tag:blogger.com,1999:blog-4296942054147310421.post1192014131263568722..comments2021-08-24T23:11:23.558-05:00Comments on LIS 661: Information Ethics and Policy: Wikileaks: Info SupremeSarah. R.http://www.blogger.com/profile/13495338005089494192noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-4296942054147310421.post-83439363429070192632010-11-21T21:39:54.757-06:002010-11-21T21:39:54.757-06:00Daniel, while I was doing a bit of reading up on W...Daniel, while I was doing a bit of reading up on WikiLeaks, I found an article by Farhad Manjoo, technology writer for Slate. The article is predominantly about whether or not source anonymity is compatible with WikiLeaks philosophy of radical transparency. But in the first paragraph Manjoo describes some of what WikiLeaks does to safeguard the anonymity of its sources. They encrypt all their transmissions, keep no logs, and scrub the documents of any digital signatures or other features that may lead to the identity of their source(s). I thought it was interesting, you may want to take a look. <br /><br />http://www.slate.com/id/2262066/Davidhttps://www.blogger.com/profile/05652824085802653117noreply@blogger.comtag:blogger.com,1999:blog-4296942054147310421.post-52657913694906587382010-11-20T14:22:49.847-06:002010-11-20T14:22:49.847-06:00As always, my favorite way to start out examining ...As always, my favorite way to start out examining this topic, as many, is to ask what our constant companion throughout this course, J.S. Mill, might do or say regarding WikiLeaks? What do you (all) think? How does WikiLeaks measure up to the Mill points?Sarah. R.https://www.blogger.com/profile/13495338005089494192noreply@blogger.com