Bonum Certa Men Certa

How to Securely Provide Techrights With Information, Documents

The key is anonymity

A lock



Summary: Advice for potential whistleblowers, or sources with evidence of abuse that they wish to anonymously share with the world (via Techrights)

OVER the years Techrights has received critical information from dozens of sources, all of which remained safe (unexposed). But this does not mean that all of them did this safely. This article provides advice for those who wish to pass to us information in the safest of ways, without having to do a lot of complicated things.



Why Not Off-the-shelf, Self-contained Secure Software?



Over the past 6 months or so we have looked into various bits of Free/libre software, e.g. Briefkasten (no longer actively maintained, as of 2013) and SecureDrop, which is too big a project (massive also in the source code sense compared to Briefkasten, not to mention difficult to set up). After much effort we decided to settle for something which is simpler to use and is much faster to use. To facilitate leaking of sensitive documents (e.g. evidence of misconduct) we mostly require anonymity, as the content of the material does not -- in its own right -- do much (if anything) to expose the source.

Typically, whole frameworks are built for distributed and de-centralised leaking. This requires quite a bit of hardware, which in turn needs to be set up and properly configured. It's complicated for both sides (source and receiver) and it's usually developed for large teams of journalists, for constant interaction with sources, or a regular flow of material. We do not require something this advanced. In practice, a one-time document drop is usually enough.

Our Proposed Solution



We have decided that the following method would be good enough given the nature of leaks we normally receive. They are typically about technology, rather than some military or surveillance apparatus such as the CIA's assassination (by drones) programme or the NSA's mass surveillance programme.

For extra security, we kindly ask people to ensure anonymity/privacy tools are used, notably Tor. Without it, privacy/anonymity cannot be assured to a high degree. It's possible, but it would not be unbreakable (meaning too great an effort and a challenge for spies to take on).

Establishing a Secure (Anonymous) Session



Follow the following steps, with (1) for extra assurance of anonymity.

  1. Install Tails or prepare a Tails device (e.g. Live CD) to boot on a laptop, in order to simplify session creation with Tor (for those who insist on using Windows we have this guide [PDF]).
  2. Irrespective of (1), seek public wireless/wired access in something like a mall (preferably not a sit-down like a coffee shop, where cameras are operated and situated in a way that makes it easy to track individuals by faces, payment with debit/credit cards and so on). The idea is to seek a place -- any place -- where it is hard to know the identity of the connected party, even by association (e.g. friend or family). Do not use a portable telephone (these are notoriously not secure and regularly broadcast location).
  3. Refrain from doing any browsing that can help identify patterns or affiliations of the user (e.g. session cookies). In fact, unless Tails is used, it might be worth installing a new browser (Opera for instance) and doing nothing on it prior to the sending of material. This reduces the cookie trail/footprint.


Send the material



Once logged in anonymously, anonymously (do not log in) submit text through Pastebin and take the resultant URL for later pasting. Do not pass PDFs for non-textual material. Instead take shots of them, to reduce/eliminate metadata which is often being passed along with them. Then submit to Anonmgur and make a note of the resultant URL for later pasting.

This is typically a one-way communication channel, so add any context which is necessary, then link to the above material as follows:



Caveats



While not impenetrable, it would take an enormous amount of effort (and connections in several high places) to unmask a source who follows the steps above. Unless it's a high-profile political leak, such an unmasking effort would be well beyond what's worth pursuing (expensive and complicated). MAC address-level spying often assumes access to very high places (and deep into back rooms), so therein lies no significant danger, especially when the best anonymity tools are properly used and the incentive to unmask isn't great enough at high places (usually the political or military establishments).

