Hacker News new | past | comments | ask | show | jobs | submit login

The problem with doing that is that the US government might release the information themselves, just dampened a bit with some PR, so the insurance files aren't worth anything and so WikiLeaks don't get the credit.

I'm not sure WikiLeaks would find that to be a problem. Isn't the whole goal to eventually convince governments to release things themselves?

Which would generally imply that they're not very good insurance files.

I had the last one for a bit, and deleted it just now because I'm seriously doubtful these things are anything more then /dev/urandom piped into a file.

What gives you any indication of that? There's no way of telling a ciphertext from random bytes.

Well, obviously, there's no way of telling or he'd simply crack the file and say it was random.

His point is based more on softer considerations like "they never used the previous insurance file yet, have they?" and "Wikileaks pulls a lot of stunts" and "this is just the sort of thing that would appeal to a cryptogeek like Assange whose avowed purpose is to throw sand into the gears of secretive organizations" and "so how did they get 300GB+ of leaked stuff since the site has been half-inactive for years and Assange completely distracted by his legal issues? Who would trust them with it? eg. Snowden didn't go to Wikileaks".

If these ever did get released and were damaging, the media/propaganda machines around the targeted governments would be doing dampening/PR anyway. So if that can largely stop the damage, they certainly wouldn't be any good as insurance, whoever releases them.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact