‘Information asymmetry’ and ‘moral hazard’ are well-studied problems in economics. But can we apply them to data privacy?
Investigative journalists rely on information sources to write interesting stories. Their work is a significant contributor to democracy and free speech in my opinion. Articles that expose wrongdoings within the private and public sector function as a social control when other channels fail to address an issue.
However, certain governments are not that keen on whistleblowers. Many of them choose to track them down and to prosecute them. As mass-surveillance and metadata retention programs are recording almost every aspect our digital life, it gets more and more challenging for the information sources to hide their real identities. The damaging impact on our society is that investigative articles could eventually stop being written as whistleblowers will be afraid to speak out.
The situation is not hopeless, though. Journalists can still do certain precautions to protect the identity of their information sources. A sensible combination of cryptography, privacy tools and OPSEC practices could help to keep those stories coming.
Hackers are notoriously clever at committing crimes. Of all the criminal archetypes, they seem to be the most creative; so creative that we were forced to invent yet another word to describe their latest scams. Malvertising — a new shorthand for malicious advertising — is something very different from the traditional methods hackers have historically used.
Have you ever wanted to contribute to the Tor project, but never knew how to do it? Why not running a Tor relay? The more people running relays, the faster the Tor network will be.
This short guide from the recent CryptoParty workshop helps you with launching a virtual machine and configuring it as a Tor relay.