Escolar Documentos
Profissional Documentos
Cultura Documentos
Security
WikiLeaks provides highest security to the source as well as the source provider.
Sources
Upload to high security anonymous drop box(Cyber-locker/Online Storage) fortified by cutting-edge cryptographic information technologies Send by mail to a postal address Posting CD's in the mail combined with advanced cryptographic technology
Untraceable! !!
Instructions & Advice from WikiLeaks Submit Via net cafes, wireless hot
spots and even the post
Very sensitive sources (those of substantial political or intelligence interest) should be submitted outside home and workplace prevent possible tracing from bugged computers/ hidden video cameras at home
Because: -Too many hidden servers across multiple international jurisdictions swift submission process from different parts of the world
-No logs are kept in the submission system these logs cannot be seized untraceable
Therefore, anonymization occurs early in the WikiLeaks network, long before information passes to the web servers.
NO!!!!
The risks cannot be entirely removed but just being reduced by the strong anonymity system. government may know who had access to a document in the first place. Powerful institutions may use whatever methods to withhold damaging information (e.g. by legal means, political pressure, physical violence).
How can WikiLeaks decide whether the sources and information are authentic?
Source providers: upload the specify the language, country and industry of origin
Is it real? What elements prove it is real? Who would have the motive to fake such a to drop box document document and why?)
WikiLeaks: Obscure the date and time of the upload of the documents distribute the documents to backup servers immediately assess the documents and test their veracity within WikiLeaks or sometimes invite external verification (sometimes seeking help external verifications too)
*The verification process does not guarantee the absence of mistakes, but so far WikiLeaks has correctly identified the veracity of every document it has published.
WikiLeaks provide a way of physical mailing : Sending the documents within a CD/DVD to a celebrity who is voluntary. Public voices will provide a shield for those celebrities so they cant be violently threatened by any body. For this method, WikiLeaks is formulating a easy-to-use encrypting software for leakers and guaranteed not to be seen until it reaches WikiLeaks.
How
FinallyDestination
(reach from a remote node)
Works?
How
Works?
communication paths Original data: encrypted + reencrypted for many times bounced around among thousands of nodes in the network around the world [Before passing the data on to the next node, each node decrypts a layer of encryption]
It has been suggested that when it becomes nonfunctional the encrypted insurance files key will be released the actual machination of releasing the
key is unknown, like a dead mans switch the decrypted files with unreleased secrets will be made available to numerous people instantaneously