Recent Techrights' Posts

Microsoft Killed the Term "Open Source" (by Bribing/Taking Over OSI, 'Linux' Foundation Etc.) and Now It Needs to Kill the Brand Linux (Because Windows Just Won't Run!)
Why else would Microsoft falsely describe Windows as "Linux" and "Open Source"?
Slopwatch: Liars for Microsoft, Plagiarism, and IBM Red Hat Markets Slop as "AI"
Today was a bad day news-wise
Slopwatch: Slopfarms 'Think' Redis is "Linux" (RedisRaider)
Today we'll keep it short and to the point again
 
Bigots and Lunatics Who Attack Microsoft Critics, Projecting Their Own Bigotry by Accusing Others of Imaginary Things (Which They're Innocent Of)
"In psychology, projection refers to assigning your negative traits or unwanted emotions to others without being aware you’re doing it."
"The Appeals Committee [at the EPO] Unanimously Stated a Formal Flaw in the Consultation of the General Consultative Committee (GCC) on the Reform"
It's a truly horrifying situation
Links 21/05/2025: Climate Problems and Ceasefires No Longer Foreseen
Links for the day
Gemini Links 21/05/2025: "Shrimps of Doom" and "ASCII-graphs"
Links for the day
Links 21/05/2025: GitHub Becoming Slop, MElon as a Drug Addict Considered National Security Risk
Links for the day
IBM Has Allegedly Just Sacked Mr. McKinsey (McK), Clay Cowan, Its Fourth CMO in a Few Years
To insiders he represented the company that's killing IBM or advising IBM on how to self-destruct
Gemini Links 21/05/2025: Trips, 4D Golf, and Writing Software
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Tuesday, May 20, 2025
IRC logs for Tuesday, May 20, 2025
Links 20/05/2025: Biden's Cancer, GDPR Changes, and UK Defamation Cases (or SLAPPs) Fail Again
Links for the day
Microsofters Targeting the Wife of the Critic of Microsoft
false claims and loaded statement
Links 20/05/2025: "Bankrupt 23andMe Just Sold Off All Your DNA Data" and "Free Speech Warriors" MIA
Links for the day
Microsoft a Top Sponsor at Red Hat Summit (IBM Selling Proprietary Spyware and Back Doors in a "Red" Trench Coat)
They both work for Microsoft
Openwashing of Windows, Back Doors, Persistent Surveillance, Keyloggers, Screen Loggers, DRM and So On
WSL is not "Linux", it's Windows
New 'Interview' With - or Talk Coverage of - Richard Stallman in the European Union
automated English translation
IBM Mass Redundancies Likely This Coming Thursday
We're not in a position to judge if that's true or false
Gemini Links 20/05/2025: LLM Scraper Bots in Gopher and "Starmer and the Somewheres"
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Monday, May 19, 2025
IRC logs for Monday, May 19, 2025
Skype Fell Off a Cliff (Microsoft Killed It), All Microsoft Has Left Now is Slop and Spaghetti Code
"This isn’t about AI. This is a puppet show to drive stock prices up and down."
The Official SUSE Blog Uses LLM Slop to Compose Fake Articles Promoting Microsoft and Azure
even a little slop spoils the broth
Slopfarms (Machine-Generated Fake News Sites Authored by Bots With Slop Images) Spread GNU FUD
This isn't about Linux (GNU doesn't run just on Linux)
United States Federal Government's Digital Analytics Program (DAP): GNU/Linux Users Represent Close to 6% of Visitors This Year
How far has GNU/Linux gotten? Very far!
The "LLM Ouroboros of Shit" is Complemented by Even Worse Phenomena Caused by Microsoft's Contribution of SPAM and Pollution
Microsoft became a world leader in promotion of LLM slop
The LLM Ouroboros Phenomenon
Fact #1: over time slop gets worse (training set is like some blurry JPEG). Fact #2: People's "smell" for slop improves over time, as they 'train' on slop and can detect it based on prior encounters. Put 1 and 2 together.
Links 19/05/2025: Charges of Blackmailing Over Son Heung-min, Chad Opposition Leader Detained
Links for the day
Gemini Links 19/05/2025: Ableism, Silicon Monkeys, and More
Links for the day
How We Defeated DDoS Attacks
One of the best things one can do is migrate to an SSG
Microsofters Issuing Threats to Microsoft Critics Who Blog About Microsoft
So far we see that their "legal strategy" revolves around trying to discredit people like Theodore Ts'o
Links 19/05/2025: Political Catchup and CISA Advisories
Links for the day
TheLayoff.com Has Begun Deleting Trolls/AstroTurfers Infesting the IBM Section to Discourage On-Topic Discussion About Culls and Maladministration (Bad Strategy)
Moderators have realised there's a problem
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Sunday, May 18, 2025
IRC logs for Sunday, May 18, 2025