[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip / qa] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology

[Advertise on 4chan]


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


File: 1633896514056.jpg (1.54 MB, 4032x3024)
1.54 MB
1.54 MB JPG
Hi /g/.

I wanted to know if you guys have any advice on how to safely leak photos. I work for a Fortune 100 company and there's some extremely fucked up shit going on that I've brought up to senior management many times. Basically a really bad problem that affects all of us working there and our clients. No one will listen to me and I'm absolutely at a loss for what I should do at this point. I know that if I leaked some photos to some place like Reddit, there would likely be a lot of public backlash. I'm just really afraid of doing this because I'd be breaking all kinds of NDAs and, if I'm correct that it would end up on the news or something, I might be held accountable for damages in the tens of millions if they found out it was me. I have a few questions:

1. Can I trust a program like FileMind to scrub EXIF data from photos, or is that not enough to cover my tracks with files if my company decided to come after me with people who know what they're doing?
2. Is there any other kind of data embedded into files that will fuck me?
3. I don't know much about VPNs and other general stuff about staying anonymous and not leaving a trail on the internet. Would it be easy to hide my tracks without much know how?
4. Is there perhaps some sort of whistleblower platform on TOR that will basically leak stuff for me so I don't need to directly interface with the place where something is leaked?

plz halp
>>
>>84453991
no one will believe you anyways. just quit the job
>>
>>84454007
It's not just a written accusation. I have a bunch of photos that any idiot watching the news would be disgusted by. And the photos themselves easily prove that they were taken within a company building.
>>
You could contact Project Veritas that way you dont have to worry about the technical aspects. They are very good at what they do.
>>
>>84453991
If you're not larping, here's what you can do I guess.
>Can I trust a program like FileMind to scrub EXIF data from photos
The retard-tier approach is to make screenshots of the original photos and leak these instead. If the contents are the only thing that matters, these will work as well.
>Would it be easy to hide my tracks without much know how?
Try Tails maybe and try to leak it in a public place/using good VPN?
>>
>>84453991
just call up the wall street journal and get in touch with a reporter, let them publish the images for you and theyll protect you as a source
>>
>>84454188
>screenshots
simply reencoding raw data into new files would work just as fine
>>
>>84453991
If you're looking for an organization to send them to, wikileaks is probably your best bet. I assume they have a TOR dropbox and/or documentation on how to properly share files with them.

For actually sharing the file, onionshare is an easy way to setup filehosting over TOR. If you do this you'll still need to setup secure communication with whoever your sending them to before hand which is hard. Maybe get a burner phone and hope they are smart enough to install the tor browser.

However, opsec is hard on the best days and doubly so when you're a retarded scrub. For instance, you've now asked this question on 4chan, a site that records your IP and already narrowed the company to just 100 places. If there's a big leak of something awful from a fortune 100 company in the next months, they will find this post, your IP, and wherever it came from. I hope you are currently on mcdonadls wifi or you're already SOL. Then again this is probably just a fedpost to asses /g/'s technical competence, so I want to make it clear that I have done nothing illegal and do not condone leaking any trade secrets or other private data.


>>84454269
Absolutely never, ever trust a "journalist".
>>
Just post it here for lulz
>>
>>84454319
How long does 4chan keep its IP records for?
>>
Aren't there whistleblower laws to protect people in situations like this?
>>
Just post here nigga
>>
>>84454414
He's American. Did you forget Snowden already?
>>
>>84453991
i would use the $TORFUNNEL option
put $TORFUNNEL in the name area of your post and it will funnel your post through tor
>>
>>84454137
I've actually never heard of them, but that seems like it could be a great avenue, if they'll take my tip. Thanks anon

>>84454188
>The retard-tier approach is to make screenshots of the original photos and leak these instead.
Wow, I've actually considered trying that. I just don't know if the screenshot files themselves will have any kind of metadata that could lead back to my PC. Is it really that simple?

>>84454188
>Try Tails maybe and try to leak it in a public place/using good VPN?
Holy shit, I've never heard of Tails. Thanks for this advice.

>>84454319
>wikileaks is probably your best bet
Most wikileaks stuff I've seen has been more on the political/government side of things. Are they known to leak stuff of less 'consequence'? Having my photos leaked there would be a dream come true, but I couldn't really see it happening

>>84454319
>I hope you are currently on mcdonadls wifi or you're already SOL
I'm not savvy when it comes to this stuff, but I've got a plan that will put a handful of layers of insulation between me and this leak if I can find a way that I'm comfortable doing it. At the end of the day, even if I made this post on facebook, if the leak itself is completely sterile, it shouldn't matter that my IP is linked to asking these questions, right? If the leak itself is sterile, the only thing that could reasonably make them suspicious of THIS post is that I've mentioned I have photos right?
>>
>>84454414
>because the US is a beacon for human rights
>hymen rights, on the other hand
>>
If you are caught, it won’t be through meta data or other cyber sleuthing. It will simply be because people in the company know it is you who has been complaining about these issues and has access to this evidence
>>
>>84453991
Firstly, you're posting this thread, where you've decided to use a tripcode for some reason, you've stated you work for a F100 company and that you've brought up safety concerns multiple times. How confident are you that if the photos were to leak, your name would not be in the suspect pool? Ask yourself how many people have access to these photos, or have access to the physical location of these photos. Now combine those questions with the number of people that have approached management citing safety concerns.

In terms of stripping EXIF, I would suggest ExifTool by Phil Harvey.

Using Tor would be your best bet for leaking these photos. There is a web application called SecureDrop that many news organisations run through Tor for information leaks.

You can find a list of varioius SecureDrop instances here: https://github.com/alecmuffett/real-world-onion-sites#securedrop

Good luck.
>>
securedrop[]org
>>
Ok OP, I have a few questions first. How, where and by whom are those incriminating media files stored?
>>
If you end up using TOR, do not combine it with a vpn. I dont understand why you cant upload them to reddit, why would that generate a somehow different backlash from uploading it anywhere else?

If these are as outrageous as you say, you can simply upload it to any kind of heavily visited website and it will get noticed. Epstein's death was on 4chan an hour before it was on the news.

If the files cannot be traced back to you to you, I would put on a mask (you're lucky this is acceptable because of coof), go find some starbucks or other public wifi and post it on a public site. I dont think you need tor, tails etc. If you can pull off avoiding cameras on your way to a public wifi.

After writing all this, I think you're larping - I dont know how these files cannot be traced back to you, if this is some mega shady corporate shit, there wouldnt be that many people that know it, and you have already complained to corporate that you are not happy about whatever this event is.
>>
>>84454509
pretty much this lmao
>>
>>84454509
Yeah, I'm fully aware of that part. Obviously I can't really tell you how I plan to work around this, but I've given that quite a bit of thought and plan on working around it accordingly.

>>84454562
The tripcode has probably never been used by anyone else before, certainly not me. I'm just doing it because some faggot would always larp as OP in threads like this and try to derail it so people won't give their advice.

>>84454562
>There is a web application called SecureDrop
Thanks a bunch
>>
>>84454598
I'm going to add to my post after reading a couple of the other posts i didnt read earlier

You seem not to be worried that your IP will be connected to this post. Someone said he hopes you're at a mcdonalds wifi however this will count for very little if you're at mcdonalds under a camera and you've paid for a happy meal via credit card already.

If you've somehow mitigated your relation to this post on this site, your search history (please dont tell me you're using google) should not contain "wikileaks" "how to upload to wikileaks" "download tails" "is tor safe 2021" or any other such shit. Also, they cannot see what you're doing with TOR, but they can tell you're using tor.

You are clearly not experienced with this stuff, so using tor, tails other such tools will serve to complicate your operation. Finding a public wifi and uploading it through your normal setup will not. If you want, you can disk wipe afterward.
>>
>>84453991
Look into gangstalking prior to going through with this.
>>
>>84454407
There's a good chance the glowies have full access to the site's data and archive it.
>>
>>84454845
>good chance
4chan is hosted in USA, why do you think is that?
>>
>>84453991
Pull a power move and go as public with it as possible, if something happens to you the public would know.
>>
>>84454766
Also do not use a phone, ever. I wouldnt even take my phone with me when going to the public wifi, as they can see to which cell towers you are connected at any given time and can find you based off of it. Obviously if you're not answering phones as the leak happens thats strange so think about how often you get calls.
>>
>>84455054
And they ARE going to investigate you, as they are going to investigate everyone that ever complained about this. They're going to tell you they know it was you, etc. Know that normal people's reaction to being falsely accused is getting pissed off. You're not responding, so I can only hope you are reading, but I am going to sleep now, so I'll just say this, you are not larping I dont see any way that they dont connect this to you or at least strongly suspect you. This does not mean you will get charged because all you need to do is have reasonable doubt and not confess. And keep in mind companies can make life hard for you even if they do not have anything legal against you.
>>
>>84453991
you're only accounting for the technical details like exif data and ip address, it's way more likely that they'll just review security camera footage and deduce who it was based on who had access at what times.
>>
>>84455224
Also, dont do anything illegal. I am givng this information based on the understanding that you will use it in your pursuit of legal avenues to this predicament.
>>
File: 1635209962082.jpg (36 KB, 513x680)
36 KB
36 KB JPG
>>84453991
This may sound strange but you have an obligation to yourself to leak it under a VPN, this shit will eat you up and you're at a crossroad right now what this will do to you mentally in the future. Will you look back and remember that you did the right thing, or will you look back and feel even worse than you do now because you cant change the past?

Forget those affected, forget the morality of the situation, forget feelings of duty, think about your mental health and what this might do to you if youre this concerned already.
>>
>>84454465
>If the leak itself is sterile, the only thing that could reasonably make them suspicious of THIS post is that I've mentioned I have photos right?
It's evidence. An employee posts online "guyz how 2 leak photos". A couple of weeks later photos are leaked.
It may probably not be enough to convict you on its own (maybe someone else also had photos, saw your post and decided to leak them and use you as a scapegoat?). But once your post is traced, you're gonna be a big suspect. You have to realise that investigators don't magically read minds of every human on earth to find out whodunnit, they follow leads, and your asking here singles you out as a huge lead and a prime suspect. This means two things:
a) if there's any other evidence that could itself also be weak, taken together it could end up amounting to a solid case; and
b) the fact that you will now be a suspect could lead to people finding more evidence. For example, they could get a warrant and seize all your electronics and search for the photos. Or they could go to your ISP to see if there was any TOR traffic at the time you posted it, or subpoena apple/google for your geolocation data at the time of the posting to see if you drove out to post it in a coffee shop. Etc. etc.

Good job. I mean it's not like you just admitted to anything, but you signalled clear an unambiguous intent. IF it ever comes down to a serious investigation, and IF the investigators are made aware of these posts and obtain IP data from 4chan and correlate it to your ISP and trace it back to you, then you've just made your life a lot, lot more difficult.
>>
File: Empire_of_Dust_2.jpg (462 KB, 2100x1181)
462 KB
462 KB JPG
>>84453991
Just upload them to some porn booru board with mild stenography.
Pick a popular fetish among absolute degenerates (furry diaper porn or something), lightly encode your images (it could just be an image blend) in the fetish images and upload.
Consider commissioning truly despicable fetish art involving popular franchise characters or something.
Upload to booru sites and watch as autistic degenerates mass backup your data in an uncensorable genie explosion of archived tittilation.

After about six months of this, you can either announce that the data is buried in [image 20-50% of the dark web knows about] or else you will have melted into a unrecognizable castoff of humanity. Either way, no self respecting glowie will ever consider opening an investigation.
>>
>>84454044
pics or GTFO
>>
>>84454044
If you are stupid enough to believe the news, believe that journalists, will report on the truth or actually challenge the powerful, then you deserve to be caught.
Give it up and go full Snowden. See how your morality is rewarded.
>>
Make pictures of the evidence so it doesnt look like it came from you direcly but was taken by someone inside the company (deliberate angles etc) use a VPN from a location with stigma attached like Russia so it looks ideological and far removed, use Russian in your filenames, then leak it here.

Your company might still suspect you, sure, but you cant be held acountable on suspicion alone nor can you be fired, they need hard evidence and there isn't any, plus if its as damning as you say theyll all be running to save their hides and lawyering up instead of trying to find the guy responsible. Plus what is a company signaling if they boot someone that releases such damning evidence about some people working there?
>>
VPN is a really bad idea, Tor only for whistleblowing.
>>
>>84455482
Tor connections are infinitely more suspicious.
>>
>>84455375
Furries actually backup jack shit and don't care about their data at all.
Source: I'm into ponies and the difference between the multiple redundancy efforts to preserve MLP content, and the absolute complete laissez-faire attitude furries have to stuff being deleted forever for no reason is astounding. If you comission degenerate furry porn, it'll sit on like e621 or furaffinity or something, then when you announce it the admins might go "shit we don't want the legal involvement" and delete it, and it will not exist anywhere else and will be gone forever.
>Either way, no self respecting glowie will ever consider opening an investigation.
Anon, you can't be serious. Glowies are known for honeypotting with kiddie porn, do you think they'll be scared of some 2D drawn furry porn?
Glowies have also been confirmed to literally post in pony RPs (remember those Vault 7 leaks with sassy_cat.jpg?).
>>
1. Make pics of it
2. Send to journalist and use an email service that generates and sends the email
3. Tell them they should play it off as their own research
4. If anything does ever point to you claim you have no idea how journalists got a hand on it
>>
>hack your co-workers
>pretend to get hacked
>now everyone is hacked
>hackers leak company data via tor
ez
>>
File: Covfefe.png (218 KB, 886x492)
218 KB
218 KB PNG
>>84454414
>laws
LMAO yeah sure for people stupid enough to believe them.
>>
>>84453991
>go to homeless guy
>"hey wanna make 100 bucks and take down rich people?"
>>
>>84454269
anon. the wall street journal is owned by a fortune 100 corporation, amazon. And is part of the silicon cabal. it is not OPs friend. they will crush OP.
>>
File: pepe-the-frog-clown.gif (18 KB, 220x221)
18 KB
18 KB GIF
>>84455521
>remember those Vault 7 leaks
>>
File: 1637694166462.png (192 KB, 370x370)
192 KB
192 KB PNG
>>84453991
send it directly to the US department of labor or environmental protection agency. NDAs do not apply to criminal behavior.
>>
File: hersh.jpg (9 KB, 290x174)
9 KB
9 KB JPG
Seymour Hersh had a tactic where guys on the inside would read documents, then tell him about them outside.
No-one took any photos, or made copies, or otherwise left evidence. They just told him shit and he reported it.

I stand by the booru idea. Just hop on tor and post your description of the documents in the middle of 500 page a sonic slash fic thread.
>>
>>84455616
Sometimes I almost forget the US is basically a third world country.
>>
>>84455666
>send it directly to the US department of
so they can lose it like hunter biden's laptop? lol
what a rube
>>
>>84455739
>Suits cant have you killed because you can tell them a friend will leak if you die
yeah that worked real well for McAfee
>>
>>84453991
Exif data shows where the picture was taken, if the pictures were taken by someone you want to bust, leave it.

Use tor to leak. They could tell you were using tor, if you want a slightly-illegal cover, buy some weed off wallstreet market or something on tor also, and disavow all knowledge of anything else. Use a pawnshop laptop booting on tails, once, leak the stuff, throw away everything.

Send email to whatever journalist, say what this guy said >>84455525, and you're good. If tails isn't being updated much, look into heads (i've heard things). If that one hasn't been looked at, look at something else. Basically look at dark dot fail (which is a website)and do like you're buying drugs on the darknet with added layers of spy-tier paranoia. Because you need it, and it does work.

Good luck, my man. Use this covid mask shit and the cold to your advantage.
>>
>>84455739
inb4 OP's "damning evidence" is a picture of his company having a men's restroom and a women's restroom but no Xim/Xer restroom
>>
onionshare, securedrop
>>
Print the pictures out and send them to various news outlets
>>
>>84454407
Forever. This website is Cloudflared you utter fool. If you leak this any time soon, you will be a suspect. Read this. Take caution retard, if you don't wanna then leak them all in a torrent right here right now.
>>
>>84455817
this is how you get v&
>>
>>84455817
glowing nigger or retarded?
>>
File: 1593532206981.png (940 KB, 760x800)
940 KB
940 KB PNG
>>84455817
>>
>>84453991
If you're the only one trying to escalate the issues, and you have done so multiple times to management... everyone at your company will suspect you of the leak
>>
>>84455838
Explain
>>
File: 2wu2d7180ms41.png (1.85 MB, 1232x1232)
1.85 MB
1.85 MB PNG
>>84455745
obviously you keep the originals, and send copies to the EPA / DOL
>>
Tor is only compromised if the feds are after you for CP or drug trafficking. It's extremely unlikely that a private entity could track you through it.
>>
I'm still here and reading by the way. don't have much time to spend on responses but thanks to everyone with advice.

>>84455760
fuck you this made me laugh
>>
OP
Why did you post this on 4chan?
Why did you post this to a USA-hosted website behind USA-based Cloudflare?

I hope your disk is encrypted. You're gonna need to utterly destroy your previous disks, hope you have a backup disk- if they query Amazon, they'll know that you're the only guy at the company who recently bought an SSD.
Drop the data through SecureDrop with Tor, preferably with TAILS or Whonix and preferably at public wifi far away. Too bad you didn't have time to buy a directional antenna/learn how to fashion one, but oh well.
>>
>>84455869
Tor isn't compromised even then. There is heavy nuance to the capabilities of low-latency anonymizing networks like Tor in relation to different adversaries. Using Tor against a global adversary is more like trying to drive in a nail using a wrench instead of a hammer- it's not the right tool, but it can work.
>>
so what are the pics about is it cheese orgy or what can i see
>>
>>84453991
Do tripcodes increase anonymity?
>>
>>84455375
>>84455521
Hide it in some vanilla JAV VR that isn't "available" yet and you'll have 300,000 copies within the hour.
>>
Leak pics, then come out as a gay man
>>
>>84455758
Hang on mofo, EXIF data will only show where the picture was taken IF YOU HAVE THAT ENABLED and you're using a smartphone, because I doubt OP is going to be sneaking a fuckin Alpha or EOS in there incognito.

If you leave EXIF data alone, you also leave the phone model (!!!) and mundane shit like focal length, exposure, etc.

Be careful.

You're better off faking your own bullshit EXIF data than leaving any intact.
>>
>>84455817
>>84455858
In case anyone is genuinely retarded: all printers add a unique identification code to every page printed. It can be traced back to the point of purchase of the printer. It used to be "yellow dots", look it up. Then that got discovered (decades after it got implemented). Nowadays nobody knows what modern printers use, but it's basically guaranted that they have a newer version of the same thing that's just harder to discover.
It sounds crazy but the yellow dots are very well documented and it is very much a real thing. The only protection might be buying a used printer off craiglist or something, and even then if shit is serious enough it's best if you use cash and don't message the guy traceably.
>>
>>84455964
That doesn't work these days, you have to get SRS
See: Manning vs. Snowden
>>
>>84455877
are these photos of criminal environmental behavior by the corp? the EPA will rape them to death over that. especially with a democratic president.
>>
Sometimes from the photo alone you can tell what kind of camera took the photo. The number of pixels, the color it produces, etc. For example you can figure out if a photo was taken with an iPhone 13 pro max very easily with the right tools.
>>
just upload it here its already too late to protect yourself
>>
>>84455979
^^^
Lotta people don't know about this. IIRC they're still microdots, just harder to detect. If you buy something second hand, they could still trace it to whoever you bought it fron, bc now you have to worry about their opsec. If we're being 100% paranoid OFC.
Make sure whatever prints it is
1. Never connected to the fucking Internet. Ever. All of those God damn printer drivers phone home to check on ink levels and shit.
2. Gets the Office Space treatment immediately afterwards.
>>
>>84455992
OP should try on some programming socks and post, we can judge if he's going to sound believable
>>
>>84455758
>>84455968
one other thing that they could track you with is dead/hot pixels in the camera so make sure to only release resized pics
>>
>>84455929
>scandal ends up being a child abuse case
>CP randomly pops up during your fap sesh
>>
OP theres but one solution:

Take
Your
Meds
>>
File: tor_logo.jpg (19 KB, 800x450)
19 KB
19 KB JPG
Using thread to teach lurkers

>Is Tor anonymous? How does its anonymity work?
>[idiot] was caught using Tor, it is unsafe!
>Tor is funded by the feds. Funding must mean it's backdoored.
>Tor is not a perfect solution, so don't bother protecting yourself.

Tor works by using onion routing to proxy your traffic through three (or more) volunteer nodes, with one layer of encryption for each node used in a connection. Every connection uses a set of nodes (circuit) randomly chosen by the user. This is done so that each proxy only knows the address of the machine which sent it a packet and of the machine which it forwards a packet to.
Things Tor does not do:
- Cause users to act as relays by default/mandate/incentive.
- Employ dummy traffic during onion routing (However, there IS dummy traffic in between the client and the guard node to prevent observers from fingerprinting clients as running onion services).
- Induce significant latency intentionally.
- Mix packets together to be sent out in a different order and/or bundled together.
Things Tor does do:
- Pads all packets in the network to 512 bytes. The only time a packet is smaller than this is when it exits the network. Note that since onion service traffic never involves exit nodes, traffic remains padded end-to-end.
- Does everything in its power to protect against "traffic analysis" attacks, in which adversaries attempt to discern which parts of the network they need to attack to deanonymize a target.
Also note that Tor:
- Has a centralized directory authority (router list). (On the flip side, this does reliably prevent Sybil attacks)
- Is not built to defend against confirmation attacks.

Clearly, the intention of Tor, in implementing a low-latency onion routing network, is to be blazing fast while preserving user privacy and anonymity against most adversaries. It excels at this, and to quote the NSA, "[Tor is] the king of high-secure, low-latency anonymity. There are no contenders to the throne in waiting."
(1/4)
>>
>>84456006
I'd prefer not to say but thanks for that advice
>>
File: anonymous crowd.jpg (104 KB, 1000x1000)
104 KB
104 KB JPG
>>84456049
How can you be deanonymized when using Tor as a normal user (non-relay)?
There are various methods to do so, but the most prominent are the following:
- Timing attacks / Confirmation attacks
- Attacks on traffic exiting the network (MITM techniques)
- Protocol data leakage (browser metadata, p2p such as bittorrent, etc)
- OPSEC failure

Operations security is easy if you have a basic level of intelligence, and for web browsing one should avoid usage of anything but the Tor Browser so as to not leak metadata. Ideally one might avoid as many network connections and as much traffic volume as possible.

The most powerful method at the disposal of global adversaries is the Confirmation Attack. Such observers as the NSA and its allied spying agencies endeavor to log as many bytes that go through the internet backbone as possible, and they do this primarily by legally compelling ISPs and internet companies to do so, attempting to hack corporations if they can't get logs legally. Using these logs they can attempt to observe where traffic entered the network, and where similar patterns of traffic exited the network, and thus try to confirm a suspicion that two entities are communicating with each other.

It will take multiple time intervals to deanonymize you with this technique for a variety of reasons. First, understand the nature of what is required to perform a confirmation attack:
- The adversary must be able to monitor both client <-> guard traffic and final node <-> server traffic.
- If the adversary can monitor the traffic of N nodes out of M total nodes, the probability that they will be able to perform a confirmation attack on an arbitrary circuit is (N/M)^2. Control/monitor 50% of the nodes and you can attempt attacks against at most 25% of circuits.
(2/4)
>>
File: 1637798206100.png (242 KB, 369x360)
242 KB
242 KB PNG
>>84456034
>>
File: Tor Threat Model.png (196 KB, 462x806)
196 KB
196 KB PNG
>>84456059
Assuming that an adversary has put themselves in a position to launch a confirmation attack, there are a number of issues that will obstruct them:
- Traffic volume. There are a lot of users sending packets into the network and out of the network at the same time with many different and similar patterns, creating a large anonymity set.
- Latency. There is not much latency to Tor, but during that latency there is more time for other clients/nodes to send packets and thus add to the traffic volume and total anonymity set.
- Traffic padding. All packets that enter the network and are sent between nodes are padded to 512 bytes and are indistinguishable.
- Guard nodes. If there were no guards or if guards were rotated quickly then eventually after going through enough circuits it is almost certain (~100%) that a malicious entry node would be chosen, so Tor chooses a guard to be used for 2-3 months. Empiric data about this can be found here- https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters
- Onion services. When using one, you create a new circuit and your traffic will go through six relays (two users' circuits talking to each other), and your traffic does not exit the Tor network. This makes deanonymization of the users of onion services extremely difficult and unlikely. An onion service itself is more at risk here if an adversary knows their .onion address because they are long-lived, adversaries can attempt to hack the server, and intentionally flood it with traffic to cause patterns for confirmation attacks.
That said, it will be much harder to trace you if your activity is an IRC connection and not video-streaming or the upload of a 10GB file.
>>
>>84453991
GPL software
compiled yourself or paid for (redhat)
>>
File: tor users.jpg (21 KB, 768x432)
21 KB
21 KB JPG
>>84456070
To conclude: It will never be possible to deanonymize all Tor users all of the time. There are surely cases in which the multi-billion dollar might of world intelligence agencies will be able to string together various methods of timing attacks, browser & client exploits, opsec failures and old-fashioned social engineering to suspect and confirm links between Tor users and their correspondents. However, it would do well to not think of Tor as a cure-all for online anonymity, to compound its use with various other tools and techniques, and to understand that use of low-latency networks such as Tor to evade global adversaries is akin to drving in a nail with a wrench instead of a hammer- you could do it if you wanted to, but it is not the optimal way.
All the same, why not use it? You protect your privacy, drastically reducing the power of governments and corporations to influence human behavior, and can be anonymous if you put in some effort, especially if sticking to communication within the network. There is no reason not to use Tor- perfection is the enemy of the good.
(4/4)
>>
>>84453991
Use MS paint or screenshot it, it's that easy.
Then post via tor I guess.

But it depends completely on what it is and what the power that be think about it:

>It's about some discrimination of BIPOC or gays or something like that, or maybe allowing racism
In that case, it doesn't matter, you'll be flocked by lawyers to protect you, and media will protect you too

>It's just a company detail that's not really political
Then, they'll try to sue you but that's about it. Be concerned about the company tieing the information itself to you, not the internet, but because you brought the issue up, what you had access to, what is in the photos etc

>It's threatening to the establishment
The media, all corporations and governments will be against you. You need to be very careful. Wikileaks might not help you. Veritas might. National-Justice would probably publish it. Dumping it on reddit will probably just get it deleted.

But be aware, it won't be such a big scandal. The media will just deny it so people won't believe you.
>>
Just make sure nothing can be found on your personal devices. Then leak at public wifi yada yada you know the drill.
>>
>>84455758
open picture on linux, print screen, open in gimp, export as PNG.
>>
>>84456081
If there are political implications just send it to the side that would benefit from it becoming public knowledge.
>>
>>84454465
>I've actually never heard of them
That's the power of the traditional media at work. Glad that anon mentioned Veritas
>>
>>84456021
True. Mind you just to be absolutely clear, not connecting the printer to the internet doesn't protect against printer tracking because that contains the serial number of the printer, and that can be traced back to the point of purchase even if the printer was never ever connected to the internet or anything else. So again, you gotta somehow untraceably acquire a printer with cash.
>>
File: 1636967543769.jpg (480 KB, 1588x2382)
480 KB
480 KB JPG
>>84456058

https://www.epa.gov/enforcement/report-environmental-violation-general-information
>>
>>84456059
>>84456077
the tl;dr is just use a mixnet
oh wait nobody's made one yet because "muh too slow!" lmao
>>
>>84456121
NO. The only political parties are the ones like the Libertarian Party, Green Party, US Communist Part, etc.
>>
>>84456141
Exactly. High-latency stuff is far more resilient to global monitoring.
>nobody's made one
Well, I am sure some people do this with bots. Aside from the up and coming Nym (not happy about it being tied to a crpyto), there are very few publicly used nets.
>>
>>84453991
On the off-chance you are not bullshitting
>1 - The best way to fuck metadata is using stupid simple solutions which "re-take" the photo, like for example print-screening the photo and pasting in into mspaint and saving. Rinse and repeat in different ways for better effect
>2 - Resolved by 1
>3 - I would highly suggest using a fresh VM and ideally a chain of VPNs (some of which are set up by you in remote countries) - that still does not mean it's impossible to track you back, but it's very difficult. I would suggest befriending a skilled sysadmin
>4 - Using what I described in number 3, you can quite safely use basic shit like protonmail to send it out to who you want. There will always be some media that will pick it up. Or you can just dump it here. 4chan is a gateway to the world for psyops. Remember videos of chinks falling dead in the streets from the first month of the memeflu?
>>
>>84454465
https://www.projectveritas.com/tip/
https://www.projectveritas.com/tip/
https://www.projectveritas.com/tip/
https://www.projectveritas.com/tip/
https://www.projectveritas.com/tip/
>>
>>84456175
Yeah, I meant more like, nobody's made one that's easily usable for a normie, let alone that's become popular. Popularity is kind of necessary for an anonymity network - sure you can inject bot traffic but ultimately without any real users it does still leave you vulnerable to timing attacks for example.
>>
>>84456141
You can have fast and private and secure with a denentralized centralized website that uses a javascript server on the clients that utilized palisade to broker web request of others and requires at least three client_cum_servers to answer a request and make it impossible the the client_cum_server to ever know what it has just served.
>>
This is why males are scared of fighting back
They are too worried about the consequences
Fight back who cares if they sue or lose job
Snowden is still in Russia but he had the massive balls to leak the info but we failed him to use his info to tell the govy to fuck off
>>
>>84456195
Bot example, you either have to commandeer a phsically nearby device for deniability (you know, to participate and distribute updates/commands) or use the accessible low latency nets and just send data over them very slowly while you stream something else as cover.
>>
>>84456207
I barely understand what you just said, but how is this different from an onion network? Sounds like that's literally what it's going to be, just a bunch of nodes proxying requests, and some encryption to make sure none of the nodes can see what they're doing. The fact that it's javascript vs. using node software like tor doesn't fundamentally change anything, and the same attacks would apply.
>>
>>84454044
if this is blizzard post it on /v/ and watch the shit hi the fan
>>
>>84456141
>There is no public mixnet for whistleblowing in 2021
fukken kek.
>>
>>84453991

Veritas is your best bet. They are the closest thing to actual whistleblowers at the moment.

Do not bother with Twitter, Reddit or the likes. Those are owned and controled by the establishment.

Look into Gab as well, some people there can help depending on what it is.
>>
>>84454948
unironically this
more so if you're the only one in the company that ever brought the issue to the management. You're probbly already on their watchlist.
>>
>>84456249
Wait is there actually one? I was honestly very autistic about this years ago and then got tired.
What is it, I'd like running a node if there is one that's actually in practical use.
>>
>>84456058
What kind of "fucked up shit" are we talking about here? Can you please give us more details without compromising your opsec?

Anyway, you should be aware that
what Project Veritas is a right-wing leaning group and they will not publish your stuff if it don't fit to their narrative.
You should take a look at newspapers websites, some of them have SecureDrop or other types of Tor dead-drops.
DDoSecret can publish things too, mostly left-wing leaning but they will publish anything as long as it's really "fucked up" like illegal stuff your company did.
>>
>>84456262
Oh SHIT, he brought it up with management? I didn't read that.

OP, combined with posting here, probably searching online for privacy tools with bad opsec, and doing that at work, anonymity may not be the right path to take.
>>84456273
No, I was being serious. It is crazy that there is no high-latency distributed network for whistleblowing in 2021. Well, I guess you could send your message in a bunch of fragments with i 2 p - b o t e or upload it to some blockchain, but generally there isn't a commonly accessible way ;(
>>
>>84456253
gab is run by fucking tech illiterate shitstains and dumping it on a dead php forum is less risky than trusting rob monster professional retard with privacy.
>>
Perhaps third parties can find their way inside somehow, and leak the data that way?
>>
>>84453991
TailsOS.
>>
>>84456276
the only people who think they are 'right wing' are psychotic npc non people who don't have a functioning brain.
>>
>>84456289
>No, I was being serious.
Dang, you got my hopes up for a moment.
I know there were (are?) various academic projects, including ones that seemed really sound and were working on implementation, so I got excited that they might have actually finally put out a working version for general use. Damn, I guess we continue waiting for implementation and adoption then.
>>
>>84456276
>what Project Veritas is a right-wing leaning group and they will not publish your stuff if it don't fit to their narrative.
>You should take a look at newspapers websites
lol
https://youtu.be/251avWRO7eo
>>
>>84456262
Or if you're patient, just wait until they fired some other employer before release it to shit the suspicion
>>
>>84453991
>assuming it's not a bait
posting here with a long post and so much details is already massive opsec failure on your side. If you are not that tech savvy, i bet you've already made some websearches and visited some websites prior. Depending on investigation scale you can be singled out. if you really gonna follow upon that be ready to lawyer up your guts, worst case - flee the country.
>>
>>84455979
I'm didn't even know that. That's scary.
>>
>>84454465
OP please don't listen to these retards recommending Project Veritas. Everything they have done so far has been proven fake. Just a bunch of faggots trying to spread fake bullshit for their glorious leader Trump

Download Tails and put it on a laptop. Take it somewhere else (public wifi) and send the stuff through TOR/Onion share
>>
>>84456314
Loopix was one such implementation, the Nym project is implementing it with a pay-for-bandwidth model using their own NYM token. Not a ponzi scam like many crypto assets since actual value exchange would happen that way.
>>
>>84456240
You basically have a website that doesn't know what it is doing and you have other computers functioning as 1/3 of a server and no single computer can determine what it is they have served up. If you connect to such a thing over tor it would make the website resistant to compromise because there is nothing to compromise.

Imagine defining your own 4chan board and encrypted content is sent to one server, the name of the content to another, the key to a third and that key is only used to negotiate the intial conversation with the pseudo server. After that you have direct connections to the three servers and the broker server is no longer involved. the three servers are unable to see everything going on and all user content gets distributed between the three.

Palisade is a form of encryption where you can perform operations it it without decrypting.
>>
>>84456276
>>84456307
given how insane left most places have become being "right wing" means nothing

>>84456329
is that why the FBI raided the fuck out of them? Or why they have never lost a lawsuit? because they are fake? Please try harder retard
>>
Oh I see, the Project Veritas shills are still here, can you tell who is funding PV? So we can all understand how it's a very unbased group.
>>84456307
>>84456316
>>
>>84456326
linux having bad printer support is a feature
>>
>>84456329
>Everything they have done so far has been proven fake.
See that is what I am talking about. If the leak is uncomfortable for them, they just pretend its fake.
>>
>>84456319
>missed that he brought it up within the company
damn, im braindead monke, go big or go home and find some place to lay low before shit is gonna blow up
captcha Hades
>>
>>84456329
i would advise for op to do his own research and decide who he trusts and ignore 4chan randos calling everyone they dont like 'right wing'
>>
>>84456337
Motherfucker just use Tor+ freenet.
>>
>>84456345
>Hurrrrr I'm a retarded trumpfag

Kill yourself. PV is fake bullshit. Nobody is going to bother sueing them for making fake videos about fake votes. Park your car in the garage, turn on the ignition, and have a nice nap dipshit.
>>
>>84456348
everyone who disagrees is a shill, a bad actor's guide for online conduct
>>
>>84456329
>Everything they have done so far has been proven fake

source: Snopes.com article and MSNBC reporting

>>84456348
what is this even suposed to mean? they mostly get donation, are you stupid?

>>84456362
lmao baseless claim, sure I can see them not wanting to report on something that is bad for their main demographic but may I remind you they held on publishing a diary by a Biden family member because they thought it was fake and the FBI raided them for it?

