On Thu, 23 Dec 2010, Len Sassaman wrote:

<SNIP>
> > Corruption of the leaks via injection of false documents seems an
> > orthogonal problem, and I'm not sure how you'd automate that.
> 
<SNIP>
> One thought I should mention: on the submission side, it would be very 
> nice to have a built-in metadata stripper either as part of the submission 
> process, or as part of the publication process. Where you put it depends 
> on whether you want the leaksite operators to have access to potential 
> metadata or not; arguments can be made either way. 

Metadata can be (but will not be in all cases) an important data point in 
the discussion of a submission.  Restated, whether a leak is likely real 
or fake may be decided by some of this metadata, so it should be made 
available (when it *is* available, ie, not anonymized from the get-go) to 
the project reviewers, and only stripped if publication is selected.  For 
instance, let's say you get a the cablegate leaks from each of the 
following two sources:

        bmann...@schmuck.airforce.gov
        bamnn...@schmuck.coxcable.com

Which one would you have a higher level of trust in wrt the leaks being 
real? While the email address doesn't say anything by itself, it can be an 
important data point in the big picture.

//Alif

-- 
"Never belong to any party, always oppose privileged classes and public
plunderers, never lack sympathy with the poor, always remain devoted to
the public welfare, never be satisfied with merely printing news, always
be drastically independent, never be afraid to attack wrong, whether by
predatory plutocracy or predatory poverty."

Joseph Pulitzer, 1907 Speech
_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to