{"id":84,"date":"2012-10-25T22:09:22","date_gmt":"2012-10-26T05:09:22","guid":{"rendered":"http:\/\/blogs.scu.edu\/mlstinson\/?p=84"},"modified":"2012-10-25T22:15:01","modified_gmt":"2012-10-26T05:15:01","slug":"information-leaks","status":"publish","type":"post","link":"https:\/\/blogs.scu.edu\/mlstinson\/2012\/10\/25\/information-leaks\/","title":{"rendered":"Information Leaks"},"content":{"rendered":"<p>Andy Greenberg is a writer for Forbes, who frequently reports on technology, privacy and<\/p>\n<div id=\"attachment_85\" style=\"width: 250px\" class=\"wp-caption alignright\"><a href=\"http:\/\/blogs.scu.edu\/mlstinson\/files\/2012\/10\/Greenberg_A.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-85\" class=\"size-full wp-image-85\" src=\"http:\/\/blogs.scu.edu\/mlstinson\/files\/2012\/10\/Greenberg_A.jpg\" alt=\"\" width=\"240\" height=\"315\" srcset=\"https:\/\/blogs.scu.edu\/mlstinson\/files\/2012\/10\/Greenberg_A.jpg 240w, https:\/\/blogs.scu.edu\/mlstinson\/files\/2012\/10\/Greenberg_A-228x300.jpg 228w\" sizes=\"auto, (max-width: 240px) 100vw, 240px\" \/><\/a><p id=\"caption-attachment-85\" class=\"wp-caption-text\">Andy Greenberg. Source: Tantor Audio Audiobooks<\/p><\/div>\n<p>information security. Greenberg just recently wrote the book <em>\u201c<a href=\"http:\/\/www.thismachinekillssecrets.com\/\" target=\"_blank\">This Machine Kills Secrets\u201d,<\/a><\/em> which explains the history and future of information leaks. Technology has grown so rapidly in the past few decades, making it easier for hackers to release the leaked information. But in response, governments and corporations have increased network security, making it harder for hackers to obtain the information in the first place. \u00a0In his book, Greenberg aims to explain the ideas behind information leaks and the debates about privacy and civil liberties hacking and the subsequent information the leaks have sparked. In a <a href=\"http:\/\/www.wired.com\/threatlevel\/2012\/09\/this-machine-kills-secrets\/4\/\" target=\"_blank\">section<\/a> of the book, Greenberg discusses the shortcomings of Julian Assange\u2019s Wikileaks and how it has inspired a new project called, OpenLeaks.<\/p>\n<p>The excerpt starts with Greenberg arriving in East Germany at the Chaos Communication<\/p>\n<div id=\"attachment_86\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"http:\/\/blogs.scu.edu\/mlstinson\/files\/2012\/10\/privacy-trusts-1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-86\" class=\"size-medium wp-image-86\" src=\"http:\/\/blogs.scu.edu\/mlstinson\/files\/2012\/10\/privacy-trusts-1-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/blogs.scu.edu\/mlstinson\/files\/2012\/10\/privacy-trusts-1-300x200.jpg 300w, https:\/\/blogs.scu.edu\/mlstinson\/files\/2012\/10\/privacy-trusts-1.jpg 400w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-86\" class=\"wp-caption-text\">Hackers at the Chaos Communication Camp. Source: How Things Work Website.<\/p><\/div>\n<p>Camp (CCC), where hackers from all over the world have gathered for a conference and the launch of Wikileaks spin-off, OpenLeaks. Daniel Domscheit-Berg, who left Wikileaks in September 2010 and was Assange\u2019s former right hand man, tried to launch his own version of information leaks in January 2011. Greenberg explains OpenLeaks as,<\/p>\n<p>&nbsp;<\/p>\n<blockquote><p>\u201cOpenLeaks isn\u2019t designed to actually make anything public. Instead, it aims to securely pass on leaked content to partnered media organizations and nonprofits, avoiding the dicey role of publisher that got WikiLeaks into so much trouble. It will focus, Domscheit- Berg says, on the most technically tricky and crucial link in the leaking chain: untraceable anonymous uploads.\u201d<\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<p>The first launch of OpenLeaks is to ensure the security of the website cannot be breached by intelligence agencies, which will be tested by the many hackers at the camp. However, the launch is ultimately a failure because the site cannot get online. This makes the hackers question Domscheit-Berg and the organization\u2019s legitimacy. I found this excerpt extremely interesting. Greenberg does a good job of explaining the complicated technology behind a site such as OpenLeaks or Wikileaks, as giving an insight into the people behind that technology, and how and why it was developed. This reading gave me a better idea of what Wikileaks was all about. However, it seems to me that the competition between Assange and Domscheit-Berg is the driving force behind the creation of these new information leaking websites, rather than their initial goal of providing the world with information and fighting for their beliefs.<\/p>\n<p>A video explaining the basic idea of OpenLeaks:<\/p>\n<p>httpv:\/\/www.youtube.com\/watch?v=jlae6aqNSIE<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Andy Greenberg is a writer for Forbes, who frequently reports on technology, privacy and information security. Greenberg just recently wrote the book \u201cThis Machine Kills Secrets\u201d, which explains the history and future of information leaks. Technology has grown so rapidly &hellip; <a href=\"https:\/\/blogs.scu.edu\/mlstinson\/2012\/10\/25\/information-leaks\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":305,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"qubely_global_settings":"","qubely_interactions":"","kk_blocks_editor_width":"","_kiokenblocks_attr":"","_kiokenblocks_dimensions":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-84","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"gutentor_comment":1,"qubely_featured_image_url":null,"qubely_author":{"display_name":"mlstinson","author_link":"https:\/\/blogs.scu.edu\/mlstinson\/author\/mlstinson\/"},"qubely_comment":1,"qubely_category":"<a href=\"https:\/\/blogs.scu.edu\/mlstinson\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","qubely_excerpt":"Andy Greenberg is a writer for Forbes, who frequently reports on technology, privacy and information security. Greenberg just recently wrote the book \u201cThis Machine Kills Secrets\u201d, which explains the history and future of information leaks. Technology has grown so rapidly &hellip; Continue reading &rarr;","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/blogs.scu.edu\/mlstinson\/wp-json\/wp\/v2\/posts\/84","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.scu.edu\/mlstinson\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.scu.edu\/mlstinson\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.scu.edu\/mlstinson\/wp-json\/wp\/v2\/users\/305"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.scu.edu\/mlstinson\/wp-json\/wp\/v2\/comments?post=84"}],"version-history":[{"count":4,"href":"https:\/\/blogs.scu.edu\/mlstinson\/wp-json\/wp\/v2\/posts\/84\/revisions"}],"predecessor-version":[{"id":89,"href":"https:\/\/blogs.scu.edu\/mlstinson\/wp-json\/wp\/v2\/posts\/84\/revisions\/89"}],"wp:attachment":[{"href":"https:\/\/blogs.scu.edu\/mlstinson\/wp-json\/wp\/v2\/media?parent=84"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.scu.edu\/mlstinson\/wp-json\/wp\/v2\/categories?post=84"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.scu.edu\/mlstinson\/wp-json\/wp\/v2\/tags?post=84"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}