Wired Is the Latest Publication to Provide a Secure Space for Sources Bearing Information

Wired signs on to SecureDrop

While Wired is the latest in a still-expanding group of publications offering sources a secure, anonymous space to send information through SecureDrop, there’s something a little different about Wired signing on.

SecureDrop, according to Wired’s Andy Greenberg, was a Wired brainchild:

SecureDrop was, in some respects, invented at WIRED. In 2013, WikiLeaks inspired then-WIRED editor Kevin Poulsen and the late information activist Aaron Swartz to create a prototype for software that would let any site launch a similar portal for leakers and whistle-blowers. That tool, initially called DeadDrop, first found a home at WIRED’s Condé Nast sister publication, the The New Yorker. Its open-source code was quickly adopted by the Freedom of the Press Foundation, where Edward Snowden now leads the team that maintains it. In the meantime, it’s been redesigned, renamed SecureDrop, and extensively audited for security vulnerabilities.

It’s fitting that The New Yorker was the first to sign on, considering that current Wired editor in chief Nicholas Thompson joined (or rejoined) Wired from the New Yorker, where he had been editor of newyorker.com.

Wired has instructions here on how would-be anonymous tippers can access SecureDrop, which as always requires use of a Tor browser as a first step. And because it is, after all, Wired, you can check out this excerpt published in February from The Art of Invisibility: The World’s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data by Kevin Mitnick that offers a comprehensive look at encryption, Tor, and how to make your email as private as possible, if you need the extra context. Most of us probably do.

Source: ADWEEK

Topics: SecureDrop, Speaking Engagements, The Art of Invisibility, Edward Snowden, Freedom of the Press Foundation, Condé Nast, cyber security, Kevin Poulsen, Nicholas Thompson, Wired, Tor, Aaron Swartz, Anydy Greenberg, Big Brother, Big Data, Kevin Mitnick, New Yorker

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

AI Voice Cloning: What It Is, and How to Detect Threats

Artificial Intelligence (AI) has reshaped our lives, speeding up learning, content creation, and communication. But with innovation comes a new risk: ..

Read more ›

3 Types of Hacking Seen In 2024 and Predictions For 2025

Threat actors are typically after two things from your business: data or money. Usually, they’re motivated by both, as data can help them cash in at t..

Read more ›

6 Types of Social Engineering Attacks and How to Prevent Them

Social engineering attacks account for a massive portion of all cyber-attacks.

Read more ›
tech-texture-bg