Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

SecureDrop

From Wikipedia, the free encyclopedia
Free software platform
SecureDrop
Screenshot from the SecureDrop Source interface.
Original authors
DeveloperFreedom of the Press Foundation
Initial release15 October 2013; 12 years ago (2013-10-15)
Stable release
2.13.0[1] Edit this on Wikidata (4 December 2025; 2 months ago (4 December 2025))
Written inPython
Operating systemLinux
TypeSecure communication
LicenseGNU Affero General Public License, version 3
Website
Repository

SecureDrop is afree software platform forsecure communication betweenjournalists andsources (whistleblowers).[2] It was originally designed and developed byAaron Swartz andKevin Poulsen under the nameDeadDrop.[3][4]James Dolan also co-created the software.[5]

History

[edit]

After Aaron Swartz's death, the first instance of the platform was launched under the nameStrongbox by staff atThe New Yorker on 15 May 2013.[6] TheFreedom of the Press Foundation took over development of DeadDrop under the nameSecureDrop, and has since assisted with its installation at several news organizations, includingProPublica,The Guardian,The Intercept, andThe Washington Post.[7][8][9]

Security

[edit]

SecureDrop uses the anonymity networkTor to facilitate communication betweenwhistleblowers, journalists, and news organizations. SecureDrop sites are therefore only accessible asonion services in the Tor network. After a user visits a SecureDrop website, they are given a randomly generated code name.[6] This code name is used to send information to a particular author or editor via uploading.Investigative journalists can contact the whistleblower via SecureDrop messaging. Therefore, the whistleblower must take note of their random code name.[3]

The system utilizes private, segregatedservers that are in the possession of the news organization. Journalists use twoUSB flash drives and two personal computers to access SecureDrop data.[3][6] The first personal computer accesses SecureDrop via the Tor network, and the journalist uses the first flash drive to downloadencrypted data from the SecureDrop server. The second personal computer does not connect to the Internet, and is wiped during each reboot.[3][6] The second flash drive contains adecryption code. The first and second flash drives are inserted into the second personal computer, and the material becomes available to the journalist. The personal computer is shut down after each use.[3]

Freedom of the Press Foundation has stated it will have the SecureDrop code and security environment audited by an independent third party before every major version release and then publish the results.[10] The first audit was conducted by security researchers at theUniversity of Washington andBruce Schneier.[11] The second audit was conducted byCure53, a German security firm.[10]

SecureDrop suggests sources disablingJavaScript to protect anonymity.[12]

Prominent organizations using SecureDrop

[edit]

The Freedom of the Press Foundation now maintains an official directory of SecureDrop instances. This is a partial list of instances at prominent news organizations.[13]

Name of organizationImplementation date
The New Yorker[14][3]15 May 2013
Forbes[14][15][16][17]29 Oct 2013
Bivol[14][18]30 Oct 2013
ProPublica[14][19][20]27 Jan 2014
The Intercept[14][21]10 Feb 2014
San Francisco Bay Guardian[14][22]18 Feb 2014
The Washington Post[14][23]5 Jun 2014
The Guardian[14][2]6 Jun 2014
The Globe and Mail[14][24]4 Mar 2015
Radio-Canada20 Jan 2016
Canadian Broadcasting Corporation[14][25]29 Jan 2016
Committee to Protect Journalists[26]12 May 2016
Associated Press18 Oct 2016
The New York Times[14][27]15 Dec 2016
BuzzFeed News21 Dec 2016
USA Today[14][28]22 Feb 2017
Bloomberg NewsUnknown
The Wall Street JournalUnknown
AftenpostenUnknown
Australian Broadcasting Corporation[29]28 Nov 2019

Awards

[edit]

See also

[edit]

