Wikileaks - как запускали проект
Dec. 27th, 2010 01:39 amОказывается, имя себе сайт сделал на прямом воровстве, а не на сливах - т.е. фактически на хакерстве, а точнее на хакерских связях. И вот каким образом конкретно:
JUNE 1, 2010 - «WikiLeaks, the controversial whistleblowing site that exposes secrets of governments and corporations, bootstrapped itself with a cache of documents obtained through an internet eavesdropping operation by one of its activists, according to a new profile of the organization’s founder.
The activist siphoned more than a million documents as they traveled across the internet through Tor, also known as “The Onion Router,” a sophisticated privacy tool that lets users navigate and send documents through the internet anonymously.
The siphoned documents, supposedly stolen by Chinese hackers or spies who were using the Tor network to transmit the data, were the basis for WikiLeaks founder Julian Assange’s assertion in 2006 that his organization had already “received over one million documents from 13 countries” before his site was launched, according to the article in The New Yorker.
Only a small portion of those intercepted documents were ever posted on WikiLeaks, but the new report is the first indication that some of the data and documents on WikiLeaks did not come from sources who intended for the documents to be seen or posted. It also explains an enduring mystery of WikiLeaks’ launch: how the organization was able to amass a collection of secret documents before its website was open for business.
Tor is a sophisticated privacy tool endorsed by the Electronic Frontier Foundation and other civil liberties groups as a method for whistleblowers and human rights workers to communicate with journalists, among other uses. In its search for government and corporate secrets traveling through the Tor network, it’s conceivable that WikiLeaks may have also vacuumed up sensitive information from human rights workers who did not want their data seen by outsiders. (...)»
*
Как именно они провернули эту аферу (т.е. обломали тор) - это важно для понимания роли тесной хакерской тусовки во всем этом деле:
«WikiLeaks uses a modified version of the Tor network for its own operations, moving document submissions through it to keep them private. WikiLeaks computers also reportedly feed “hundreds of thousands of fake submissions through these tunnels, obscuring the real documents,” according to The New Yorker.
The intercepted data was gathered from Tor sometime before or around December 2006, when Assange and fellow activists needed a substantial number of documents in their repository in order to be taken seriously as a viable tool for whistleblowers and others.
The solution came from one of the activists associated with the organization who owned and operated a server that was being used in the Tor anonymizing network. Tor works by using servers donated by volunteers around the world to bounce traffic around, en route to its destination. Traffic is encrypted through most of that route, and routed over a random path each time a person uses it.
Under Tor’s architecture, administrators at the entry point can identify the user’s IP address, but can’t read the content of the user’s correspondence or know its final destination. Each node in the network thereafter only knows the node from which it received the traffic, and it peels off a layer of encryption to reveal the next node to which it must forward the connection.
By necessity, however, the last node through which traffic passes has to decrypt the communication before delivering it to its final destination. Someone operating that exit node can therefore read the traffic passing through this server.»
------
Т.е. это история про те самые документы китайского правительства, которые Викиликс якобы имел на руках, но так и не опубликовал (речь идет о китайских шпионах, ворующих международную инфу для своего правительства). Скорее всего п.ч. просто спер их из эфира, а не получил от некоего источника в виде принципиального слива. Мутноватая, но довольно интересная история. Исходная статья в Нью-Йоркере написана несколько витиевато, но инфа именно оттуда.
*
Первый "слив" опубликованный на Wikileaks.org 29-12-2006:
Inside the Somali Civil War and the Islamic Courts (оригинал в зипе)
УПД. Викиликс, оказывается, опроверг эту инфу. Статьи с упоминаниями опровержений:
http://ryansholin.com/2010/05/31/wikileaks-and-tor-moral-use-of-an-amoral-system/
https://blog.torproject.org/blog/plaintext-over-tor-still-plaintext
http://www.theregister.co.uk/2010/06/02/wikileaks_tor_snooping_denial/
http://twitter.com/wikileaks/status/15220072701
http://yro.slashdot.org/story/10/06/01/2334237/Wikileaks-Was-Launched-With-Intercepts-From-Tor
JUNE 1, 2010 - «WikiLeaks, the controversial whistleblowing site that exposes secrets of governments and corporations, bootstrapped itself with a cache of documents obtained through an internet eavesdropping operation by one of its activists, according to a new profile of the organization’s founder.
The activist siphoned more than a million documents as they traveled across the internet through Tor, also known as “The Onion Router,” a sophisticated privacy tool that lets users navigate and send documents through the internet anonymously.
The siphoned documents, supposedly stolen by Chinese hackers or spies who were using the Tor network to transmit the data, were the basis for WikiLeaks founder Julian Assange’s assertion in 2006 that his organization had already “received over one million documents from 13 countries” before his site was launched, according to the article in The New Yorker.
Only a small portion of those intercepted documents were ever posted on WikiLeaks, but the new report is the first indication that some of the data and documents on WikiLeaks did not come from sources who intended for the documents to be seen or posted. It also explains an enduring mystery of WikiLeaks’ launch: how the organization was able to amass a collection of secret documents before its website was open for business.
Tor is a sophisticated privacy tool endorsed by the Electronic Frontier Foundation and other civil liberties groups as a method for whistleblowers and human rights workers to communicate with journalists, among other uses. In its search for government and corporate secrets traveling through the Tor network, it’s conceivable that WikiLeaks may have also vacuumed up sensitive information from human rights workers who did not want their data seen by outsiders. (...)»
*
Как именно они провернули эту аферу (т.е. обломали тор) - это важно для понимания роли тесной хакерской тусовки во всем этом деле:
«WikiLeaks uses a modified version of the Tor network for its own operations, moving document submissions through it to keep them private. WikiLeaks computers also reportedly feed “hundreds of thousands of fake submissions through these tunnels, obscuring the real documents,” according to The New Yorker.
The intercepted data was gathered from Tor sometime before or around December 2006, when Assange and fellow activists needed a substantial number of documents in their repository in order to be taken seriously as a viable tool for whistleblowers and others.
The solution came from one of the activists associated with the organization who owned and operated a server that was being used in the Tor anonymizing network. Tor works by using servers donated by volunteers around the world to bounce traffic around, en route to its destination. Traffic is encrypted through most of that route, and routed over a random path each time a person uses it.
Under Tor’s architecture, administrators at the entry point can identify the user’s IP address, but can’t read the content of the user’s correspondence or know its final destination. Each node in the network thereafter only knows the node from which it received the traffic, and it peels off a layer of encryption to reveal the next node to which it must forward the connection.
By necessity, however, the last node through which traffic passes has to decrypt the communication before delivering it to its final destination. Someone operating that exit node can therefore read the traffic passing through this server.»
------
Т.е. это история про те самые документы китайского правительства, которые Викиликс якобы имел на руках, но так и не опубликовал (речь идет о китайских шпионах, ворующих международную инфу для своего правительства). Скорее всего п.ч. просто спер их из эфира, а не получил от некоего источника в виде принципиального слива. Мутноватая, но довольно интересная история. Исходная статья в Нью-Йоркере написана несколько витиевато, но инфа именно оттуда.
*
Первый "слив" опубликованный на Wikileaks.org 29-12-2006:
Inside the Somali Civil War and the Islamic Courts (оригинал в зипе)
УПД. Викиликс, оказывается, опроверг эту инфу. Статьи с упоминаниями опровержений:
http://ryansholin.com/2010/05/31/wikileaks-and-tor-moral-use-of-an-amoral-system/
https://blog.torproject.org/blog/plaintext-over-tor-still-plaintext
http://www.theregister.co.uk/2010/06/02/wikileaks_tor_snooping_denial/
http://twitter.com/wikileaks/status/15220072701
http://yro.slashdot.org/story/10/06/01/2334237/Wikileaks-Was-Launched-With-Intercepts-From-Tor