• Snot Flickerman@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    203
    arrow-down
    1
    ·
    9 months ago

    It’s how Reality Winner got real fucked.

    via Wikiedpia:

    Both journalists and security experts have suggested that The Intercept’s handling of the reporting, which included publishing the documents unredacted and including the printer tracking dots, was used to identify Winner as the leaker. In October 2020, The Intercept’s co-founding editor Glenn Greenwald wrote that Winner had sent her documents to The Intercept’s New York newsroom with no request that any specific journalist work on them. He called her exposure a “deeply embarrassing newsroom failure” resulting from “speed and recklessness” for which he was publicly blamed “despite having no role in it.” He said editor-in-chief Betsy Reed “oversaw, edited and controlled that story.” An internal review conducted by The Intercept into its handling of the document provided by Winner found that its “practices fell short of the standards to which we hold ourselves”.

    • renzev@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      241
      ·
      9 months ago

      A technology that was made To Stop Criminals™ being used against a political whistleblower? Color me surprised! (thanks for sharing the link btw, didn’t know about that)

        • DAMunzy@lemmy.dbzer0.com
          link
          fedilink
          arrow-up
          8
          ·
          9 months ago

          Just use the Fake color (because we call it Fake News nowadays instead of Yellow Journalism).

          I’ll see myself out.

      • Snot Flickerman@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        47
        arrow-down
        2
        ·
        edit-2
        9 months ago

        You’re very welcome. It’s good to be able to show real-world examples so people are less skeptical. A lot of people won’t read a deep technical document describing printer surveillance, but they will read a paragraph excerpt from Wikipedia.

        • AggressivelyPassive@feddit.de
          link
          fedilink
          arrow-up
          27
          ·
          9 months ago

          And they will argue that whistleblowing is actually a crime, because, uhm, it’s, uhm, yeah it’s illegal! And if it’s illegal to be a good citizen, then this is totally warranted and no scandal at all, because only bad people do illegal things!

          Many people are willing to sacrifice a lot of people for the tiny chance of maybe stopping a criminal once.

          • renzev@lemmy.worldOP
            link
            fedilink
            English
            arrow-up
            14
            ·
            edit-2
            9 months ago

            Actual opinion some people hold: “We need to make end-to-end encryption illegal to stop criminals”

            How on earth is that meant to work? Criminals are criminals. They don’t care whether or not it’s illegal. At this point, just declare all crime illegal and call it a day. At least that won’t be a huge infringement on honest people’s privacy and security.

            • Azzu@lemm.ee
              link
              fedilink
              arrow-up
              15
              ·
              9 months ago

              Wait. Crime is not illegal? No wonder all those criminals are doing it.

            • psud@aussie.zone
              link
              fedilink
              arrow-up
              1
              ·
              9 months ago

              A recent anti-organised crime operation set up a fake end to end encrypted phones and sold them to criminals, capturing all calls, messages, and internet traffic

              If they hadn’t, a real version of the same would have been supplied to criminals, since it’s easy and cheap

    • ElCanut@jlai.lu
      link
      fedilink
      arrow-up
      37
      arrow-down
      1
      ·
      9 months ago

      To be fair Reality Winner sent her emails to the intercept from her government account, so she was fucked anyway and it was just a matter of time

    • Artyom@lemm.ee
      link
      fedilink
      arrow-up
      25
      ·
      edit-2
      9 months ago

      Interesting. I remember reading a news article before 2017 stating that printers used to do this, but the practice has since ended because someone was able to prove they were doing it in the mid-2000s. At the time, I saw some people on Reddit claiming they just switched to a new, harder to detect method, and everyone was saying they were conspiracy theorists.

      • Rentlar@lemmy.ca
        link
        fedilink
        arrow-up
        25
        ·
        edit-2
        9 months ago

        On wikipedia there’s some suggestion that methods that involve intensity of toner/ink across a document could be used to uniquely identify a machine but no such methods are currently publicly known (at least as far as the Wikipedia article has been updated)

    • driving_crooner@lemmy.eco.br
      link
      fedilink
      arrow-up
      10
      arrow-down
      3
      ·
      9 months ago

      Those dots are practically invisible if you have the printed copy, they’re not going to be visible at all in a photography. Printers and their network leave a lot to logs behind, pretty sure they just check up the printed files of their network, found the document and who send the printer order and done.

      • BreakDecks@lemmy.ml
        link
        fedilink
        English
        arrow-up
        15
        ·
        9 months ago

        So you think tracking her down with forensic methods that objectively exist is farfetched, but accessing the print logs of every printer in America to figure out which one printed the document is realistic?

        • driving_crooner@lemmy.eco.br
          link
          fedilink
          arrow-up
          6
          arrow-down
          2
          ·
          edit-2
          9 months ago

          Every printer in America? She wasn’t a random person accessing those documents in her local Starbucks. That was a secret document printed in a government computer.

        • psud@aussie.zone
          link
          fedilink
          arrow-up
          1
          ·
          edit-2
          9 months ago

          It’s cheaper and easier to look at the print logs. Most business computer and printer solutions tie every print to a user and log at least the name of every document printed

          The hidden code is for court cases where they wish to prove which machine made the print, they’re not very good for identifying which user printed something in a multi user environment