December 2010 Archives

The Swedish daily newspaper Dagens Nyheter reports

"A new WikiLeaks" revolts against Assange

Uppdaterat 2010-12-09 22:17. Publicerat 2010-12-09 22:16

The pressure on WikiLeaks is increasing. reveals that several key figures behind the website that publishes anonymous submissions and leaks of sensitive governmental, corporate, organizational or religious documents have resigned in protest against the controversial leader Julian Assange only to launch a new service for the so-called whistleblowers. The goal: to leak sensitive information to the public.

The new project, "Openleaks," has been under way for some time and will be launched Monday. has spoken to individuals behind the new site and the message is clear.

"Our long term goal is to build a strong, transparent platform to support whistleblowers--both in terms of technology and politics--while at the same time encouraging others to start similar projects," says a colleague wishing to remain anonymous.

"As a short-term goal, this is about completing the technical infrastructure and ensuring that the organization continues to be democratically governed by all its members, rather than limited to one group or individual."

The news comes in turbulent times for WikiLeaks. Thousands of documents infuriating global leaders and policy-makers have been unveiled to the public via Cablegate. Meanwhile, Julian Assange has been arrested in Great Britain on suspected rape charges based in Sweden. News about WikiLeaks has been over-shadowed by Assange's personal problems.

Earlier this year, WikiLeaks experienced accessibility issues. According to information revealed to, the problem was not linked to outsiders trying to sabotage, but came from the inside as a signal to Julian Assange to step down. The colleagues were dissatisfied with the operation's association with Assange's personal problems and how he used the organization in his explanation of the criminal charges.

It is hard to pinpoint exactly which of the technical infrastructure failures in the last year have been due to internal sabotage and feuds within .

It is the top-down management style which is under critique.

On the other hand, the source emphasizes the fact that the new website is supportive of WikiLeaks purpose and goal.

"The two organizations are similar in that aspect that both are focusing on providing means for whistleblowers to anonymously provide the public with information," one insider says.

Unlike WikiLeaks, Openleaks will not receive and publish information directly for the public eye. Instead, other organizations will access the Openleaks system and in turn, present their audience with the material. Documents will be processed and published by various collaborating organizations.

"We intend to split the work in a way where we handle only the anonymity and receiving end of the information," says another colleague.

This blog will be carefully scrutinising "the anonymity and receiving end of the information"

  • How will a whistleblower know if their "leak" is likely to get published or not ?
  • If not, then why would they use OpenLeaks at all ?

Remember that is no longer an option, as they are still refusing to accept any whistleblower leak submissions.

According to the internal documents shared with, Openleaks intends to establish itself as a neutral intermediary "without a political agenda except from the dissemination of information to the media, the public, non-profit organizations, trade- and union organizations and other participating groups."

That is still a political agenda, albeit perhaps not such an overtly anti - US Government one as mutated into pursuing.

"All editorial control and responsibility rests with the publishing organization. We will, as far as possible, take the role of the messenger between the whistleblower and the organization the whistleblower is trying to cooperate with," says one anonymous informant.

Another intended consequence is to avoid the pressure from world leaders that WikiLeaks has experienced.

"As a result of our intention not to publish any document directly and in our own name, we do not expect to experience the kind of political pressure which WikiLeaks is under at this time. In that aspect, it is quite interesting to see how little of politicians' anger seems directed at the newspapers using WikiLeaks sources."

Translation: Majsan Boström.

Ossi Carp

Forbes Magazine has an interview with Daniel Domscheit-Berg

Ex-WikiLeaker Explains His Spinoff Group, OpenLeaks

by Andy Greenberg

Dec. 9 2010 - 8:59 pm


The German Domscheit-Berg, along with several other former Wikileaks staffers, plans to launch a website they're calling OpenLeaks as early as next week, Domscheit-Berg told Forbes in an interview. Like WikiLeaks, the new site will allow leakers to anonymously submit information to a secure online dropbox. But unlike its parent site, it won't publish that information itself. Instead, it will allow the source to designate any media or non-governmental organizations he or she chooses and have that information passed on for fact-checking, redaction and publication. That difference, argues Domscheit-Berg, will allow OpenLeaks to accomplish much of the transparency achieved by WikiLeaks, without drawing the same political fury and legal pressure.

