{"id":226449,"date":"2024-05-31T09:34:25","date_gmt":"2024-05-31T09:34:25","guid":{"rendered":"https:\/\/michigandigitalnews.com\/index.php\/2024\/05\/31\/whistleblowing-in-the-surveillance-age\/"},"modified":"2025-06-25T17:18:20","modified_gmt":"2025-06-25T17:18:20","slug":"whistleblowing-in-the-surveillance-age","status":"publish","type":"post","link":"https:\/\/michigandigitalnews.com\/index.php\/2024\/05\/31\/whistleblowing-in-the-surveillance-age\/","title":{"rendered":"Whistleblowing In The Surveillance Age"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<p><strong><em>This article is featured in Bitcoin Magazine\u2019s<\/em> <em>\u201cThe Inscription Issue\u201d. Click <\/em><em><a href=\"https:\/\/store.bitcoinmagazine.com\/collections\/magazines\/products\/bitcoin-magazine-annual-subscription\">here<\/a><\/em> to get your Annual Bitcoin Magazine Subscription.<\/strong><\/p>\n<p>Bitcoin allows for the permanent inscribing of data onto the public record. Still, whistleblowing on the blockchain remains a terrible idea.<\/p>\n<p>Leaking information is risky business. If you\u2019ve obtained sensitive information \u2014 particularly if you\u2019re not supposed to be in possession of said information in the first place \u2014 you can\u2019t just send out an email or post it to your Twitter feed. If you did, before you knew it, you\u2019d be tracked, identified, and thrown in jail, while the data you obtained would quickly be deleted. <\/p>\n<p>By inscribing information on the Bitcoin blockchain, the data you\u2019ve obtained cannot be deleted. Just as a Bitcoin transaction is final, so is any information published to the blockchain. Forever there, for anyone in the world to see. But, what sounds like a great plan for leaking information \u2014 call it WikiLeaks 2.0 \u2014 is actually not a very smart idea. <\/p>\n<p>Protecting whistleblowers is of the highest importance to any sophisticated publisher. And it for sure isn\u2019t easy. By publishing data yourself directly to the Bitcoin blockchain, you may miss important data points that could identify you as the source. Readers would further be unable to verify the chain of custody, potentially discrediting your leak. In addition, neither Bitcoin nor the internet are privacy technologies, potentially leading to your identity leaking via various mechanisms to the public.<\/p>\n<h2>Watermarking and Digital Fingerprints<\/h2>\n<p>Many large corporations employ methods to identify sources of leaks, such as analyzing watermarks and digital fingerprints. Watermarking is the act of altering a piece of data to make it uniquely identifiable, while digital fingerprints are derived from information inherent to most forms of digital communication. Both are largely invisible to the human eye. <\/p>\n<p>A popular way of watermarking is the modification of text spacing on documents accessible to employees. Using text spacing to watermark documents was famously employed by Elon Musk at Tesla to identify the individual behind a 2008 email leak, which disclosed that the company only had $9 million in cash on hand. Every email sent out at Tesla has a slightly different text spacing, forming a binary signature to identify the source of a leak. <\/p>\n<p>Another way to watermark documents is via printers. Again, mostly invisible to the naked eye, most printers \u2014 particularly laser printers \u2014 form unique dotted patterns on printed documents in order to identify the printer a document was printed on. <\/p>\n<figure>\n<p>                        <a href=\"https:\/\/store.bitcoinmagazine.com\/collections\/magazines\/products\/bitcoin-magazine-annual-subscription\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/bitcoinmagazine.com\/.image\/c_fit%2Ch_800%2Cw_1200\/MjA0ODM4MjE0MTY5NTM2MDk0\/inscription.jpg\" height=\"791\" width=\"1200\"><\/a><figcaption><em>Click the image above to subscribe!<\/em><\/figcaption><\/figure>\n<p>This was the case for Reality Winner, who leaked classified information on the Russian interference of the 2016 U.S. elections to the U.S. newspaper <em>The Intercept<\/em>. <em>The Intercept<\/em>, financed by eBay founder and friend of U.S. intelligence Pierre Omidyar (dubbed \u201cone of the scariest tech billionaires out there\u201d by journalist Yasha Levine), published Winner\u2019s documents without removing the document\u2019s watermarks, allegedly leading to Winner\u2019s arrest. While watermarking adds identifiable patterns <em>to <\/em>data, fingerprinting deducts identifiable patterns <em>from<\/em> data. For example, JPEG image headers usually contain unique metadata giving indications as to what device an image was taken on, as well as time and location of the image. Fingerprinting may also suggest what platform was used to communicate, as most platforms use differentiating compressor mechanisms to send data. Unless you are aware of all the ways a document can be watermarked and fingerprinted, leaking information yourself is not a good idea. <\/p>\n<h2>Chain Of Custody<\/h2>\n<p>Establishing a chain of custody is important to protect the credibility of leaked information. Simply adding documents to the blockchain will not help journalists verify the integrity of the information you uploaded, leading to your leak likely being discredited.<\/p>\n<p>Chain of custody is important to maintain ethical reporting standards. Just as law enforcement is required to protect chain of custody to ensure evidence has not been altered, journalists are expected to verify any and all information they receive. This is done by establishing where a specific document originated and through how many (and whose) hands it went in the aftermath. Without documentation of how and by whom a document has been handled, journalists can hardly determine whether a leak is genuine or has been tampered with. Generally, chain of custody attempts to answer the questions of who, when, why, where, and how a document has been discovered. <\/p>\n<p>Discreditation has become somewhat of a profession. Generally, there are two ways to discredit a leak: discrediting the leaker and discrediting the leak itself. Discrediting the leaker can involve uncovering undesirable information about a target, such as sexual relations or health issues, or the outright framing of a leaker to invoke the perception of bias, focussing on <em>who<\/em> and <em>why<\/em>.<\/p>\n<p>The discreditation of documents is largely carried out by sowing further uncertainty around a leak\u2019s chain of custody. Chain of custody herein causes a dilemma, as the removal of metadata to protect us from identification makes the establishment of who, when, why, where, and how much harder. In digital forensics, it is therefore often focused on whether documents appear authentic, accurate, and complete, as well as whether documents are believable and explainable. Without an established chain of custody, the establishment of authenticity, accuracy, completeness, believability, and explainability becomes much harder to determine, making discreditation much easier.<\/p>\n<p>While we can make sure that a leaked document has not been tampered with after adding it to the blockchain, we cannot answer the questions of who, when, why, where, and how, pertaining to the much misunderstood dilemma that a blockchain can only verify data it has produced itself \u2014 perfectly illustrated by Todd Eden in 2018, who added a picture of the Mona Lisa to the blockchain-based art platform VerisArt, turning himself into the verified Leonardo da Vinci. This makes leaking information on the Bitcoin blockchain pointless unless journalistic due diligence is applied. <\/p>\n<h2>Private Information On The Internet <\/h2>\n<p>Contrary to public opinion, Bitcoin is not privacy technology. Even if you have established no fingerprinting in documents and followed chain-of-custody procedures, publishing information on the public blockchain can still lead to your identification.<\/p>\n<p>The easiest way to determine where a leak originated is through so-called supernodes. A supernode is a node in Bitcoin\u2019s peer-to-peer network which establishes connections to as many nodes as possible, allowing it to tell from which node a transaction originated. <\/p>\n<p>We may now think that using the Tor network may be enough to hide our private information from being obtained. But because blockchain surveillance works closely with government intelligence \u2014 Chainalysis has received over $3 million in the past two years by CIA\u2019s venture capital fund In-Q-Tel, while its competitor Elliptic was founded out of a GCHQ accelerator \u2014 we must assume that blockchain surveillance firms have access to the resources of global passive adversaries. <\/p>\n<p>A global passive adversary is an entity with the capabilities to watch the entire traffic on a given network. By doing so, it is able to determine the timing of when a packet has been sent and when it was received, correlating its sender and recipient. For example, if you used the Tor network from within the United States to access a website in the United States, the United States knows which websites you visited by correlating the timing of network requests sent and received. Because the United States is a global passive adversary, it possesses the abilities to link the timing of network requests globally.<\/p>\n<p>To leak information securely, it is therefore advised to do so via the Tor network from an internet caf\u00e9 while refraining from performing any other web request. If you leak a document from an internet caf\u00e9 and have recently signed into your email from the same computer, your identity can be assumed even when using Tor. You should therefore never use your own computers to leak information, as computers, too, are fingerprinted throughout the world wide web, from browser window sizes used to the applications installed. Additionally, it is advised to visit locations from which information is to be leaked while leaving your phone at home, as intelligence is able to obtain your location records. Nation-states herein have the capability of tracking your location even when your GPS is disabled by tracking the network requests your phone sends to WiFi networks you pass by. <\/p>\n<p>Unfortunately, it is improbable to find an internet caf\u00e9 which allows you to install a Bitcoin node. The only other way to leak information securely therefore becomes purchasing a single-use throwaway computer, as using someone else\u2019s node leaks further identifiable information to untrusted third parties. But, as soon as your personal devices and secret computer touch the same networks, you can again be identified.<\/p>\n<h2>Conclusion<\/h2>\n<p>Leaking information is incredibly important, especially when it pertains to abuses of power. But it\u2019s also incredibly dangerous. Using Bitcoin as a platform for whistleblowing, as proposed numerous times throughout the ecosystem, is a terrible idea given the risks at hand. <\/p>\n<p>The Tor network is insufficient to protect one\u2019s privacy in the face of global passive adversaries, making direct publication to the Blockchain incredibly difficult while ensuring the protection of one\u2019s identity, as the Bitcoin network is insufficient to protect one\u2019s personally identifiable information in general. Documents can contain invisible fingerprints leading to one\u2019s identification, and a lack of chain of custody will likely result in the discreditation of your leak.<\/p>\n<p>It is dangerous to believe that you are safe from both government and corporate surveillance, as it results in less caution and more reckless action. It is always better to be safe than sorry. Unfortunately, this mantra does not seem to resonate with many Bitcoiners these days.\u00a0<\/p>\n<p><strong><em>This article is featured in Bitcoin Magazine\u2019s<\/em> <em>\u201cThe Inscription Issue\u201d. Click <\/em><em><a href=\"https:\/\/store.bitcoinmagazine.com\/collections\/magazines\/products\/bitcoin-magazine-annual-subscription\">here<\/a><\/em> to get your Annual Bitcoin Magazine Subscription.<\/strong><\/p>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/bitcoinmagazine.com\/print\/whistleblowing-in-the-surveillance-age\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] This article is featured in Bitcoin Magazine\u2019s \u201cThe Inscription Issue\u201d. Click here to get your Annual Bitcoin Magazine Subscription. Bitcoin allows for the permanent<\/p>\n","protected":false},"author":1,"featured_media":226450,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[172],"tags":[],"_links":{"self":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/226449"}],"collection":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/comments?post=226449"}],"version-history":[{"count":0,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/226449\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media\/226450"}],"wp:attachment":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media?parent=226449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/categories?post=226449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/tags?post=226449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}