Skip to main content

Home/ CNDLS Design Seminar/ Contents contributed and discussions participated by Tom Zorc

Contents contributed and discussions participated by Tom Zorc

Tom Zorc

WikiLeaks Was Launched With Documents Intercepted From Tor | Threat Level | Wired.com - 0 views

  • WikiLeaks, the controversial whistleblowing site that exposes secrets of governments and corporations, bootstrapped itself with a cache of documents obtained through an internet eavesdropping operation by one of its activists, according to a new profile of the organization’s founder. The activist siphoned more than a million documents as they traveled across the internet through Tor, also known as “The Onion Router,” a sophisticated privacy tool that lets users navigate and send documents through the internet anonymously.
  • The siphoned documents, supposedly stolen by Chinese hackers or spies who were using the Tor network to transmit the data, were the basis for WikiLeaks founder Julian Assange’s assertion in 2006 that his organization had already “received over one million documents from 13 countries” before his site was launched, according to the article in The New Yorker.
  •  
    (This article seems to have been debunked by another I bookmarked)
Tom Zorc

Plaintext over Tor is still plaintext | The Tor Blog - 1 views

  • I write to remind our users, and people in search of privacy enhancing technology, that good software is just one part of the solution.
  • We hear from the Wikileaks folks that the premise behind these news articles is actually false -- they didn't bootstrap Wikileaks by monitoring the Tor network.
Tom Zorc

WikiLeaks and Tor: Moral use of an amoral system? | Invisible Inkling - 1 views

  • Before launching the site, Assange needed to show potential contributors that it was viable. One of the WikiLeaks activists owned a server that was being used as a node for the Tor network. Millions of secret transmissions passed through it. The activist noticed that hackers from China were using the network to gather foreign governments’ information, and began to record this traffic. Only a small fraction has ever been posted on WikiLeaks, but the initial tranche served as the site’s foundation, and Assange was able to say, “We have received over one million documents from thirteen countries.”
    • Tom Zorc
       
      So China's hacking the Tor network to obtain the docs that Assange is going to release anyways...? 
Tom Zorc

WikiLeaks and Julian Paul Assange : The New Yorker - 0 views

  • The edited film, which was eighteen minutes long, began with a quote from George Orwell that Assange and M had selected: “Political language is designed to make lies sound truthful and murder respectable, and to give the appearance of solidity to pure wind.”
    • Tom Zorc
       
      And how fitting is it that Assange is concerned with political language, and how it is "designed." Maybe I'm just stuck on this idea at the moment...  But the connotations language has upon its effect is incredibly powerful.
Tom Zorc

WikiLeaks and Julian Paul Assange : The New Yorker - 0 views

  • Assange is an international trafficker, of sorts. He and his colleagues collect documents and imagery that governments and other institutions regard as confidential and publish them on a Web site called WikiLeaks.org.
    • Tom Zorc
       
      interesting take on it
  • extensive catalogue
    • Tom Zorc
       
      the new yorker's agenda seems to support assange through a tone that on a certain level undermines criticism / makes the documents seem "less serious" ...as compared to the response of other relevant parties 
  • The secretiveness stems from the belief that a populist intelligence operation with virtually no resources, designed to publicize information that powerful institutions do not want public, will have serious adversaries.
    • Tom Zorc
       
      same tone here
  • ...1 more annotation...
  • Assange calls the site “an uncensorable system for untraceable mass document leaking and public analysis,” and a government or company that wanted to remove content from WikiLeaks would have to practically dismantle the Internet itself. So far, even though the site has received more than a hundred legal threats, almost no one has filed suit.
  •  
    *process of learning note* As I explore a certain aspect of a topic, I find myself opening the several links an article references in multiple tabs, reading those articles fully, and doing the same.  Each piece offers a slightly different perspective or take on the issue, yet rounds out the perspective.
Tom Zorc

WikiLeaks and Tor: Moral use of an amoral system? | Invisible Inkling - 0 views

  • Reading the New Yorker’s piece on WikiLeaks, it’s hard to decide whether I’m reading about freedom fighters, skilled propagandists, or as is often the case, both.
  • The Tor Project blog responds, pointing out that Tor doesn't magically encrypt text, it simply allows for the anonymous transfer of files. So if you use unsecure connections and send data in plain text, it's just as safe as writing down the information on a piece of paper, folding it into an airplane, and throwing it across the street.
1 - 6 of 6
Showing 20 items per page