Wired Is the Latest Publication to Provide a Secure Space for Sources Bearing Information

Wired signs on to SecureDrop

While Wired is the latest in a still-expanding group of publications offering sources a secure, anonymous space to send information through SecureDrop, there’s something a little different about Wired signing on.

SecureDrop, according to Wired’s Andy Greenberg, was a Wired brainchild:

SecureDrop was, in some respects, invented at WIRED. In 2013, WikiLeaks inspired then-WIRED editor Kevin Poulsen and the late information activist Aaron Swartz to create a prototype for software that would let any site launch a similar portal for leakers and whistle-blowers. That tool, initially called DeadDrop, first found a home at WIRED’s Condé Nast sister publication, the The New Yorker. Its open-source code was quickly adopted by the Freedom of the Press Foundation, where Edward Snowden now leads the team that maintains it. In the meantime, it’s been redesigned, renamed SecureDrop, and extensively audited for security vulnerabilities.

It’s fitting that The New Yorker was the first to sign on, considering that current Wired editor in chief Nicholas Thompson joined (or rejoined) Wired from the New Yorker, where he had been editor of newyorker.com.

Wired has instructions here on how would-be anonymous tippers can access SecureDrop, which as always requires use of a Tor browser as a first step. And because it is, after all, Wired, you can check out this excerpt published in February from The Art of Invisibility: The World’s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data by Kevin Mitnick that offers a comprehensive look at encryption, Tor, and how to make your email as private as possible, if you need the extra context. Most of us probably do.

Source: ADWEEK

Topics: SecureDrop, Speaking Engagements, The Art of Invisibility, Edward Snowden, Freedom of the Press Foundation, Condé Nast, cyber security, Kevin Poulsen, Nicholas Thompson, Wired, Tor, Aaron Swartz, Anydy Greenberg, Big Brother, Big Data, Kevin Mitnick, New Yorker

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

The Growth of Third-Party Software Supply Chain Cyber Attacks

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›
tech-texture-bg