On 07/23/2017 08:55 AM, John Young wrote: > Keep in mind any prominent leak site/dark net is thoroughly compromised, > wittingly or unwittingly upstream, downstream, inside, outside. Not a few > were, continue to be, established and run for that purpose, the rest > evolved > by publicity and notoriety into perfect nodes for capturing leakers, > discovering > networks (Tor a prime example), sending contaminated loads to recipients > eager to receive material for which sources can be denied, or simply > disclosed > to officials through consultation, vetting, ass-covering after > laundering through > amateurishly secure drop boxes > > Reality Winner is merely one among many others gulled into believing > what should be by now unbelievable due to insertion of loggers along > transmission paths from suppressed leakers to highly advertised, > incessantly bragging, outlets who never admit to being de facto > honey pots. > > Outlets all too readily check with officials authenticity of material to > protect > themselves from being duped, burned, tricked by a range of parties out to > disrupt the ancient practice of deception by "unauthorized" disclosure. > Above all they aim to protect their financial stability, assured by > government > regulation, from attack. > > The bind leaks/secrets suffer from is converting from unknown by the > public to known by the public. Far too much leaked is tampered with > in the inevitably failure-proned process. Far too much leaked is based > on blind faith in the inevitable insecurity of transfer from source to > outlet. > > WikiLeaks has become the global leader in deception about leaks > and the vulnerability leak sites and news outlets pose to leakers. > Privileges of journalists in avoiding culpabililty is the fly in the > ointment. > As WikiLeaks reinvented itself as a journalistic operation to protect > itself, it adopted the practices of government-bestowed-and-protected > organizations, and in the process accepted self-serving corruption as > inherent, indeed, essential, to survival. > > No need to have a formal relationship with authorities to betray and > harm leakers, merely operate a highly publicized, promoted, bragging > of security and transparency, albeit secret about itself, leak site, > a watering hole in the desert for thirsty prey to seek. > > Not too soon to forego the nightmare of secure leak outlets. > > > >> - Make sure that AT LEAST ONE of the people you leak to >> simultaneously, know how to get your leak to Wikileaks and the dark >> net, so that your leak persists in the case that you are >> posth-leakishly murdered! > > >
Correct me if i am wrong, but my understanding is that Reality Winner essentially exposed her own activities by contacting the intercept using a NSA controlled and monitored network. She was one of a very few who printed out the document and then mailed a document with a barium meal to the intercept. The intercept verified the doc to the gov and they tracked Winner with the barium meal. I don't think the gov even needed to compromise networks or sites to catch her. -- Marina
signature.asc
Description: OpenPGP digital signature