forked from nihilist/blog-contributions
Upload files to "servers/anonsensitive"
This commit is contained in:
parent
3323af5d9e
commit
9b7be7d7fb
BIN
servers/anonsensitive/1.png
Normal file
BIN
servers/anonsensitive/1.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 125 KiB |
BIN
servers/anonsensitive/6.png
Normal file
BIN
servers/anonsensitive/6.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 388 KiB |
@ -19,13 +19,6 @@
|
||||
<!-- Custom styles for this template -->
|
||||
<link href="../../assets/css/main.css" rel="stylesheet">
|
||||
|
||||
|
||||
|
||||
<!-- HTML5 shim and Respond.js IE8 support of HTML5 elements and media queries -->
|
||||
<!--[if lt IE 9]>
|
||||
<script src="https://oss.maxcdn.com/libs/html5shiv/3.7.0/html5shiv.js"></script>
|
||||
<script src="https://oss.maxcdn.com/libs/respond.js/1.3.0/respond.min.js"></script>
|
||||
<![endif]-->
|
||||
</head>
|
||||
|
||||
<body>
|
||||
@ -75,10 +68,13 @@
|
||||
<div class="row">
|
||||
<div class="col-lg-8 col-lg-offset-2">
|
||||
<h2><b>Why anonymity is not enough for sensitive use</b></h2>
|
||||
<p>Let’s say Charlie is running a popular online platform with total free speech. To avoid being held liable for the content published on it, he makes sure to always be anonymous and private by using only open-source software and connecting to the site only through Tor and VPN.</p>
|
||||
<p>One day Charlie posts a link to a scientific paper from his anonymous “Founder” account on the platform. His followers see an uncanny similarity in the language used by the paper’s authors with the founder’s anonymous account. <b>The government uses its key disclosure legislation to issue search warrants for the authors’ hard drives.</b></p>
|
||||
<p>Let’s say Charlie is a whistleblower leaking information about widespread corruption via a popular online forum. To stay anonymous, he makes sure to connect to the site only through Tor and VPN, and uses a burner email address to sign up.</p>
|
||||
<p>In the foreword to his first leak, he uses one of his favorite personal phrases. To his misfortune, his real-name X account is the only one to ever publicly use that phrase before.</p>
|
||||
<img src="1.png" class="imgRz">
|
||||
<p><b>The government connects the dots and uses its key disclosure legislation to issue a search warrant for the X user’s hard drives.</b></p>
|
||||
<img src="6.png" class="imgRz">
|
||||
<p>Thankfully, Charlie needn’t worry: he has set up VeraCrypt’s deniable encryption to separate his personal life from his leaks. <b>He gives the authorities the key to the main volume; they find nothing related to the leaks. The leaker’s use of that particular phrase is deemed a mere coincidence.</b></p>
|
||||
<img src="5.png" class="imgRz">
|
||||
<p>Thankfully, Charlie needn’t worry: he has set up VeraCrypt’s deniable encryption to divide his personal and scientific life from the website he’s running. <b>He gives the authorities the key to the main volume; there are no further questions.</b></p>
|
||||
</div>
|
||||
</div><!-- /row -->
|
||||
</div> <!-- /container -->
|
||||
|
Loading…
Reference in New Issue
Block a user