How to safely release classified documents

Hello.
How would one that has access to government classified information release it to the web without getting associated with it?
Torrents wouldn't be viable since they require an initial seed and file hosts could be quickly taken down, with the additional issue that even with VPNs, I'm not fully safe, since even if they claim that they don't hold logs, their claims won't likely hold to a NSA demand, so I kind of have my hands tied with file hosts/VPNs.
Finally, running a hidden service woudn't be viable as well due to traffic correlation and my lack of bandwith (besides TOR being compromised).
Any suggestions?

Attached: 91vvYkE.jpg (1512x2016, 570K)

Other urls found in this thread:

theguardian.com/securedrop
nytimes.com/tips
washingtonpost.com/securedrop/
bhphotovideo.com/c/product/1186714-REG/lexar_lsd512cbnl633_512gb_professional_uhs_i_sdxc.html/?ap=y&gclid=EAIaIQobChMI-o3W3trp4AIVA-DICh1l3QPiEAQYASABEgIdofD_BwE&lsft=BI:514&smp=Y
twitter.com/SFWRedditImages

if you dont even know about wikileaks and the alternatives to that you're probably too retarded to do it properly

Gentoo

submit to wikileaks or take the files to russia with you prepare to suck some putin dick so they don't send you back to get raped by nogs

best way is to directly send a copy to your Chinese contact/ (((journalist))) a physical dead drop would be best but an encrypted archive with password delivered separately might be ok.

The issue with wikileaks is that they may not even publish it and it's too centralized, I'd like my release to be as distributed as possible, providing me with anonimity to avoid having to leave the country.
How would I go about sending the encryption password physically? The US customs already keep track of every package that comes through, that would be highly suspicious, specially to a law/journalism firm or remote country.

Most major news outlets have a "secure drop" page where you can anonymously do it. Use Tails + Tor on a public machine or network.

e.g. theguardian.com/securedrop
nytimes.com/tips
washingtonpost.com/securedrop/

Can't you just send a letter with a pendrive?

contact foreign agent or journalist with tails os or similar live usb without persistence on a library computer or computer cafe with pgp encrypted communication specifying a dead drop location of an encrypted thumb drive bought with cash while using a disguise. Obviously wear disguise when performing drop and only give encryption key after confirmation proper reception of thumb drive to the right parties.

Torrents are viable, so long as you distribute the fragments some other way initially.
>create torrent
>distribute it to trusted peers
>distribute fragments to trusted peers
>allow peers to handle mass distribution without association to you, not even on the DHT

Or just seed over i2p and let untrusted peers seed to the clearnet if they want to via the same torrent.
I've distributed a handful of corporate source code via i2p without it coming back to me.

Bandwidth concerns shouldn't be a problem if you make it known up front.
>I will seed exactly 3 copies of this before I take down my node, it is your responsibility to host it
etc.

package interception is possible

the fact that you are posting here means you're already dead. peace out. also glow in the dark thread.

Attached: laff.jpg (350x473, 54K)

ez, filesharing forums on tor, remember to only connect through Russian, Turkish and Chinese nodes, you can configure that in the browser

torrents by default arent anonymous at all. it is only if you use i2p but anything else can be tracked easily and its very easy to make mistakes with the configs

by posting here youve already failed

Physically travel to China with USB stick up your ass. Act perfectly normal and calm, and have a valid reason for being there like a vacation or something. Don't give them any reason to detain or search you before you've left the country. Arrange a dead drop for the USB device you keistered and enjoy your vacation and go home like nothing ever happened

The point is not to be anonymous, but to not be associated with the torrent. For example, you create the torrent, send it to me along with the content, and I can be the initial seeder. Even if I'm on the clearnet and not anonymous at all, you still distributed it without association besides the initial hand off.

