Hacker News new | past | comments | ask | show | jobs | submit login

There's a humorous example of verification given in Assange's TED conversation, starting around the twelve minute mark: http://www.ted.com/talks/julian_assange_why_the_world_needs_...



This still leaves open the question: what happens if nobody can or will verify? What if the company in the cited incident had instead played the line: "We want to know who gave you those documents because they are fraudulent and we want to pursue libel action against the party who released them," or even, "if you don't turn over the source, we'll pursue libel action against wikileaks."

Alternately, what if a set of documents really are forged, but it's an inside job? The same person or persons who "leak" the document to wikileaks could then "verify" it to journalists "on condition of anonymity." The journalists would know that their sources are from the appropriate organization, but nobody would have all of the information necessary to connect the dots that the leaker and the verifier are the same person or group. I could definitely see this being used as part of a corporate power struggle (make a rival look bad, get him fired; or do the same to your boss) or a political struggle in government (use politically sympathetic career bureaucrats to generate a scandal for an incumbent six weeks before election day).




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: