top | item 5838258

(no title)

irrationalidiom | 12 years ago

This advice is dangerous, because the author fails to mention other precautions the user can and should take, such as:

* Use a Linux live CD on the "burner laptop" -- don't trust the preinstalled OS

* Change the MAC address of the Wifi used to connect at the internet cafe

* Use Tor, most easily via the Vidalia browser bundle

The author also does not mention that leaking documents can expose the whistleblower via watermarking and user information embedded in the file (most infamously in MS Word documents with versioning).

Edit: update formatting

discuss

order

DanBC|12 years ago

> Use a Linux live CD on the "burner laptop" -- don't trust the preinstalled OS

Tails is a Linux distribution aimed at privacy and anonymity.

(https://tails.boum.org/)

adlpz|12 years ago

I know I'm being paranoid, but I feel uneasy using a privacy-aimed distribution for privacy. The whole obvious target thing.

wslh|12 years ago

Buy a long-range WiFi antenna and connect from a distant location instead of going to an Internet cafe where you can be recorded by a lot of cameras in the way.

Swannie|12 years ago

This! Who cares if the laptop is a "burner" if you were caught on Starbucks cameras opening a laptop minutes before the communication was sent, in a place you'd never normally go?

Or parking up and walking past the bank next to the coffeeshop a few more minutes before entering the coffeeshop?

You have to be even more paranoid if you are on a short list of people with access to the information - they will pull up all of your movements, possibly check traffic cameras for your care movements, etc.

Long range Wi Fi just makes so much more sense.

smackfu|12 years ago

Fears of watermarking is probably why the leaked documents are what they are. A court order and a training slide deck are the kind of thing that people are authorized to distribute internally.

sitkack|12 years ago

Which is why you need a co-leaker. Dangerous yes, but you can at least compare documents between each other. Extract the text, strip the UTF down to ascii and fix the whitespace...

Hell, even have it transcribed by a typist. Full air-gap. This whole leaking business needs to be turned into an SEO optimized translated wiki page.

hawleyal|12 years ago

Agreed. The author obviously knows little about opsec.

AdrianRossouw|12 years ago

you can get distros for the raspberry pi that hack wifi networks these days.