Hacker News new | past | comments | ask | show | jobs | submit | elcct's comments login

One could use Bitmessage for leaks - just create a channel and let people publish data to it.

https://bitmessage.org/wiki/Main_Page


Came here to say this. You could just publish to the general chan. However, bitmessage is no good for distributing data. It would be good for distributing how to get that data (torrent magnet, mega.nz link, encryption key, etc).


Alice has created a file containing random data. Authorities think it is an encrypted volume and wants Alice to give up the key. Alice has no way to prove it is just a file with random data and is imprisoned indefinitely for essentially having a file with random data =]


Mallory has created a file containing random data and planted it on Alice's drive. Then Mallory phones in an anonymous tip to the police...


Nice, even in times of Stalinistic oppression things weren't as easy...


So typing the simple command

    cat /dev/random > filename 
can actually get you imprisoned. Good to know.


Alice is able to switch the tracks on a trolley hurtling towards the encrypted only copy of the rest of her key towards a track where Clive, the only person who knows the key to that secondary encryption, is tied...


Interesting thought experiment, but ultimately flawed. For this to make any sense, you first need to answer a question: Why are the authorities looking at Alice's computer in the first place?

Also, it's extrapolating a lot from a case that's actually a fair bit less sinister than what you're suggestion. Facts of this particular case here are that:

  1. The guy was a suspect to begin with, and they had
     enough evidence of him doing something wrong (from
     the Usenet side of the operation) that they got a
     warrant to search his computer.
  2. The disks are encrypted with off-the-shelf OS-provided
     full-disk encryption, which is relatively easy to verify,
     rather than some "purely random data that might or might
     not be encrypted".
  3. At no point has he denied having access to the keys (at
     which point it would essentially stop being a 5th amendment
     case).
Now, I'm actually of the opinion that he should _not_ have to decrypt those disks, but that's strictly a fifth amendment thing, rather than the more convoluted scenario you're suggesting.


Smoking a joint isn't illegal. Possession without licence is.


Seems to be you'd have to possess the joint before smoking it.


Would be awesome if one day one could use GPU and USB with Windows Subsystem for Linux


Can that work over X11, or is X11 OpenGL not network-transparent?


I was thinking about using things like TensorFlow or tools for Arduino


IBM stuck in the 90s. What a retarded idea.


> retarded

Hey. Hey.


Why tracker? You can find most stuff using Google and various file sharing services.


I was having a hell of a time finding ebooks for my wife just googling for it. I had to download IRC. Total blast from the past. I learned how to do it, but it took a while.


Once whole population has been disarmed that is the only weapon...


> Don't stay on as an advisor unless it's something you really love

Well, he shouldn't stay especially if this is something he loves.


^ This. If you're good at something, never do it for free.


> (and very expensive too).

It is expensive because of its legal situation. Cannabis is essentially weed and is very easy to grow, thus if not for the law, it is actually very cheap.


But you assume only one stream will be played at a time which is unlikely.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: