{"id":56455,"date":"2015-04-13T12:00:54","date_gmt":"2015-04-13T11:00:54","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=56455"},"modified":"2015-05-05T21:25:51","modified_gmt":"2015-05-05T20:25:51","slug":"our-securedrop-system-for-leaks-now-uses-https","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2015\/04\/our-securedrop-system-for-leaks-now-uses-https\/","title":{"rendered":"Our SecureDrop System for Leaks Now Uses HTTPS"},"content":{"rendered":"<p style=\"text-align: left;\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/04\/securedrop-article-display-b-intercept-first-look-leaks-surveillance-spying.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-56456\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/04\/securedrop-article-display-b-intercept-first-look-leaks-surveillance-spying.jpg\" alt=\"securedrop-article-display-b intercept first look leaks surveillance spying\" width=\"540\" height=\"342\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/04\/securedrop-article-display-b-intercept-first-look-leaks-surveillance-spying.jpg 540w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/04\/securedrop-article-display-b-intercept-first-look-leaks-surveillance-spying-300x190.jpg 300w\" sizes=\"auto, (max-width: 540px) 100vw, 540px\" \/><\/a><em>8 Apr 2015 &#8211; <\/em>We\u2019re happy to announce that sources can now access our SecureDrop document-submission website\u00a0using HTTPS. Although\u00a0SecureDrop connections were already encrypted previously,\u00a0our new setup provides leakers with additional assurance that they are connecting with the authentic\u00a0<em>Intercept<\/em> SecureDrop and not an impostor.<\/p>\n<p style=\"text-align: left;\">You can visit our SecureDrop server by pointing\u00a0the\u00a0<a target=\"_blank\" href=\"https:\/\/www.torproject.org\/\" >Tor Browser<\/a>\u00a0here: <strong>https:\/\/y6xjgkgwj47us5ca.onion\/<\/strong><\/p>\n<p style=\"text-align: left;\">SecureDrop runs as\u00a0a \u201c<a target=\"_blank\" href=\"https:\/\/www.torproject.org\/docs\/hidden-services.html.en\" >hidden service<\/a>\u201d within the anonymous web\u00a0network\u00a0Tor. A hidden service is a special kind of server that\u00a0is\u00a0only accessible through Tor and has a\u00a0domain name ending in .onion (Tor was originally called The Onion Router because it works by creating layers upon layers of encryption to hide users\u2019 IP addresses).<\/p>\n<p style=\"text-align: left;\"><em>The Intercept\u2019<\/em>s SecureDrop installation\u00a0is\u00a0only\u00a0the third Tor hidden service to receive a browser-trusted HTTPS certificate, following <a target=\"_blank\" href=\"https:\/\/www.facebook.com\/notes\/protect-the-graph\/making-connections-to-facebook-more-secure\/1526085754298237\" >Facebook<\/a> and the Bitcoin website <a target=\"_blank\" href=\"http:\/\/blog.blockchain.com\/2014\/12\/03\/improved-security-for-tor-users\/\" >Blockchain.info<\/a>.\u00a0HTTPS provides two things: Confidentiality \u2014 data shared between web browsers and HTTPS websites is encrypted \u2014 and authentication \u2014 web browsers can verify that they\u2019re visiting the website the user thinks they\u2019re visiting. Authentication helps\u00a0prevent man-in-the-middle attacks, which occur when an attacker entices someone to open\u00a0an encrypted connection to\u00a0the\u00a0attacker\u2019s server by impersonating the real server.<\/p>\n<p style=\"text-align: left;\">Even without HTTPS, the connection between Tor Browser and our SecureDrop hidden service\u00a0was\u00a0already encrypted. Adding HTTPS provides a second redundant layer of encryption, and it also adds authentication. So if a source finds herself visiting a SecureDrop website that looks like it belongs to <em>The Intercept<\/em>, she can inspect our SSL certificate to confirm that it actually belongs to us and isn\u2019t a honeypot posing as our SecureDrop website \u2014 or at least confirm that this is the case according to\u00a0DigiCert, the certificate authority that issued our SSL certificate.<\/p>\n<p style=\"text-align: left;\">The future of combining HTTPS and the .onion top-level domain is uncertain because .onion is not an officially recognized top-level domain. But\u00a0the <a target=\"_blank\" href=\"https:\/\/cabforum.org\/2015\/02\/18\/ballot-144-validation-rules-dot-onion-names\/\" >gears<\/a> are\u00a0<a target=\"_blank\" href=\"https:\/\/tools.ietf.org\/html\/draft-appelbaum-dnsop-onion-tld-00\" >in motion<\/a> to get .onion recognized as a \u201cSpecial-Use Domain Name.\u201d We won\u2019t know for sure if we get to keep our SSL certificate until the <a target=\"_blank\" href=\"https:\/\/www.ietf.org\/iesg\/\" >Internet Engineering Steering Group<\/a> agrees on whether or not to make .onion a standard, a decision slated to be made in\u00a0October.<\/p>\n<p style=\"text-align: left;\">Until then, our sources can enjoy this extra layer of protection when they communicate with us through SecureDrop.<\/p>\n<p style=\"text-align: left;\">_______________________<\/p>\n<p style=\"text-align: left;\"><em>Email the author: <a href=\"mailto:micah.lee@theintercept.com\">micah.lee@theintercept.com<\/a><\/em><\/p>\n<p style=\"text-align: left;\"><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/2015\/04\/08\/securedrop-tor-hidden-service-now-uses-https\/\" >Go to Original \u2013 firstlook.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The new setup helps assure leakers they are connecting with the authentic Intercept SecureDrop and not an impostor.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-56455","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/56455","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=56455"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/56455\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=56455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=56455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=56455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}