References

[edit]
  1. ^"Release 2.13.0". 4 December 2025. Retrieved6 December 2025.
  2. ^abBall, James (5 Jun 2014)."Guardian launches SecureDrop system for whistleblowers to share files".The Guardian.
  3. ^abcdefKassner, Michael (20 May 2013)."Aaron Swartz legacy lives on with New Yorker's Strongbox: How it works".TechRepublic. Archived fromthe original on 29 July 2013. Retrieved20 May 2013.
  4. ^Poulsen, Kevin (14 May 2013)."Strongbox and Aaron Swartz".The New Yorker.
  5. ^Timm, Trevor (9 January 2018)."A tribute to James Dolan, co-creator of SecureDrop, who has tragically passed away at age 36".Freedom of the Press Foundation.
  6. ^abcdDavidson, Amy (15 May 2013)."Introducing Strongbox".The New Yorker. Retrieved20 May 2013.
  7. ^"Strongbox".The New Yorker. Archived fromthe original on 13 April 2017. Retrieved15 November 2013.
  8. ^Biryukov, Alex; Pustogarov, Ivan; Thill, Fabrice; Weinmann, Ralf-Philipp (2013). "Content and popularity analysis of Tor hidden services".arXiv:1308.6768 [cs.CR].
  9. ^Davidson, Amy (15 May 2013)."Introducing Strongbox".The New Yorker. Retrieved26 December 2013.
  10. ^abTimm, Trevor (20 January 2014)."SecureDrop Undergoes Second Security Audit". Freedom of the Press Foundation. Retrieved13 July 2014.
  11. ^Czeskis, Alexei; Mah, David; Sandoval, Omar; Smith, Ian; Koscher, Karl; Appelbaum, Jacob; Kohno, Tadayoshi; Schneier, Bruce."DeadDrop/StrongBox Security Assessment"(PDF). University of Washington Department of Computer Science and Engineering. Retrieved13 July 2014.
  12. ^Source Guide SecureDrop
  13. ^ssteele (6 December 2016)."Tor at the Heart: SecureDrop".Tor Blog.
  14. ^abcdefghijkl"The Official SecureDrop Directory". Freedom of the Press Foundation. RetrievedJanuary 29, 2017.
  15. ^Kirchner, Lauren."When sources remain anonymous". Columbia Journalism Review. Retrieved28 January 2014.
  16. ^Timm, Trevor (29 October 2013)."Forbes Launches First Updated Version of SecureDrop Called SafeSource". Freedom of the Press Foundation. Retrieved28 January 2014.
  17. ^Greenberg, Andy."Introducing SafeSource, A New Way To Send Forbes Anonymous Tips And Documents".Forbes. Retrieved28 January 2014.
  18. ^Chavkin, Sasha (21 October 2013)."Initiatives seek to protect anonymity of leakers". The International Consortium of Investigative Journalists. Retrieved28 January 2014.
  19. ^Tigas, Mike (27 January 2014)."How to Send Us Files More Securely". ProPublica. Retrieved28 January 2014.
  20. ^Timm, Trevor (27 January 2014)."ProPublica Launches New Version of SecureDrop". The Freedom of the Press Foundation. Retrieved28 January 2014.
  21. ^"How to Securely Contact The Intercept". The Intercept. Archived fromthe original on 26 August 2015. Retrieved9 February 2014.
  22. ^Bowe, Rebecca (18 February 2014)."Introducing BayLeaks".San Francisco Bay Guardian. Archived fromthe original on 24 February 2014. Retrieved20 February 2014.
  23. ^"Q&A about SecureDrop on The Washington Post".The Washington Post. 5 June 2014.
  24. ^"The Globe adopts encrypted technology in effort to protect whistle-blowers".The Globe and Mail. 4 March 2015.
  25. ^"CBC adopts SecureDrop to allow for anonymous leaks". 29 January 2016.
  26. ^"How SecureDrop helps CPJ protect journalists".Committee to Protect Journalists. 12 January 2016.
  27. ^Timm, Trevor [@trevortimm] (15 December 2016)."Nice. The @NYTimes launched @SecureDrop today, along with a really useful secure tips page" (Tweet) – viaTwitter.
  28. ^"USA TODAY launches secure whistle-blower site".USA Today. 22 February 2017.
  29. ^"ABC launches SecureDrop for whistleblowers to securely and anonymously contact journalists".ABC News. 28 November 2019.
  30. ^Sullivan, John (25 March 2017)."SecureDrop and Alexandre Oliva are 2016 Free Software Awards winners"(Press Release).Free Software Foundation.

External links

[edit]
Retrieved from "https://en.wikipedia.org/w/index.php?title=SecureDrop&oldid=1328197994"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp