{"id":31191,"date":"2017-01-12T22:41:47","date_gmt":"2017-01-13T03:41:47","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/wikileaks-proposes-tracking-verified-twitter-users-homes.php"},"modified":"2017-01-12T22:41:47","modified_gmt":"2017-01-13T03:41:47","slug":"wikileaks-proposes-tracking-verified-twitter-users-homes","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/wikileaks\/wikileaks-proposes-tracking-verified-twitter-users-homes.php","title":{"rendered":"WikiLeaks proposes tracking verified Twitter users homes &#8230;"},"content":{"rendered":"<p><p>    WikiLeaks wants to start building a list of    verifiedTwitter users that would include highly sensitive    and personal information about their families, their finances    and their housing situations.  <\/p>\n<p>    We are thinking of making an online database with all    'verified' twitter accounts & their    family\/job\/financial\/housing relationships, WikiLeaks tweeted    Friday.  <\/p>\n<p>    The disclosure organization, run by Julian Assange, says the    information would be used for an artificial-intelligence    program.ButTwitter users immediately fired back,    saying WikiLeaks would use the list to takepolitical    vengeanceagainst those who criticizeit.  <\/p>\n<p>    Twitter verifies certain users, such as world leaders,    nonprofit organizations and news outlets,with a blue    check mark beside their names so that other users of the    service can be confident about theposters' identities.    WikiLeaks, which has a verified Twitter account, did not say    whether it would subject itself tothe scrutiny it was    proposing. (Itwas also unclear whether, under its plan,    WikiLeaks would seek to uncover information about the financial    lives of Russian PresidentVladimir    Putinor President-elect Donald    Trump,both of whom are verified on Twitter.)  <\/p>\n<p>    Asked by journalist Kevin    Collier why it needed to build a database of dossiers,    WikiLeaks replied thatthe database would be used    asa metric to understand influence networks based on    proximity graphs.  <\/p>\n<p>    But the proposal faced a sharp and swift backlash as    technologists, journalists and security researchers slammed the    idea as a sinister    and dangerous abuse of power and privacy.  <\/p>\n<p>    This is a good plan. If you're Darth Vader,     Matthew Green, a professor who teaches cryptography at    Johns Hopkins University, tweeted.  <\/p>\n<p>    Timothy Berners-Lee, the inventor of the World Wide Web,    compared the WikiLeaks proposal to a piece of British    legislation that has been criticized as a massive boon to the    surveillance industry.  <\/p>\n<p>    Don't.even.think.about.it, he tweeted.  <\/p>\n<p>      Wikileaks founder Julian Assange      told Fox News host Sean Hannity on Jan. 3 that Russia did not      provide the organization with hacked emails from the Hillary      Clinton campaign. (Peter Stevenson\/The Washington      Post)    <\/p>\n<p>    Even the hacktivist organization Anonymous lined up against    WikiLeaks.  <\/p>\n<p>    This is a sickening display of intimidation tactics, it    said,    tagging the official Twitter accounts for the social network,    its support team and chief executive Jack Dorsey.  <\/p>\n<p>    Someread WikiLeaks' suggestion asimplying the    threat of harassment or violence.  <\/p>\n<p>    Isn't threatening to dox hundreds of thousands of Twitter    users a TOS violation? wondered Anil    Dash, a tech entrepreneur. (To dox a person is to release    documents related to his or her personal life in a way that    potentially endangers that person's safety. TOS stands for    terms of service.)  <\/p>\n<p>    Shnd't have to say, but leaking *&data collection* for    harassment etc have nothing in common with legit disclosures in    the public interest, said David Kaye, a California-based        U.N. special rapporteur on freedom of expression.  <\/p>\n<p>    Here are a few other reactions from Twitter.  <\/p>\n<p>    As for Twitter itself, the social network warnedin a    statement that WikiLeaks risked running afoul of its platform    policies if it published personal information    publicly.Posting another person's private and    confidential information is a violation of the Twitter Rules,    the company told The Washington Post.  <\/p>\n<p>    WikiLeaks did not respond to a request for comment    onTwitter's statement.  <\/p>\n<p>    WikiLeaks had already been in the news this week    afterU.S.    intelligence officials said they had    informationproving a link between the organization and    the Russian hackerssuspected of breaking into the    Democratic National Committee's emails in an attempt to sway    the presidential election.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2017\/01\/06\/wikileaks-proposes-tracking-verified-twitter-users-homes-families-and-finances\/\" title=\"WikiLeaks proposes tracking verified Twitter users homes ...\">WikiLeaks proposes tracking verified Twitter users homes ...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> WikiLeaks wants to start building a list of verifiedTwitter users that would include highly sensitive and personal information about their families, their finances and their housing situations. We are thinking of making an online database with all 'verified' twitter accounts &#038; their family\/job\/financial\/housing relationships, WikiLeaks tweeted Friday<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[],"class_list":["post-31191","post","type-post","status-publish","format-standard","hentry","category-wikileaks"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31191"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=31191"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31191\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=31191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=31191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=31191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}