In reality you'd probably want to use a botnet or distribute to trusted peers who are behind 8 gorillion proxies themselves, or out of jurisdiction.

torrents are too risky for both sensitive and insensitive sharing due to open addressing of peers and seeds. Torrenting anything is a great way to compromise internet security

Print it and send it to your local newspaper.

no, don't torrent at all, if you're the slightest concerned about internet security. It's the least secure method of sharing anything

>Print it out, and leave copies of that print out at many locations that will post it.
>Print it out, and then wear a disguise that swaps your age, gender, and facial/tooth/bone structure, along with a throw away vehicle, and drive through some bumfuck town with a library or local copy center, and scan then post it on the web there or go through a town that has such heavy people traffic and do the same but then devices will pick you up.
>Buy throw away net service on a throw away device while wearing said disguise and driving said throwaway vehicle and then find a bridge to send it under and toss out the device there and get rid of everything under other coverings in random undisclosed locations while not yourself.

Basically, wear a disguise, get a throw away device, have a throw away vehicle and location, throw away car, stay away from smart grid devices, and then "unlayer" yourself bit by bit under the cover of bridges, trees, etc. away from cameras and passerbys planning your own way out from even satellites. Basically, print, disguise, drop, and run undercover. Never having yourself revealed anywhere near or in the open, and then burning everything as you go.

printers use steganographic methods of embedding metadata into printed materials.

Attached: steganographypresentation-10-638.jpg (638x359, 79K)

That's flat out not true. I'm not saying to do it, I'm saying it's a viable option if done correctly. You can't just say that just because you can be traced over the protocol that it's not viable. The same is literally true for everything. You can get away with sending something over HTTP if you do it correctly.

If you never even use the torrent you created then how are they going to trace it back to you?
That's the most extreme example too, like I said I have experience distributing content over i2p first hand and never had any issues. A few of them where high profile enough to make articles.

Honestly, I's just print the shit out, and leave it in unscrupulous locations with heavy net cafe traffic. Like Vietnam. Send it by boat if you have to, but make sure to send it to locations where users are sure to be interested and not give a fuck.

Time to find an old typewriter, and bust a nut typing. Use wD40 for ink, and a detachable ribbon. When new tech gets dangerous get oldschool.

not a problem as long as you buy a used printer with cash and destroy & get rid of it and anything related to it after using it.

Just wear a full body dna suit and a clean room to type. destroy the typewriter when done. Thermite it in an old barrel or baseball bat it, and dump it in the middle of a lake.

Put it in encrypted USBs and leave it in various places.Go to a public hotspot wearing a disguise use tor to post on Jow Forums, here and the other chans the locations so anons get them and distribute them for you

How big is the dataset?
Is it feasible to use optical media or flash drives with a plea to distribute then just leave them around physically?

yeah this

>smart printer embeds location and timestamp
nothin personnel criminels

Attached: 1551176763970-g.gif (500x281, 912K)

I mean, you're right that I'm exaggerating the security flaws of torrenting but without additional layers of protection, torrenting is a great way to be traced. There's better ways to spread information anonymously than introducing loose ends with extra people and i2p over torrent.

The issue is that public computers aren't secure, even with non-persistent USB disks, you can't trust the firmware, or assure that you're not being eavesdropped, since TOR is compromised.
Torrents are out of the question, you just can't have "trusted seeders" since they'll quickly be traced back to you, as well as the initial seeed, even with i2p.
Out of the question as well, besides public tracking and timing correlations, what the user responded, since printers may leave metadata on the printing process.
The facial recognition techniques employed by the government at most important facilities is beyond easy masking techniques, going into the field of skin recognition, unless I got a full rework of my body and skin, that is out of the question, as well as the online problem I mentioned earlier.
Priting is the biggest issue as well because of the surveillance.

>When new tech gets dangerous get oldschool.
this, I love old school solutions to high tech problems.

this but it would only work with Jow Forums because no one with a brain would associate first hand with that shit
at best I'd be the 100th seeder but getting your hands dirty is Jow Forumstard and Jow Forumstard tier only

That's interesting, are there libre printers or libre mods for printers?
I was always disgusted with the price of ink cartridges.

Too much to print -
400 GB, and then I'd have to deal with the issue of buying those drives and safely transferring the files.

Use Tails to submit it to WikiLeaks and various news websites, then upload it to some file uploaders (mega, pomf clones), create a torrent, then post the links along with the magnet link to web forums like Jow Forums and Reddit. You don't even have to start seeding the torrent, just make sure that the file that you upload to the file uploaders is identical to the one in the torrent so others can start seeding it in case the links get taken down.
Basically, get it out there in as many ways as possible.

I've addressed the issue with tails and public computers and hosting sites with VPNs that would basically be wortless. Also, how would you even paste a magnet/torrent without seeding it to a first peer? That's braindead.

POST IT HERE YOU STIFF CUNT

If you don't have a trusted accomplice, and are not able to serve the data yourself. It's going to be very difficult.

You may have to trickle the data somehow over a long time and then release the instructions only.

For example, are you familiar with the sink thread debacle that happned here?
For a long time people where openly posting images openly here that contained fragments of child porn appended to them.
You could imagine appending chunks of data to things that get hosted somewhere else incidentally. and then just releasing a list of hashes of the files.
This would take an enormous amount of effort for both you and the original assembler though.

Although I guess you could get creative with things like YouTube and audio data streams.
Imagine uploading a video via tor that's completely arbitrary but contains an encrypted audio data fragment. Doing this over the span of months to years, hoping that it's arbitrary enough to not correlate anything and potentially long enough for a log flush.
Replace this with whatever stenography, transport, and public service you can think of. Get creative. People pass messages via twitter thot images today. There are video game save data that has extra bits.

just dont buy one of those. theres many normal printers available

>being afraid of getting caught
Play stupid games, win stupid prizes. There's no way to hide yourself completely in the digital world. Might as well go balls deep if you're going to do risky shit. Go to different country, post on clearnet without vpns or 7gorillion proxies because hiding isn't chad, then set up a new identity and live life in some random 3rd world shit hole away from all internet

idk why you would ask help for doing illegal things on a site that does not allow anonymous use

Also as an example of relying on external storage. One of my private keys is the second image result for a certain phrase on Google that I do not have permanently saved anywhere. The risk of it disappearing thanks to things like the internet archive are small, and someone has likely reposted it themselves.

The point is to somehow publish innocent data, hope someone else reposts it, and then delete the original if you're the origin of it.

Another good example. This image will be posted by me, archived on one of the Jow Forums archives, and the logs deleted. In a year I can say "a cdr.png 2019-03-04 Jow Forums" or some other cryptic bullshit.

There's not actually any data appended to this image, it's just an example.

Attached: a cdr.png (152x616, 36K)

How proficient are you with computer-science/technology? This would determine your success rate of not being jailed for life.

That's a pretty nice suggestion, but I'd want to get this out as fast as possible without getting jailed or persecuted like Snowden...
I'm pretty good, that's how I managed to obtain the intel in the first place.

>Government documents leaked today after 6,000 Counter Strike and Quake demo files where found to contain fragments of the data as well as inhuman bunny hopping capabilities

what kind of data are we talking about and what can you use it for? can you give me a hint?
i'm not a cop btw

>How proficient are you with computer-science/technology?
>I'm pretty good

>but he doesn't know how to anonymously post information on the internets
nobody wants to see your 400gb of dic pics

Mainly classified data from the US government, I can't go any further than that.

idk man ask this guy

Attached: snowysnowden.jpg (1368x1026, 88K)

Get a disposable device and use a public WiFi, make sure there are no cameras around.

Nice LARP

Post it on catbox.moe with Tor.
Then make a post on 8ch about it, with Tor (since you can't Torpost on here).

>make sure there are no cameras around.
good luck, there's cameras EVERYWHERE these days

>Meanwhile, at OP's house

Attached: GregariousBeautifulAfricanhornbill-size_restricted.gif (500x288, 2.64M)

Backtrace completed... we have the suspect's location locked on... activate the drone strike

Attached: 1542147158779.png (213x250, 88K)

cryptome.org

Public WiFi is compromised by nature.

