Snowden torrent files?!?

Discussion in 'Politics, Religion, Social Issues' started by lostngone, Jun 24, 2013.

  1. lostngone, Jun 24, 2013
    Last edited: Jun 25, 2013

    macrumors demi-god

    lostngone

    Joined:
    Aug 11, 2003
    Location:
    Anchorage
    #1
    Couldn't Snowden take all his files divide them up, encrypt and float them around a bunch of torrent sites? Then when the time comes to release something just post the key somewhere for that torrent.

    If you could built and stable and large enough group of seeders before the U.S. Government found out what you were up to, do you think the U.S. government has the ability to poison or somehow take it down?
     
  2. macrumors 68000

    mentaluproar

    Joined:
    May 25, 2010
    Location:
    Ohio, USA
    #2
    Not everybody understands how to download a torrent file, and they cannot be confirmed as valid. Credibility is not preserved with torrents.
     
  3. thread starter macrumors demi-god

    lostngone

    Joined:
    Aug 11, 2003
    Location:
    Anchorage
    #3
    I am thinking out loud here.

    Beforehand couldn't he release the checksums of each set of files after the decryption has been performed?

    The checksum(s) would have to be released by trusted source of course(I don't know who that would be). You still have issues with copycats claiming they have the correct checksums.
     
  4. macrumors 68000

    mentaluproar

    Joined:
    May 25, 2010
    Location:
    Ohio, USA
  5. thread starter macrumors demi-god

    lostngone

    Joined:
    Aug 11, 2003
    Location:
    Anchorage
    #5
    You are 100% correct, you don't think there is enough people that do?
     
  6. mentaluproar, Jun 24, 2013
    Last edited: Jun 24, 2013

    macrumors 68000

    mentaluproar

    Joined:
    May 25, 2010
    Location:
    Ohio, USA
    #6
    If this were only something that tech geeks were interested in, checksums would be fine, but Snowden is trying to inform a wider audience, and there are limitations in that.
     
  7. lostngone, Jun 24, 2013
    Last edited: Jun 24, 2013

    thread starter macrumors demi-god

    lostngone

    Joined:
    Aug 11, 2003
    Location:
    Anchorage
    #7
    Yes but it is easier and safer to post a set of random numbers and letters then risk the data you gave someone is lost or taken or even tracked back to you.

    If he has the only copy of data that is a major single point of failure. The keys could even be broken up and sent out before hand when a man trigger was reached the keys could be reassembled.

    EDIT: Have I been watching to many spy movies again?!?!
     

Share This Page