Hacker News new | past | comments | ask | show | jobs | submit login

When you're up against the US government with all of their cracking hardware, your passphrase won't be simple.



Unless the insurance files are bluffs, you may as well give the US government the keys yourself so that they know you are not bluffing.

The threat that makes the insurance files work is that the public/press and/or foreign governments may get the keys.


The problem with doing that is that the US government might release the information themselves, just dampened a bit with some PR, so the insurance files aren't worth anything and so WikiLeaks don't get the credit.


I'm not sure WikiLeaks would find that to be a problem. Isn't the whole goal to eventually convince governments to release things themselves?


Which would generally imply that they're not very good insurance files.

I had the last one for a bit, and deleted it just now because I'm seriously doubtful these things are anything more then /dev/urandom piped into a file.


What gives you any indication of that? There's no way of telling a ciphertext from random bytes.


Well, obviously, there's no way of telling or he'd simply crack the file and say it was random.

His point is based more on softer considerations like "they never used the previous insurance file yet, have they?" and "Wikileaks pulls a lot of stunts" and "this is just the sort of thing that would appeal to a cryptogeek like Assange whose avowed purpose is to throw sand into the gears of secretive organizations" and "so how did they get 300GB+ of leaked stuff since the site has been half-inactive for years and Assange completely distracted by his legal issues? Who would trust them with it? eg. Snowden didn't go to Wikileaks".


If these ever did get released and were damaging, the media/propaganda machines around the targeted governments would be doing dampening/PR anyway. So if that can largely stop the damage, they certainly wouldn't be any good as insurance, whoever releases them.


Under most circumstances I imagine I would want my opponent to be uncertain of what I have. Letting them know the contents gives them the ability to accurately assess damages and prepare responses.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: