{"id":82,"date":"2012-10-24T22:38:31","date_gmt":"2012-10-25T05:38:31","guid":{"rendered":"http:\/\/blogs.scu.edu\/ajepsen\/?p=82"},"modified":"2012-10-24T22:38:44","modified_gmt":"2012-10-25T05:38:44","slug":"dont-get-caught","status":"publish","type":"post","link":"https:\/\/blogs.scu.edu\/ajepsen\/2012\/10\/24\/dont-get-caught\/","title":{"rendered":"Don&#8217;t Get Caught"},"content":{"rendered":"<p>According to his own Twitter account, <a href=\"https:\/\/twitter.com\/a_greenberg\">Andy Greenberg<\/a> is a happily married tech reporter for Forbes , focusing on technology, information security, and digital civil liberties and the author of This <a href=\"http:\/\/www.thismachinekillssecrets.com\/\">Machine Kills Secrets<\/a>: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World\u2019s Information.<\/p>\n<div id=\"attachment_84\" style=\"width: 200px\" class=\"wp-caption alignleft\"><a href=\"http:\/\/blogs.scu.edu\/ajepsen\/files\/2012\/10\/this-machine-kills-secrets-cover1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-84\" class=\"size-medium wp-image-84\" src=\"http:\/\/blogs.scu.edu\/ajepsen\/files\/2012\/10\/this-machine-kills-secrets-cover1-190x300.png\" alt=\"\" width=\"190\" height=\"300\" srcset=\"https:\/\/blogs.scu.edu\/ajepsen\/files\/2012\/10\/this-machine-kills-secrets-cover1-190x300.png 190w, https:\/\/blogs.scu.edu\/ajepsen\/files\/2012\/10\/this-machine-kills-secrets-cover1.png 278w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/a><p id=\"caption-attachment-84\" class=\"wp-caption-text\">The Machine Kills Secrets Book Cover. Source: <a href=\"http:\/\/www.thismachinekillssecrets.com\/\">Andy Greenberg<\/a><\/p><\/div>\n<p>This book is a New York Times Book Review Editor\u2019s Choice and is said to be one of the most important books of the decade.<\/p>\n<p><a href=\"http:\/\/www.thefreedictionary.com\/whistle-blowing\">Whistle-blowing<\/a>\u00a0: \u00a0One who reveals wrongdoing within an organization to the public or to those in positions of authority<\/p>\n<p>WikiLeaks revealed a channel of whistle-blowing.\u00a0 This channel included cryptographic codes to hide leakers\u2019 identities while they disclose the private data of government agencies and corporations.\u00a0 \u201cHacktivists\u201d are aiming their energy to destroy the world\u2019s institutional privacy.<\/p>\n<div id=\"attachment_86\" style=\"width: 160px\" class=\"wp-caption alignright\"><a href=\"http:\/\/blogs.scu.edu\/ajepsen\/files\/2012\/10\/greenberg1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-86\" class=\"size-thumbnail wp-image-86\" src=\"http:\/\/blogs.scu.edu\/ajepsen\/files\/2012\/10\/greenberg1-150x150.jpg\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><p id=\"caption-attachment-86\" class=\"wp-caption-text\">Andy Greenberg. Source: <a href=\"http:\/\/bookcourt.com\/events\/andy-greenberg\">Book Court<\/a><\/p><\/div>\n<p>Andy Greenberg traveled all around the find the next best WikiLeaks.\u00a0 He found himself in Berlin at a Communication Camp for the launch of OpenLeaks (a spinoff WikiLeaks).\u00a0 He has VIP access to codes and characters that are changing what society can consider activism to entail. Domscheit-Berg is the creator of OpenLeaks and a past employee of WikiLeaks.<\/p>\n<p>The difference in OpenLeaks is that it seeks to safely pass on leaked information to media organizations and non-profits, and by pass who publishes it.\u00a0 Basically, to have untraceable anonymous uploads.\u00a0 Tricky.<\/p>\n<blockquote><p>\u00a0\u201cDomscheit-Berg believes he has all the ingredients to build a new WikiLeaks that\u2019s more efficient, more democratically organized, and perhaps most important, more legal. He wants to incorporate as a non-profit, a steadfast, permanent institution that can strike blows for information freedom against the world\u2019s governments and corporations without needing to hide from anyone.\u201d<\/p><\/blockquote>\n<p>This idea that people can whistle-blow anonymously intrigues me.\u00a0 This means that more people would be likely to come forth and provide illegal information that is known out there.\u00a0 What would you do if you knew you would not get pursued legally for revealing withheld information from the public?\u00a0 I bet a lot.<\/p>\n<p>This cryptography is being used to take power away from officials.\u00a0 To protect peoples\u2019 identities while they dump all these hidden documents.\u00a0 If the OpenLeaks finally did get online, then I feel this would be a great opportunity to truly see what is going on behind closed doors.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to his own Twitter account, Andy Greenberg is a happily married tech reporter for Forbes , focusing on technology, information security, and digital civil liberties and the author of This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim &hellip; <a href=\"https:\/\/blogs.scu.edu\/ajepsen\/2012\/10\/24\/dont-get-caught\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":145,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"qubely_global_settings":"","qubely_interactions":"","kk_blocks_editor_width":"","_kiokenblocks_attr":"","_kiokenblocks_dimensions":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-82","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"gutentor_comment":1,"qubely_featured_image_url":null,"qubely_author":{"display_name":"ajepsen","author_link":"https:\/\/blogs.scu.edu\/ajepsen\/author\/ajepsen\/"},"qubely_comment":1,"qubely_category":"<a href=\"https:\/\/blogs.scu.edu\/ajepsen\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","qubely_excerpt":"According to his own Twitter account, Andy Greenberg is a happily married tech reporter for Forbes , focusing on technology, information security, and digital civil liberties and the author of This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim &hellip; Continue reading &rarr;","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/blogs.scu.edu\/ajepsen\/wp-json\/wp\/v2\/posts\/82","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.scu.edu\/ajepsen\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.scu.edu\/ajepsen\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.scu.edu\/ajepsen\/wp-json\/wp\/v2\/users\/145"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.scu.edu\/ajepsen\/wp-json\/wp\/v2\/comments?post=82"}],"version-history":[{"count":2,"href":"https:\/\/blogs.scu.edu\/ajepsen\/wp-json\/wp\/v2\/posts\/82\/revisions"}],"predecessor-version":[{"id":88,"href":"https:\/\/blogs.scu.edu\/ajepsen\/wp-json\/wp\/v2\/posts\/82\/revisions\/88"}],"wp:attachment":[{"href":"https:\/\/blogs.scu.edu\/ajepsen\/wp-json\/wp\/v2\/media?parent=82"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.scu.edu\/ajepsen\/wp-json\/wp\/v2\/categories?post=82"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.scu.edu\/ajepsen\/wp-json\/wp\/v2\/tags?post=82"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}