Xnet, a wonderful Spanish activist group, has created the Anti-Corruption Complaint Box, a whistleblowing platform for the city of Barcelona that allows people to file anonymous claims in a Globalleaks repository, with their anonymity protected by Tor.
These best-of-breed tools for anonymity and accountability have often been the subject of government complaints and threatened crackdowns, but in Barcelon, the city government has endorsed the Complaint Box, advising Barcelonans who know about corruption to safely report it by using the platform. It's the first time a municipal government has endorsed Tor.
Xnet, as part of the Citizens’ Advisory Council of the Barcelona City Office for Transparency and Best Practices, launches this Anti-Corruption Complaint Box highlighting the following features:
What this digital device is, and how to use the new facility managed by the Barcelona City Hall, inspired by similar mechanisms already operating in civil society (for example, the XnetLeaks mailbox), and implemented with advice from members of Xnet who have also set up a working relationship with the GlobaLeaks platform.
* The debate on what anonymity entails is one of the most up-to-date and relevant themes of the digital age, especially in the wake of Edward Snowden’s revelations and, accordingly, we explain why Xnet has insisted on the need to guarantee true anonymity in a project like the Barcelona City Anti-Corruption Complaint Box which combats corruption and other damaging practices that threaten good governance in the city of Barcelona.
Xnet provides for journalists and citizens a FAQ service regarding the Box, explaining how it works, describing tools (for example Tor) which guarantee anonymity, and all the details relative to the first project of this type whose use is recommended by public institutions, and explains how this can be done.
Xnet installs a Whistleblowing Platform against corruption for the City Hall of Barcelona – powered by GlobaLeaks and Tor friendly
Daniel Moghimi, Berk Sunar, Thomas Eisenbarth and Nadia Heninger have published TPM-FAIL: TPM meets Timing and Lattice Attacks, their Usenix security paper, which reveals a pair of timing attacks against trusted computing chips ("Trusted Computing Modules" or TPMs), the widely deployed cryptographic co-processors used for a variety of mission-critical secure computing tasks, from verifying software […]
Infuriate your racist Facebook uncle this Thanksgiving with a Leopard RBG shirt.
It's hard to believe, but the latest installment of McMansion Hell's (previously) tour through the architectural monstrosities of America's tastleless elites is even better than the previous ones -- possibly that's because in this edition, editor/critic Kate Wagner is visiting Virginia's Fairfax and Loudoun Counties, these being affluent DC suburbs where beltway bandits and other […]
The more you use your computer, the more it becomes possible for others to use it too. Where there are anti-virus systems, there are hackers looking for a way to get around them. That’s why it’s important to get software that doesn’t just passively scout for viruses in the background. The folks behind GlassWire have […]
Knowledge is power. It’s a cliché, but sometimes things turn into a cliché because they’re true. If you’re making your way through the world of business and entrepreneurship, it only makes sense to read about the insights of people who have climbed that ladder before you. Trouble is, the modern workday doesn’t leave a lot […]
As much as some of us fear the loss of our jobs to robots, there’s one job we’re pretty sure they are welcome to: vacuuming. There’s nothing quite like kicking back and watching a robot vacuum do one of the most time-consuming tasks on the household chore list. And there are few ‘bots that do […]