2 min read

Anonymous to Launch Decentralized version of Wikileaks on Nov. 5

Bogdan BOTEZATU

September 14, 2012

Anonymous to Launch Decentralized version of Wikileaks on Nov. 5

Anonymous has blown the whistle about the release date of their newest project, a “massively distributed and decentralized Wikipedia-style P2P cipher-space structure” expected to enter the beta-testing stage on the 5th of November 2012.

According to the announcement on the AnonNews website, the new service, called TYLER, will become available on Nov. 5 and will serve as a publishing platform where users from around the world will be able to dump “evidence of illegality [,] corruption and fraud they have gathered.”

Although little data has been disclosed, it is sure that this webspace will substitute for Wikileaks, a notorious wiki-style portal where key persons have disclosed confidential government information, but which suffered numerous outages and attacks against its server infrastructure.

Rather than going for the conventional webhosting, Anonymous collaboratively developed a platform that blends technologies such as “FreeNet, TOR, GNUnet, e-Mule, BitTorrent I2P, Tribler” to distribute a copy of the material to other participants, who will then distribute it further, in a classical peer-to-peer style.

“From the 12th of December 2012, to the 21st of December 2012, people all over the world upload the evidence of illegality [,] corruption and fraud they have gathered to TYLER. Imagine we leak it all,” reads the press release.

The new platform will likely become a nightmare for anyone trying to take information off the web, since the content will be distributed worldwide and served by users with high levels of anonymity. A peer-to-peer infrastructure also has next to zero operational costs, which means that no payments are necessary, so law enforcement can`t follow the money trail.

The decentralized, peer-to-peer distribution model is not new in the cyber-underground. In June 2011, the TDL-4 botnet was switched to a decentralized command and control model, which prevented law enforcement from shutting it down or tracing its mastermind.

tags


Author



Right now

Top posts

E-mails claiming your computer was hacked and your privacy exposed - what you need to know (spoiler: you can relax - they’re bluffing)

E-mails claiming your computer was hacked and your privacy exposed - what you need to know (spoiler: you can relax - they’re bluffing)

July 29, 2021

5 min read
Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

July 16, 2021

3 min read
How to protect yourself against cyberstalking

How to protect yourself against cyberstalking

July 06, 2021

2 min read
The Top Five Security Risks Smartphone Users Face Today

The Top Five Security Risks Smartphone Users Face Today

July 02, 2021

4 min read
Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials

Phishing Alert: Scammers Use Fake SharePoint and DocuSign Messages to Steal Users’ Login Credentials

July 02, 2021

3 min read
Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger

Your Doxxing Dossier Will Keep Growing Thicker Until You See the Danger

June 30, 2021

2 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

The Perils of Online Dating: Spotting Romance Scammers Before They Break Your Heart and Your Bank Account The Perils of Online Dating: Spotting Romance Scammers Before They Break Your Heart and Your Bank Account
Alina BÎZGĂ

August 05, 2021

3 min read
Google Fixes Five High-Severity Flaws in Chrome 92 for Windows, Mac and Linux Google Fixes Five High-Severity Flaws in Chrome 92 for Windows, Mac and Linux
Filip TRUȚĂ

August 05, 2021

1 min read
Google Drops All Support for Android 2.3.7 and Older Google Drops All Support for Android 2.3.7 and Older
Silviu STAHIE

August 04, 2021

1 min read