Author Topic: Intentional Leakage to add extra layer of anonymity  (Read 883 times)

0 Members and 1 Guest are viewing this topic.

Offline th31nitiate

  • Peasant
  • *
  • Posts: 56
  • Cookies: -4
    • View Profile
Intentional Leakage to add extra layer of anonymity
« on: August 22, 2015, 01:06:39 pm »
Would this be a worth while tactic for a government or organisation. Basically intentional leaking documents or source code in order to meet  specific goal. For example lets say if a government leaks source code to a specific exploit or malware. Then they start using that source code for that malware. In that instance then it will be more difficult to track back to them(like stuxnet) since the source code is publicly available it can be anyone utilizing the software.


The only thing that they would require from that point on is to store the servers in on a continent like Africa or Russia and access those servers via Multi-VPN registered through multiple shadow cooperation's.


My question is do you think this can be possible or would this be like fantasy.

Offline BurnTheWicked

  • Serf
  • *
  • Posts: 25
  • Cookies: -30
    • View Profile
Re: Intentional Leakage to add extra layer of anonymity
« Reply #1 on: August 25, 2015, 09:03:50 am »
...Why wouldn't it be a worth while tactic; however, source code for malware, that is the fantasy. It's a better idea, to do this with classified documentation; a way to legally and illegally make public, information that is hidden. However, when it comes to government or private agencies; VPN is a relatively unnecessary ordeal, especially when you consider the fact that we have satellites, giving us global range direct network access.

I think you are basing this on fantasy, and need to understand, malware is typically not necessary, in order to spy on most people; or to gain access to most networks. Anything that is considered malicious software, in fact, is actually just a form of viri. True malicious software, is OS independent; capable of executing, completely on it's own accord, without the need of any operating system.

Also, something to keep in mind; IPv6 protocols have been in government use since the dawn of the 2000's, 40gb ethernet was already in the works, by the time gigabit ethernet came to the public domain, i.e. 10gb ethernet networks were in operation in the 90's. Also something else to keep in mind; science fiction, isn't all that fictional; telekinesis may seem to be fantasy, but it's reality, stephen hawkings communicates telepathically to the world, with the use of a computer.  Oh, and why hide a server pharm, in Russia or Africa; when you can hide it on the moon, or mars?

Though, none-the-less; the best lie, is the truth: everyone expects a lie, so when they hear the truth, they turn a blind, and act as though the truth is a lie. Human kind has a fascination with deceiving one's self.