forked from nihilist/blog-contributions
Upload files to "servers/anonsensitive"
This commit is contained in:
parent
9b7be7d7fb
commit
b16a91161f
@ -68,12 +68,11 @@
|
|||||||
<div class="row">
|
<div class="row">
|
||||||
<div class="col-lg-8 col-lg-offset-2">
|
<div class="col-lg-8 col-lg-offset-2">
|
||||||
<h2><b>Why anonymity is not enough for sensitive use</b></h2>
|
<h2><b>Why anonymity is not enough for sensitive use</b></h2>
|
||||||
<p>Let’s say Charlie is a whistleblower leaking information about widespread corruption via a popular online forum. To stay anonymous, he makes sure to connect to the site only through Tor and VPN, and uses a burner email address to sign up.</p>
|
<p>Let’s say Charlie is using a popular online forum to leak information about a government agency’s unethical behavior. To stay anonymous, he makes sure to connect to the forum only through Tor & VPN, and uses a burner email address to sign up.</p>
|
||||||
<p>In the foreword to his first leak, he uses one of his favorite personal phrases. To his misfortune, his real-name X account is the only one to ever publicly use that phrase before.</p>
|
|
||||||
<img src="1.png" class="imgRz">
|
<img src="1.png" class="imgRz">
|
||||||
<p><b>The government connects the dots and uses its key disclosure legislation to issue a search warrant for the X user’s hard drives.</b></p>
|
<p>This anonymity was essential, but not a complete savior. Only 10 people originally had access to the leaked information, so <b>the government uses its key disclosure legislation to issue search warrants for all of their personal hard drives.</b></p>
|
||||||
<img src="6.png" class="imgRz">
|
<img src="6.png" class="imgRz">
|
||||||
<p>Thankfully, Charlie needn’t worry: he has set up VeraCrypt’s deniable encryption to separate his personal life from his leaks. <b>He gives the authorities the key to the main volume; they find nothing related to the leaks. The leaker’s use of that particular phrase is deemed a mere coincidence.</b></p>
|
<p>Thankfully, Charlie needn’t worry: he has set up VeraCrypt’s deniable encryption to separate his personal life from his leaks. <b>He gives the authorities the key to the main volume; they find nothing related to the leaks. The government does not know which of the 10 people was the leaker.</b></p>
|
||||||
<img src="5.png" class="imgRz">
|
<img src="5.png" class="imgRz">
|
||||||
</div>
|
</div>
|
||||||
</div><!-- /row -->
|
</div><!-- /row -->
|
||||||
|
Loading…
Reference in New Issue
Block a user