Upload files to "servers/anonsensitive"

This commit is contained in:
Robert 2024-08-07 09:54:25 +02:00
parent 3323af5d9e
commit 9b7be7d7fb
3 changed files with 7 additions and 11 deletions

BIN
servers/anonsensitive/1.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 125 KiB

BIN
servers/anonsensitive/6.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 388 KiB

View File

@ -19,13 +19,6 @@
<!-- Custom styles for this template --> <!-- Custom styles for this template -->
<link href="../../assets/css/main.css" rel="stylesheet"> <link href="../../assets/css/main.css" rel="stylesheet">
<!-- HTML5 shim and Respond.js IE8 support of HTML5 elements and media queries -->
<!--[if lt IE 9]>
<script src="https://oss.maxcdn.com/libs/html5shiv/3.7.0/html5shiv.js"></script>
<script src="https://oss.maxcdn.com/libs/respond.js/1.3.0/respond.min.js"></script>
<![endif]-->
</head> </head>
<body> <body>
@ -75,10 +68,13 @@
<div class="row"> <div class="row">
<div class="col-lg-8 col-lg-offset-2"> <div class="col-lg-8 col-lg-offset-2">
<h2><b>Why anonymity is not enough for sensitive use</b></h2> <h2><b>Why anonymity is not enough for sensitive use</b></h2>
<p>Lets say Charlie is running a popular online platform with total free speech. To avoid being held liable for the content published on it, he makes sure to always be anonymous and private by using only open-source software and connecting to the site only through Tor and VPN.</p> <p>Lets say Charlie is a whistleblower leaking information about widespread corruption via a popular online forum. To stay anonymous, he makes sure to connect to the site only through Tor and VPN, and uses a burner email address to sign up.</p>
<p>One day Charlie posts a link to a scientific paper from his anonymous “Founder” account on the platform. His followers see an uncanny similarity in the language used by the papers authors with the founders anonymous account. <b>The government uses its key disclosure legislation to issue search warrants for the authors hard drives.</b></p> <p>In the foreword to his first leak, he uses one of his favorite personal phrases. To his misfortune, his real-name X account is the only one to ever publicly use that phrase before.</p>
<img src="1.png" class="imgRz">
<p><b>The government connects the dots and uses its key disclosure legislation to issue a search warrant for the X users hard drives.</b></p>
<img src="6.png" class="imgRz">
<p>Thankfully, Charlie neednt worry: he has set up VeraCrypts deniable encryption to separate his personal life from his leaks. <b>He gives the authorities the key to the main volume; they find nothing related to the leaks. The leakers use of that particular phrase is deemed a mere coincidence.</b></p>
<img src="5.png" class="imgRz"> <img src="5.png" class="imgRz">
<p>Thankfully, Charlie neednt worry: he has set up VeraCrypts deniable encryption to divide his personal and scientific life from the website hes running. <b>He gives the authorities the key to the main volume; there are no further questions.</b></p>
</div> </div>
</div><!-- /row --> </div><!-- /row -->
</div> <!-- /container --> </div> <!-- /container -->