Snitches Get Stitches: On The Difficulty of Whistleblowing

  title={Snitches Get Stitches: On The Difficulty of Whistleblowing},
  author={Mansoor Ahmed-Rengers and Ross Anderson and Darija Halatova and Ilia Shumailov},
One of the most critical security protocol problems for humans is when you are betraying a trust, perhaps for some higher purpose, and the world can turn against you if you're caught. In this short paper, we report on efforts to enable whistleblowers to leak sensitive documents to journalists more safely. Following a survey of cases where whistleblowers were discovered due to operational or technological issues, we propose a game-theoretic model capturing the power dynamics involved in… Expand

Figures and Topics from this paper


The Prisoners' Problem and the Subliminal Channel
Two accomplices in a crime have been arrested and are about to be locked in widely separated cells. Their only means of communication after they are locked up will he by way of messages conveyed forExpand
Security engineering - a guide to building dependable distributed systems (2. ed.)
In almost 600 pages of riveting detail, Ross Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables. Expand
Security Engineering: a Guide to Building Dependable Distributed Systems Physical Tamper Resistance 14.1 Introduction
It is relatively easy to build an encryption system that is secure if it is working as intended and is used correctly but it is still very hard to build a system that does not compromise its securityExpand
Mixminion: design of a type III anonymous remailer protocol
Mixminion works in a real-world Internet environment, requires little synchronization or coordination between nodes, and protects against known anonymity-breaking attacks as well as or better than other systems with similar design parameters. Expand
Chip and Skim: Cloning EMV Cards with the Pre-play Attack
How the vulnerability was detected, a survey methodology developed to chart the scope of the weakness, evidence from ATM and terminal experiments in the field, and the implementation of proof-of-concept attacks are described, which discuss countermeasures. Expand
Chip and PIN is Broken
This paper describes and demonstrates a protocol flaw which allows criminals to use a genuine card to make a payment without knowing the card’s PIN, and to remain undetected even when the merchant has an online connection to the banking network. Expand
Bound To Lead: The Changing Nature Of American Power
Is America still Number 1? A leading scholar of international politics and former State Department official takes issue with Paul Kennedy and others and clearly demonstrates that the United States isExpand
Terahertz time-gated spectral imaging for content extraction through layered structures
The sub-picosecond time resolution along with spectral resolution provided by terahertz time-domain spectroscopy is exploited to computationally extract occluding content from layers whose thicknesses are wavelength comparable. Expand
U.S. Postal Service logging all mail for law enforcement
  • 2013
Ian paterson inquiry: more than 1,000 patients
  • had needless operations. The Guardian,
  • 2020