"To constrain the power of the site, we're splitting submission from the publication part. We won't publish any documents ourselves. The whole field is diversified," says Domscheit-Berg. "No single organization carries all of the responsibility or all of the workload."

Resource constraints, as Assange told me in an interview last month, have forced WikiLeaks to choose only its "highest impact" material for publication. But those constraints have also politicized WikiLeaks and forced it to make subjective decisions about its targets, Domscheit-Berg argues. "We want to be a neutral conduit," he says. "That's what's most politically sustainable as well."

OpenLeaks will integrate with the organizations it passes information to, functioning as a secure tip box on their sites. Those organizations can choose to store leaked information on their own servers or leave it in the hands of OpenLeaks, Domscheit-Berg says. "All this is cryptographically separated in a fashion that everyone has their own dedicated part of the system," he says.

Cryptography, whilst important, is not in itself sufficient to protect the anonymity of whistleblowers.

What protections will there be against Communications Traffic data analysis to protect the individual journalists who may have access, or may be strongly suspected of having access to such leaked material ?

If, for example, someone were to upload some alleged real, life threatening secrets, perhaps a list of names, job tiltles, home addresses, photos , fingerprints, DNA profiles etc. of intelligence or counter-terrorism agency officers or undercover police officers, then how will OpenLeaks protect the identities of individual journalists who had access to cryptographically protected "part of the system" ? Communications Traffic Data analysis (i.e. which computer logged into the system at which time and what size of files were transferred etc.), could identify individual journalists, who might then be put under intrusive surveillance or harassment or arrest, even if the encrypted content could not be read by third parties ?

The project will initially partner with five newspapers worldwide,

Exactly which newspapers ?

but soon expand to anyone who wants to participate. "Newspapers, NGOs, labor unions, anyone who wants to receive information from anonymous sources, we enable all these people to run something like this," says Domscheit-Berg.

And if the recipient organization chooses not to publish a leak? After a time designated by the source, the leaked material can be sent to other media outlets. "If a newspaper doesn't publish it, it will be shared," says Domscheit-Berg. "They can't just put it in a drawer."

This sounds a bit like the failed proposal for charitable funding for "Local" versions of See the previous blog article: applies for $532,000 funding from the Knight Foundation - for "local news" whistleblower leaks ?

A few more obvious questions, which should be asked by the swarm of journalists, some of whom may succeed in getting interviews with the OpenLeaks people next week.:

  • How many, if any, of the OpenLeaks team will declare their involvement and support of the project publicly ? Who are they ?

  • Will OpenLeaks be less aloof and arrogant and Twitter dependent than ? (Despite having a Wiki and a Website and for a time a "blog" and email as methods of publishing detailed Press releases, favoured short Twitter messages which, for complicated issues, come across as curt and arrogant. These Tweets were mixed with various ad hominem attacks and gripes against opponents)
  • Which of the several already registered domain names using OpenLeakS / OpenLeak etc . will this new website actually use from Monday ?
  • Will there be multiple physical mirrors of the content as well as multiple domain name DNS aliases pointing to the main website ?

  • Will OpenLeaks use secondary and tertiary etc. DNS providers,in different legal jurisdictions, so as not be vulnerable to legal or illegal attacks on a single DNS provider , something which was warned about, but chose to ignore until very recently ?

