{"id":14172,"date":"2015-05-02T03:00:38","date_gmt":"2015-05-02T10:00:38","guid":{"rendered":"http:\/\/lifeboat.com\/blog\/?p=14172"},"modified":"2017-06-04T11:59:01","modified_gmt":"2017-06-04T18:59:01","slug":"wikileaks-finally-brings-back-its-submission-system-for-your-secrets","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2015\/05\/wikileaks-finally-brings-back-its-submission-system-for-your-secrets","title":{"rendered":"WikiLeaks Finally Brings Back Its Submission System for Your Secrets"},"content":{"rendered":"<p><span class=\"link-underline-sm marg-r-sm\"><a tabindex=\"-1\" href=\"http:\/\/www.wired.com\/author\/andygreenberg\/\" rel=\"author\">Andy Greenberg<\/a><\/span> \u2014 Wired<br \/> It\u2019s taken close to half a decade. But WikiLeaks is back in the business of accepting truly anonymous leaks.<\/p>\n<p>On Friday, the secret-spilling group announced that it has finally relaunched a beta version of its leak submission system, a file-upload site that runs on the anonymity software Tor to allow uploaders to share documents and tips while protecting their identity from any network eavesdropper, and even from WikiLeaks itself. The relaunch of that page\u2014which in the past served as the core of WikiLeaks\u2019 transparency mission\u2014comes four and a half years after WikiLeaks\u2019 last submission system went down amid infighting between WikiLeaks\u2019 leaders and several of its disenchanted staffers. <a href=\"http:\/\/www.wired.com\/2015\/05\/wikileaks-finally-brings-back-submission-system-secrets\/\" target=\"_blank\">Read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Andy Greenberg \u2014 Wired It\u2019s taken close to half a decade. But WikiLeaks is back in the business of accepting truly anonymous leaks. On Friday, the secret-spilling group announced that it has finally relaunched a beta version of its leak submission system, a file-upload site that runs on the anonymity software Tor to allow uploaders [\u2026]<\/p>\n","protected":false},"author":76,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[77,13,16,1412],"tags":[],"class_list":["post-14172","post","type-post","status-publish","format-standard","hentry","category-hacking","category-open-access","category-open-source","category-privacy"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/14172","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/76"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=14172"}],"version-history":[{"count":2,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/14172\/revisions"}],"predecessor-version":[{"id":64742,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/14172\/revisions\/64742"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=14172"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=14172"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=14172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}