>go to wifi at starbucks
>upload to pastebin/whatever
>post link to /b/

not hard

>The issue with wikileaks is that they may not even publish it and it's too centralized, I'd like my release to be as distributed as possible, providing me with anonimity to avoid having to leave the country.
the thing is whatever you publish is going to leave a fingerprint in an of itself, they are going to go everyone who ever saw those documents with a fine tooth comb and you will buckle

Attached: 1548278579273.jpg (749x931, 180K)

mail the USB stick to me and I will publish it on my website then kill myself

>400 GB, and then I'd have to deal with the issue of buying those drives and safely transferring the files.

bhphotovideo.com/c/product/1186714-REG/lexar_lsd512cbnl633_512gb_professional_uhs_i_sdxc.html/?ap=y&gclid=EAIaIQobChMI-o3W3trp4AIVA-DICh1l3QPiEAQYASABEgIdofD_BwE&lsft=BI:514&smp=Y

Not OP, but if I decided to leak something I wouldn't trust media outlets from the same country. How many are the chances the NSA/CIA/whatever works in the building?

classified material is usually watermarked to hell just for this purpose they'll probably know no matter how distributed it is

>400GB through tor
lmao, OP will die before that happen

What if the leak in question directly implicates russian meddling?

Wikileaks wouldn't touch that shit with a 50 foot pole.

op will never deliver and is a faggot

Steal a phone and upload through public wifi, preferable crowded place
Then smash it, burn it, throw it in a swamp
You don't have to be anonym, just someone else identity

Bad example, seeing as how we even know who he is.
Snowden has been dead for a while now, they're keeping him 'alive' through voice synthesizers and deepfakes.

source on that

Yeah, nice try.

Attached: 1525418608840.png (480x466, 139K)

PostSecret

> Buy laptop with cash from a pawn shop.
> Spoof MAC address.
> Encrypt files with a password that is brute forcable but only in a week or so.
> Go to some public wifi in sufficient disguise.
> Post on a bunch of Russian forums telling them it will be pretty interesting once they brute force the weak password.
> Leave.
> Destroy laptop.

>encrypt files with RSA 4096, keep the key
>put key inside jpg
>distribute files with burner laptop + tails
>thermite laptop
>distribute image through separate laptop
>thermite laptop

Why use two laptops? It's not like he'd be traced only if both of them are traced, one is enough. You're only increasing the attack surface.

>Put files in micro sd
>Steal a phone
>Use sim card for data on another phone
>Leak files on someone elses data
>???????
>Eat micro sd and sim card for dinner

wikileaks will publish whatever will get them clicks.

So basically they already know you have it and the second it's leaked anywhere you're fucked

OP, this chinese basket weaving forum is actually a FBI honeypot, so I wouldn't post anything about secret files in this shit

Attached: 1520531152015.jpg (346x362, 15K)

By posting here you've already compromised your security. Well done, faggot.

The answer other people have given is about right. Upload them online, make sure it gets around to at least a few people - like, share the link on Jow Forums - and they'll do the rest. Do it from a burner device on public internet, and use cash for the whole process. They traced one guy by his credit card coffee purchase, so keep that in mind. Destroy the computer after you're done. Incinerate the fucker.

This really isn't a tough problem to crack if you really want to release the info. This is either autism, larping, or actual cia.

Put the files in a unique format on a computer that has always been and will always be offline. Use that computer to create an external medium which contains the sterilized files. Get a used laptop off Craigslist, go to another state in someone else's car, on McDonald's wifi upload the docs to a public Access point while wearing a disguise. Post links to the files, then destroy both computers, the storage medium, and the disguise.

They will still trace it back to you though because it sounds like you used a computer to get the info, and that means you are traceable. If it is for the good of mankind that the data is released, start talking to people who are serious about this shit instead of Jow Forums. If this is a personal vendetta then get a new hobby because you are going to face more pain than you ever knew was possible by fucking around with government info.

He can just spin up a whole bunch of instances until he saturates his upstream. Just make sure you use a static, different guard node per instance though. Also, tor on Debian comes with an easy to use script to do this called tor-instance-create.

>By posting here you've already compromised your security. Well done, faggot.
this. if you have to openly discuss this problem to solve it, you're not made for this job.

/thread