  • Will OpenLeaks eschew the stupid policy of "security through obscurity" and embrace Kerckhoffs' Principle ? i.e. "a cryptosystem should be secure even if everything about the system, except the key, is public knowledge."
  • Will OpenLeaks publish a high level technical / security / anonymity infrastructure architecture overview ? ( never did this, relying on buzzwords and names of open source security / anonymity tools which they never properly explained the specific risks of their particular implementation of. They often actually never used (e.g. Freenet) , or stopped using some of these claimed technologies after a while, for no good reason (e.g. the use of PGP encryption / digital signatures.)
  • Will OpenLeaks actually use a proper SSL/TLS Digital Certificate for https:// encryption, especially of any contact or submission web forms ? ( started off ok with one, but failed to replace it when the MD5 digital signature weakness was made public, then failed to renew it, then re-introduced a Digital Certificate for a while, but have now abandoned this again)
  • Will OpenLeaks publish and use one, or more, Pretty Good Privacy (PGP) public encryption and digital signing keys ? ( initially, after some prompting, published a PGP Key, then allowed it to expire after a year and then claimed that they were developing some sort of alternative encrypted email system, which never appeared )
  • Will OpenLeaks publish a Tor Hidden Service to allow more anonymous file uploads ? ( did start off with a Tor Hidden Service option, but abandoned it a year ago, although there was a brief re-appearance of a different one in July)
  • Will OpenLeaks accept postal submissions and / or financial donations ? ( did publish a list of "safe" PO box addresses, including one in Kenya, which they managed to continue publicising for financial donations, even after there was physical a break in to the premises and even after they had inappropriately only used Twitter to warn off some, but not all, people, from using it any longer)

  • What feedback will there be to an anonymous whistleblower that their submission or communication has actually been successfully received ?

  • How will OpenLeaks raise any funds ?
  • What will they do to protect the anonymity of financial contributors ?
  • What level of financial transparency and auditing of the finances will there be ?
  • Which media organisations and government agencies will have pre-publication access to the submitted material ?
  • Why should OpenLeaks be any more trustworthy than ?

The recent high profile Distributed Denial of Service attacks claimed by the "Anonymous" group are

a) Only partially successful against targets such as as Mastercard, and Visa and PayPal etc.

b) Do not actually help or Julian Assange.

Their latest stupid threats against Amazon and Twitter are indistinguishable from censorship of the internet, something which the "Anonymous" group pretends to be against.

A word of advice to those people gullible enough to download DDoS software, such as Xerxes or LOIC, even if it is used voluntarily: you should be aware that you have committed a crime with a potential punishment greater than that which Julian Assange is facing in Sweden.

e.g. the United Kingdom Computer Misuse Act 1990 was amended by the Police and Justice Act 2006 sections 35 to 38 specifically to cover Distributed Denial of Service attacks, by British or foreign national, either in the United Kingdom or anywhere else in the world.

The penalty for this crime (which is serious enough to be an Extraditable offence) is

"(c)on conviction on indictment, to imprisonment for a term not exceeding ten years or to a fine or to both."

i.e. an unlimited fine and / or up to ten years in prison i.e. more than the six years in prison which Julian Assange faces in Sweden for the alleged rape charges.

This also applies equally to the supposed "US patriot" hackers (who do not appear to have read or understood the First Amendment to The US Constitution, regarding freedom of the press) who have been trying, equally unsuccessfully, to counter-attack the "Anonymous" group or the various servers.

It is apalling that Julian Assange has been refused bail following his arrest in London today.

The Daily Mail explains the likely fortcoming legal complexities:

UK court refuses WikiLeaks chief Julian Assange bail on rape charge... despite Jemima Khan and friends offering £180,000 in sureties



Assange will appear before the City of Westminster Magistrates Court on December 14 when his lawyers are expected to outline their case against extradition and make a renewed bail application.

The WikiLeaks founder has indicated he will fight all the way to the High Court which could take over a year.

Legal sources believe he may argue to stay in Britain on the grounds that any trial in Sweden would be prejudiced because of his political notoriety.

He could take his case to the High Court and even the Supreme Court on 'a point of law of general public importance' which could take around two years to resolve.

If that fails, he could take the case to the European Court of Human Rights.

If he were to be extradited to Sweden what would happen?

Assange is likely to be immediately charged with rape. He would face a trial by a judge as Sweden does not have a jury system for criminal cases. If convicted he faces up to six years in jail. On release he could face the prospect of extradition to other countries.

Can the US extradite him from Britain?

His detention yesterday on a European Arrest Warrant means that Sweden's request would take precedence over any extradition bid from America. Only if a district judge refused Assange's extradition to Sweden, could the US apply to have him extradited there.

Can the US extradite him from Sweden?

US Attorney General Eric Holder claims to be taking 'significant steps' in a probe into the leaks, but it is unlikely that America will ever get its hands on Assange. The US has had an extradition treaty with Sweden since the 1960s, when the nations agreed to 'make more effective the co-operation of the two countries in the repression of crime'.

But extradition is likely to face a number of obstacles, not least the fact that the likely charges facing Assange in the US - under the Espionage Act or other legislation protecting national security - are not included in the exhaustive list of offences set out in the law.
Extradition is barred for military or political offences, under Swedish law.

There may also be issues of jurisdiction, since the offences Assange is alleged by the US to have conducted did not take place within the country.

Any extradition from Sweden to other countries could take place only after the current rape proceedings have been concluded.


We note that the Extradition case involving Gary McKinnon, who is accused of hacking in to US Military NIPREnet systems has lasted over 8 years now. This is another case involving US government pride and computer system incompetence, which has resulted in plenty of political pressure from the US Government.

See for the full panaoply of Extradition Hearings, Submissions to the Home Secretary, Appeals to the High Court, Judicial Reviews, Appeals to the House of Lords (now to the UK Supreme Court), Appeals to the European Court of Human Rights in Strasbourg. etc.

It looks as if Julian Assange will also now fall foul of the hated previous Labour governmet's controversial Extradition Act 2003, which prevents even incomplete prima facie from being heard and cross examined by defence lawyers in a British court, if the Extradition request is from a European Arrest Warrant country like Sweden or from the USA.

Gary McKinnon has been free on bail throughout his Extradition case, but others facing Extradition to the USA, such as British born computer techniocian Babar Ahmed have been locked up in high security prisons, without trial for even longer.


The demise of the website has led to the creation of a new slightly graphically enhanced website design at http://WikiLeakS.CH

This has a new design and offers some snippets of "news" on the front page, which is dominated by a Twitter feed and the never ending request for money.

Yet again, PayPal appear to have suspended the donations account, as they have done in the past. Whether this will be permanent this time, remains to be seen.

There now seems to be a separate

Julian Assange Defence Fund

Please donate directly to the Julian Assange and other WikiLeaks Staff Defence Fund. These funds will be used exclusively for defence costs

What financial auditing or transparency there is for this new Fund, is a mystery.

The alleged "Submissions" page is still a fiction

There is still no longer any method of submitting new whistleblower leaks to WikiLeakS.CH (not even in plaintext , let alone using any encryption), so it is very misleading of them to pretend that there is.

This WikiLeakS.CH website does not publish any email or phone or postal contact details for the project.

They are not even re-publishing the etc. email addresses that they used to.

Incredibly, this website does not have any kind of Digital Certificate, not even a self signed one. Therefore there is no SSL/TLS encryption to protect sensitive personal data like names, emails and phone numbers etc from being snooped when submitting a web form.

However there are now two such web forms, one for Journalists to Register to perhaps, if they are lucky, be put on the list of "reliable and trustworthy organizations" to "collaborate" with on "future releases".

All of the the 17 fields on this web form are marked as mandatory, including email address and mobile phone numbers.

What a gift to any Government agency or others monitoring the unencrypted web form traffic.

There is also now a Mirrors page

Wikileaks Mirrors

Wikileaks is currently under heavy attack.

In order to make it impossible to ever fully remove Wikileaks from the Internet, you will find below a list of mirrors of Wikileaks website and CableGate pages.

If you want to add your mirror to the list, see our Mass Mirroring Wikileaks page
Mirror List

The mirror list will be published when we will have at least 50 mirrors

Why wait until they "have at least 50 mirrors ? Surely a couple of high bandwidth mirrors would be more useful than 50 low bandwidth ones ? The legal jurisdictions of these mirrors is also an issue.

