Skip to main content

Home/ CNDLS Design Seminar/ Contents contributed and discussions participated by Randall Bass

Contents contributed and discussions participated by Randall Bass

Randall Bass

EDITORIAL - The Abuse of Private Manning - Editorial - NYTimes.com - 1 views

    • Randall Bass
       
      shows the abusive techniques of his captors
Ian Palm

Anonymous and attacks on 'anti-wikileaks' sites - 4 views

Anonymous
started by Ian Palm on 03 Apr 11 no follow-up yet
  • Randall Bass
     
    Ian--I like these questions. That is, even if you understand what denial of service attack is, it still raises the question of how does one launch one, how easy is it to do so, etc.?
Randall Bass

L. Gordon Crovitz: From WikiLeaks to OpenLeaks | Full Comment | National Post - 0 views

  •  
    Another good piece on the differences between WikiLeaks and OpenLeaks. This one also emphasizes that distribution of responsibility for vetting documents, checking validity, and making determinations about security breaches, etc. to the publishers. The notion of distributed intelligence and distribute responsibility is a key Web concept that has many manifestations. But this is an interesting and important version of it. "Distributed intelligence" is also one of those concepts that has both social and technological implications. 
Randall Bass

Difference Between Wikileaks and Openleaks | Difference Between | Wikileaks vs Openleaks - 0 views

  •  
    A basic and useful article on the differences between Wikileaks and Openaleaks. Chief among them that Openleaks claims to be politically neutral. However, there is also a key technical and functional difference in that Openleaks does not store documents but merely acts as a middleman site between whistleblowers and publishers. 
Randall Bass

five minutes to speak | The Tor Blog - 4 views

  •  
    Interesting brief talk about Internet security and the role of proxy technologies, esp under repressive regimes. Though check out the comments too. Clearly there are downsides and social hazards to proxy technologies too.
Randall Bass

WikiLeaks - Submissions - 0 views

    • Randall Bass
       
      The Wikileaks postings are meant to be the beginning of a chain of reference. 
  • That is why we have created our novel method of submission based on a suite of security technologies designed to provide anonymity. We have put a great deal of technical and design work into the drop box because we take the journalist-source relationship very seriously.
    • Randall Bass
       
      What is the security architecture of Wikileaks? What makes the drop box secure? (RBass)
  • ...3 more annotations...
  • Communication is secured with SSL encryption.
  • 3.3 High risk postal submissions
  • This is because our journalists write news stories based on the material, and then provide a link to the supporting documentation to prove our stories are true. It’s not news if it has been publicly available elsewhere first, and we are a news organisation.
1 - 6 of 6
Showing 20 items per page