owned by Microsoft (and Others) in Some Senses

    A noteworthy message we've received from someone who knows Microsoft from the inside



  27. Links 15/2/2020: Blender 2.82, Qt 5.15 Alpha and NetBSD 9.0 Released

    Links for the day



  28. Microsoft Views 'Open Source' as a Zero-Cost Heist Opportunity (Making Proprietary Software/Spyware Using Other People's Free Labour)

    Making GPL-licensed (copyleft) software and hosting it outside Microsoft’s jaws is the best way to counter the abusive monopolist, which still says it “loves” what it is actually attacking



  29. Did Microsoft 'Buy' ZDNet?

    A look at what ZDNet tells its readers (screenshot from this morning) and a rare look at how its writers are censored/suppressed



  30. Anatomy of a Crime and Protection From Prosecution

    It’s hard to forget what António Campinos hides for his friend


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts