Wired Is the Latest Publication to Provide a Secure Space for Sources Bearing Information

Wired signs on to SecureDrop

While Wired is the latest in a still-expanding group of publications offering sources a secure, anonymous space to send information through SecureDrop, there’s something a little different about Wired signing on.

SecureDrop, according to Wired’s Andy Greenberg, was a Wired brainchild:

SecureDrop was, in some respects, invented at WIRED. In 2013, WikiLeaks inspired then-WIRED editor Kevin Poulsen and the late information activist Aaron Swartz to create a prototype for software that would let any site launch a similar portal for leakers and whistle-blowers. That tool, initially called DeadDrop, first found a home at WIRED’s Condé Nast sister publication, the The New Yorker. Its open-source code was quickly adopted by the Freedom of the Press Foundation, where Edward Snowden now leads the team that maintains it. In the meantime, it’s been redesigned, renamed SecureDrop, and extensively audited for security vulnerabilities.

It’s fitting that The New Yorker was the first to sign on, considering that current Wired editor in chief Nicholas Thompson joined (or rejoined) Wired from the New Yorker, where he had been editor of newyorker.com.

Wired has instructions here on how would-be anonymous tippers can access SecureDrop, which as always requires use of a Tor browser as a first step. And because it is, after all, Wired, you can check out this excerpt published in February from The Art of Invisibility: The World’s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data by Kevin Mitnick that offers a comprehensive look at encryption, Tor, and how to make your email as private as possible, if you need the extra context. Most of us probably do.

Source: ADWEEK

Topics: SecureDrop, The Art of Invisibility, Edward Snowden, Freedom of the Press Foundation, Condé Nast, cyber security expert, Kevin Poulsen, keynote speaker, Nicholas Thompson, Wired, Tor, Aaron Swartz, Anydy Greenberg, Big Brother, Big Data, information security, Kevin Mitnick, New Yorker

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

PCI Testing: Everything You Need To Know

Penetration testing is crucial for businesses to help ensure that their security posture will stand against threat actors. For businesses that handle ..

Read more ›

The 4 Phases of Penetration Testing

So, you’ve done your research on penetration testing and are ready for the pentest engagement. But before you choose just any pentesting vendor, it’s ..

Read more ›

What is Web Application Penetration Testing?

Is your company in the process of developing a new application? There are a lot of moving parts involved in developing and deploying cutting-edge appl..

Read more ›
tech-texture-bg