This second unencrypted web form:

is even more of a candidate for SSL/TLS encryption protection, since it asks for Login Details and Passwords to allow wikileaks to upload arbitarary content to mirror sites.

They are asking for:

IP Address of your server *
add ":port" if you are using a port other than 22 for SSH or 21 for FTP, IPv6 should be written with brackets [ ] like [2001:67e::44]:22

Login we should use to access this server *

Password we should use, ONLY if we should use FTP

absolute path where we should upload the html data. *

Hostname you configured on your http server to serve the pages (if not *

How stupid does anyone have to be to simply hand such details over to wikileaks, without any encryption and even without establishing two way contact with them first ?

It is all very well stating that

I know that this may be dangerous if I host a virtual host, and I'm ok with this risk. *

but they really should explain the risks properly and provide some protection for volunteers.

  • There is no promise to provide any legal or financial support, or even advice, in return for someone being stupid enough to publicly mirror the controversial wikileaks content at their own expense.
  • What if the unencrypted form with its login details is intercepted by third parties and then used to upload fake whistleblower documents, or versions which have tracking cookies, web bugs, malicious javascript embedded in (.pdf) or (.doc) files etc ?
  • What if these unencrypted logon details are used (by third parties or by wikileaks insiders) to access the web server logfiles to snoop on visitors to these mirrors ?
  • Rogue mirror operators will be able to gather some useful Communications Traffic Data about the wikileaks infrastructure and perhaps about individual PCs being used by the wikileaks staff.

They also claim that

Our content is only html/css/javascript/png static files, so we don't require much resource to host it.

Does that mean that they will not upload any video clips or (.pdf) or (.zip) or (.doc) content from the original wiki whistleblower submissions ?

The domain name is currently no longer resolving to an IP address.

DynaDot,com, the California USA based Domain Name Registrar, which was successfully defended against interference in Bank Julian Baer court case does still have the domain name registered..

Do remember this core "brand" Domain Name was, incompetently, allowed to expire in the past. (see domain name expires at

However, this Domain Name registration only points to a single, free Domain Name Service provider,, which supports lots of free, community based domain names.

They have now decided to protect the thousands of other people who rely on them from the "collateral damage" of Denial of Service attacks aimed at, as usual, did not bother to respond to the termination of service warnings until it was too late., a provider of free managed DNS services, supports nearly 500,000 websites worldwide.

At 10PM EST, on Wednesday December 1, 2010 a 24-hour termination notification email was sent to the email address associated with the account. In addition to this email, notices were sent to Wikileaks via Twitter and the chat function available through the website.

Any downtime of the website has resulted from its failure to, with plentiful advance notice, use another DNS solution.

Yesterday, pursuant to the Acceptable Use Policy the primary DNS hosted domains were disabled. Today, also in accordance with the Acceptable Use Policy, the secondary DNS hosted domains, including, were disabled. is not taking a position on the content hosted on the or website, it is following established policies. No one user has the right to put at risk, yesterday, today or tomorrow, the service that hundreds of thousands of other websites depend on.

As usual, rather than issuing a full press release by email or on a web page, the self important one way broadcast via the Twitter account has been used to state that wikileaks has been under Denial of Service attacks.

We are currently under another DDOS attack

Tue Nov 30 12:04:49 UTC 2010


DDOS attack now exceeding 10 Gigabits a second.

Tue Nov 30 14:06:00 UTC 2010

However when it come to,

WikiLeaks,org domain killed by US after claimed mass attacks KEEP US STRONG [...]

Fri Dec 03 05:33:29 +0000 2010

Note the use of the words "killed" and "claimed " and "US".

Instead of some words of thanks or understanding, to an organisation which has supported throughout its lifetime, for free, this Tweet implies that are lying about their understandable reasons for dropping from their DNS name servers.

Is this what you get for supporting the wikileaks technical infrastructure ?

The team have now set up

facilitated by the Swiss Branch of the Pirate Party (

At least this domain name does now have Domain Name Servers from more than one provider, based in two legal jurisdictions (.ch - Switzerland and .net - USA)

They have also modified the set up of []

and []

which resolves back to one of the original machines in Sweden

These simply now use 301 Permanent Redirects to point to

the webserver running on the -

IP address range allocated to Wikileaks by the Internet Service Provider OVH based in France.

More on this new website in a future blog article.

Why they have not bothered to update their registration to point to new Domain Name Servers could be due to:

a) Incompetence.

b) A cynical ploy to gather sympathy for being censored.

c) More evidence of an internal rift or lack of communications between different parts of the the wikileaks team.

About this blog

This blog here at (no "S") discusses the ethical and technical issues raised by the project, which is trying to be a resource for whistleblower leaks, by providing "untraceable mass document leaking and analysis".

These are bold and controversial aims and claims, with both pros and cons, especially for something which crosses international boundaries and legal jurisdictions.

This blog is not part of the project, and there really are no copies of leaked documents or files being mirrored here.

Email Contact

Please feel free to email us your views about this website or news about the issues it tries to comment on:

email: blog@WikiLeak[dot]org

Before you send an email to this address, remember that this blog is independent of the project.

If you have confidential information that you want to share with us, please make use of our PGP public encryption key or an email account based overseas e.g. Hushmail

Now that the project is defunct, so far as new whistleblower are concerned, what are the alternatives ?

The wiki page lists links and anonymity analyses of some of the many post-wikileaks projects.

There are also links to better funded "official" whistlblowing crime or national security reporting tip off websites or mainstream media websites. These should, in theory, be even better at protecting the anonymity and security of their informants, than wikileaks, but that is not always so.

New whistleblower website operators or new potential whistleblowers should carefully evaluate the best techniques (or common mistakes) from around the world and make their personal risk assessments accordingly.

Hints and Tips for Whistleblowers and Political Dissidents

The Submissions web page provides some methods for sending them leaked documents, with varying degrees of anonymity and security. Anybody planning to do this for real, should also read some of the other guides and advice to political activists and dissidents:

Please take the appropriate precautions if you are planning to blow the whistle on shadowy and powerful people in Government or commerce, and their dubious policies. The mainstream media and bloggers also need to take simple precautions to help preserve the anonymity of their sources e.g. see Spy Blog's Hints and Tips for Whistleblowers - or use this easier to remember link:

BlogSafer - wiki with multilingual guides to anonymous blogging

Digital Security & Privacy for Human Rights Defenders manual, by Irish NGO Frontline Defenders.

Everyone’s Guide to By-Passing Internet Censorship for Citizens Worldwide (.pdf - 31 pages), by the Citizenlab at the University of Toronto.

Handbook for Bloggers and Cyber-Dissidents - March 2008 version - (2.2 Mb - 80 pages .pdf) by Reporters Without Borders

Reporters Guide to Covering the Beijing Olympics by Human Rights Watch.

A Practical Security Handbook for Activists and Campaigns (v 2.6) (.doc - 62 pages), by experienced UK direct action political activists

Anonymous Blogging with Wordpress & Tor - useful step by step guide with software configuration screenshots by Ethan Zuckerman at Global Voices Advocacy. (updated March 10th 2009 with the latest Tor / Vidalia bundle details)

WikiLeakS Links

The Frequently Asked Questions (FAQ) page.

WikiLeakS Twitter feeds

The website does not stay online all of the time, especially when there is a surge of traffic caused by mainstream media coverage of a particularly newsworthy leak.

Recently, they have been using their new Twitter feeds, to selectively publicise leaked documents to the media, and also to report on the status of routing or traffic congestion problems affecting the main website in Stockholm, Sweden.

