Greetings, p2p-hacker folks,

This list seems to be the most direct spiritual successor to the 
cypherpunks list, which is where I'd want to raise this issue if it still 
existed.

As most of you are undoubtedly aware, the sudden surge in attention 
Wikileaks has gained in the last months have resulted in at least half a 
dozen imitation "leaks" sites -- from OpenLeaks, founded by former 
Wikileaks staff who have different ideas on how such a site should 
operate, to regional whistle-blower and transparency sites such as 
Brusselsleaks, Balkanleaks, Pirateleaks.cz, etc.

Let me first state I think that this is absolutely a good thing -- in 
principle. Relying on a single initiative such as Wikileaks both gives way 
too much power to the organization in question, and makes it a 
high-profile target. The rise of independant leak publishers decentralizes 
the fundamental service these sites provide, and brings attention back to 
the content of their publications rather than the personalities of the 
individuals involved.

It's also problematic for a number of reasons: firstly, reputation. Who is 
BrusselsLeaks? Why should a whistleblower trust that the operators of that 
site have his/her interests in mind? What's to say they're not an 
initiative of an intelligence agency? I'm not sure there's anything to be 
done about that, except wait and let these other players earn their own 
reputation capital.

However, it's painfully clear to me that a number of these sites don't 
have the first clue when it comes to technological measures they should be 
taking to protect their sources. E.g., BrusselsLeaks is running their 
operation with Wordpress and Hushmail -- hardly a hardened solution.

Wikileaks has had four years and the input of top network security 
experts, cryptographers, p2p-hackers, and cypherpunks, to create a system 
hardened against predictable threats. It's quite likely that had Bradley 
Manning not made the mistake of "confessing" to a government snitch posing 
as a journalist, he'd not be in jail today. Wikileaks, according to what I 
can gather from press reports and comments from people involved, as well 
as examining their site, relies on a Tor Hidden Service setup for 
receiving submissions. That alone is hardly enough to protect the site 
from attacks on the anonymity of its sources, the integrity and security 
of its site, or its network presense, but already requires a level of 
technical sophistication that is lacking in most of these "copy-cat" 
sites.

I'd like to see us come up with an easy-to-deploy solution for launching a 
leaks site with the security considerations addressed, perhaps in the form 
of a "soft appliance" distribution, but first we need a basic requirements 
document. What are the technical security requirements of such a service?

Off the top of my head, I think we can divide this into three parts:

1. General site security. The website/servers need to be resistant to 
compromise, and also need to be prepared for the same. The credibility of 
Wikileaks would be severely damaged if an attacker were able to, for 
example, introduce fake diplomatic cables to the cache of documents 
waiting to be released, so that the Wikileaks staff inadvertantly 
published false information. So in addition to protecting against 
breakins, the system needs to be designed to maintain data integrity in 
the face of compromise.

2. Source protection. The site needs to provide a means for whistleblowers 
to contact the site operators, discuss issues, and submit documents in an 
anonymous manner. Wikileaks solves this with Tor, though there might be 
other ways. We need a clearly defined threat model to build against, and 
must keep in mind that usability is a security concern -- we have to 
assume that the whistleblowers are not geeks, and the site operators may 
not be, either.

3. Censorship resistance. If 2. brings to mind Tor, 3. brings to mind the 
Eternity Service. In this model, the publisher does not need to be 
anonymous, but the data needs to be authenticated and the service 
distributed. The CouchDB-based mirrors of the Afghanistan War Diaries 
provide a promising first-attempt; to be successful, these sites need to 
be able to leverage jurisdictional arbitrage and distributed hosting to 
resist network denial of service attacks and legal attacks aimed at 
taking their sites offline, as well as data corruption attacks aimed at 
invalidating the material by attacking its credibility with the 
introduction of false documents, etc.

3.a. would be a way for third-parties to obtain the material provided by 
these services in an anonymous fashion; I see this as lower priority than 
the other issues, but still something to think about.

My goal here is to develop a formal, realistic model for the operation of 
a legitimate journalistic whistle-blower material clearinghouse. I'm 
basically proposing we replicate in public, with peer-review, the process 
I assume Wikileaks itself has undergone for the design of their system. 
Let's identify the likely attacks and attack vectors for given 
adversaries, compose a solution based on available technology, and 
assemble it in as easily deployable a manner as possible.

Who else is interested? Let's get this discussion rolling.


Best,

Len
_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to