N.B.the words "security" or "anonymity" and "Twitter" are mutually exclusive: Twitter feed via SSL encrypted session: unencrypted Twitter feed

Internet Censorship

OpenNet Initiative - researches and measures the extent of actual state level censorship of the internet. Features a blocked web URL checker and censorship map.

Temporary Autonomous Zone

Temporary Autonomous Zones (TAZ) by Hakim Bey (Peter Lambourn Wilson)

Cyberpunk author William Gibson

Campaign Button Links

Watching Them, Watching Us, UK Public CCTV Surveillance Regulation Campaign
UK Public CCTV Surveillance Regulation Campaign

NO2ID Campaign - cross party opposition to the NuLabour Compulsory Biometric ID Card
NO2ID Campaign - cross party opposition to the NuLabour Compulsory Biometric ID Card and National Identity Register centralised database.

Gary McKinnon is facing extradition to the USA under the controversial Extradition Act 2003, without any prima facie evidence or charges brought against him in a UK court. Try him here in the UK, under UK law.
Gary McKinnon is facing extradition to the USA under the controversial Extradition Act 2003, without any prima facie evidence or charges brought against him in a UK court. Try him here in the UK, under UK law.

FreeFarid_150.jpg - Kafkaesque extradition of Farid Hilali under the European Arrest Warrant to Spain

Peaceful resistance to the curtailment of our rights to Free Assembly and Free Speech in the SOCPA Designated Area around Parliament Square and beyond

Parliament Protest blog - resistance to the Designated Area restricting peaceful demonstrations or lobbying in the vicinity of Parliament.

Petition to the European Commission and European Parliament against their vague Data Retention plans
Data Retention is No Solution Petition to the European Commission and European Parliament against their vague Data Retention plans.

Save Parliament: Legislative and Regulatory Reform Bill (and other issues)
Save Parliament - Legislative and Regulatory Reform Bill (and other issues)

Open Rights Group

The Big Opt Out Campaign - opt out of having your NHS Care Record medical records and personal details stored insecurely on a massive national centralised database.

Tor - the onion routing network
Tor - the onion routing network - "Tor aims to defend against traffic analysis, a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security. Communications are bounced around a distributed network of servers called onion routers, protecting you from websites that build profiles of your interests, local eavesdroppers that read your data or learn what sites you visit, and even the onion routers themselves."

Tor - the onion routing network
Anonymous Blogging with Wordpress and Tor - useful Guide published by Global Voices Advocacy with step by step software configuration screenshots (updated March 10th 2009).

Amnesty International's campaign

BlogSafer - wiki with multilingual guides to anonymous blogging

NGO in a box - Security Edition privacy and security software tools

Home Office Watch blog, "a single repository of all the shambolic errors and mistakes made by the British Home Office compiled from Parliamentary Questions, news reports, and tip-offs by the Liberal Democrat Home Affairs team."

Reporters Without Borders - Reporters Sans Frontières - campaign for journalists 'and bloggers' freedom in repressive countries and war zones.

Committee to Protect Bloggers - "devoted to the protection of bloggers worldwide with a focus on highlighting the plight of bloggers threatened and imprisoned by their government."

wikileaks_logo_low.jpg - the controversial "uncensorable, anonymous whistleblowing" website based currently in Sweden.

Syndicate this site (XML):

Recent Comments

  • James Hyams: I'm writing a thesis on Public Trust in WikiLeaks, the read more
  • rich kaplan: Hello Wikeleaks vrew. In Turkey , the islamist goverment just read more
  • wikileak: Cryptome have a few more extracts from this book read more
  • wikileak: have now launched their website with some details of read more
  • wikileak: Bahnhof Internet seem to be hosting two Wikileaks servers in read more
  • wikileak: Clay Shirky has posted a rough transcript of Daniel Domscheit-Berg's read more
  • wikileak: @ N - you can still see the "1.2 million read more
  • N: @wikileak - Exactly, these cables are _from_ the United States, read more
  • wikileak: is now displaying this meassage: Coming soon! While we read more

November 2018

Sun Mon Tue Wed Thu Fri Sat
        1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30