>>84456377
edgy, are you aware they have a entire room covered in lawsuits they won? That they just won a suit against the NYT? Cry harder, maybe tell OP to contact CNN
>>
Do IRC over TOR
>>
>>84456389
real shit
>>
File: 1610838258206.png (91 KB, 742x757)
91 KB
91 KB PNG
>>84456348
These are the people who this retard trusts to fact check
>>
>OP asks how to properly leak a file
>Retarded chimps throwing their project veritas shit all over the place

God you guys really are autistic. Can't even remain on subject.
>>
>>84456371
freenet does not work over tor
>>
File: 1607054275818.gif (3.38 MB, 524x524)
3.38 MB
3.38 MB GIF
>>84456377
>>
>>84456436
when you want to leak the truth you got to journalists not establishment propaganda outlets like nyt
>>
>>84456453
>Project Veritas
>Journalists

Yikes
>>
>>84456453
Keep your politics out of /g/ you weak-minded jewniggerfaggot.
>>
>>84456436
>OP asks for whistleblower tips
>people reccomend many opitions, including Veritas
>anti-Veritas retards start regurgitating CNN worthy takes and suggesting nothing

not our fault the MSM Internet Defense Force feels the need to defend propaganda outlets.44
>>
is briar trustworthy? if so someone can drop his briar link for op to share, then publish it wherever. Assuming op has a burner phone available.
>>
>84456491
Jesus Christ. Why are newfags still posting this shitty macro after so many years?
>>
OP just start an onionshare link, post it on TOR somewhere and just let people start downloading it. They can then take that info and leak it for you. Simple, easy, discreet
>>
File: 1637207600153.jpg (252 KB, 720x720)
252 KB
252 KB JPG
>>84456506
>>
just turn the photos into a meme that way you can say it's a joke and you were just pretending to be retarded if it gets traced back to you.
>>
>>84453991
Send it to press, there are laws in place that would prevent them from disclosing your information.
>>
>>84456572
press break laws too, a lot.
>>
>>84456572
that is adorable, he thinks the press gives a shit about laws or ethics!
>>
File: 1637618722858.jpg (1.04 MB, 1280x840)
1.04 MB
1.04 MB JPG
>>84453991
Just leak on 4chan retard. 4chan auto removes data from pics i believe.
>>
>>84456566
Ah yes. OP is technically covered under parody law
>>
>>84456624
alternatively get it to alex jones and make it sound like the gay frogs made him say it, would be maximal meme
>>
>>84454137
>>84454137
> Project Veritas
Do not contact these clowns.
>>
File: suddenly.png (225 KB, 384x304)
225 KB
225 KB PNG
>>84453991
>OP post is very detailed
>shits going down in Fortune 100
>brought it up to senior management
>most likely is on the company internal watchlist
>most likely posted through clearnet, from his own house
>3 hours ago
>mfw i realized that OP is probably dead
>>
>>84456655
he can if he wants to, op should do his own research and decide for himself if he trusts them and not be swayed be 4chan to form his political opinions like an actual fucking retard would.
>>
>>84456657
OP committed suicide by 2 gunshots to the back of the head, Clinton style.
>>
>>84456665
Shut the fuck up and go back to pol you boomer faggot
Delusional fucking moron dyor and send sensitive info to someone in the process of getting an anal probe from the feds fuck off and kill yourself in 2 weeks
>>
>>84456697
bruh, you need to chill tf out and let people form their opinions themselves. anything else is mental retardation on the level of a mac user.
you are worse than those qanon dipshits i swear to god. mcfucking sodomize yourself.
>>
>>84456717
I said shut the fuck up and go to pol dipshit. Fuck you and your dumb fucking 'opinions'. I'm of the opinion that if you point a gun at your head and you pull the trigger nothing will happen: go do some research faggotm
>>
>>84456697
Go back to /pol/
>>
>>84456755
see >>84456389
>>
is he dead?
>>
>>84456655
schizo or fed?
>>
>>84456371
>he doesn't solve problems that don't yet exist.
>>
>>84454407
You can't know if or when they were deleted. As such you should act as though it is indefinitely.
>>
>>84454465
>Most wikileaks stuff I've seen has been more on the political/government side of things. Are they known to leak stuff of less 'consequence'? Having my photos leaked there would be a dream come true, but I couldn't really see it happening
AFAIK wikileaks just publishes everything they get and they seem to have their shit together (in terms of securely accepting files and not outing people). Presumably they have this info on their website under their contact info.

>I'm not savvy when it comes to this stuff, but I've got a plan that will put a handful of layers of insulation between me and this leak if I can find a way that I'm comfortable doing it. At the end of the day, even if I made this post on facebook, if the leak itself is completely sterile, it shouldn't matter that my IP is linked to asking these questions, right? If the leak itself is sterile, the only thing that could reasonably make them suspicious of THIS post is that I've mentioned I have photos right?
Bruh. You're literally retarded. You never discuss your opsec (because you're giving away information, even if you think you're be oh-so-clever by leaving out details). To give you an analogy you might understand, you're essentially a villain in a bad movie monologuing about your plan. On top of this you're sitting here trying to rationalize why people wouldn't suspect you.

You are legit in over your head. If it's truly that bad, go to the police. If not, keep your job.
>>
>>84455739
This is not a hollywood movie spy thriller. If OP leaks a bit of it, gets investigated, then tries to blackmail them, *he will be charged and convicted with blackmail*.
>>
>>84454414
Hahaha I needed a good laugh
>>
>>84456183
VPN you pay are no more anonymous than your ISP. Proton is burned, the keep logs and give them to investigators.
>>
OP clearly got v& and now a bunch of bots were released to derail the thread
>>
For fuck sake OP use your brain.
Use a Linux live CD/DVD in a laptop (use an external USB DVD/CD drive if you don't have access to an old laptop)
Disconnect everything else (internal hard drive).
And use McDonald's WiFi.
DO NOT USE TOR OR TAILS those are under surveillance.
And use an EXIF cleaner.
SLAX linux would be good for the task.
>>
>>84458114
Rip OP, another unfortunate reaction to the vaxxine, no one's fault really. Should just have dumped his material, even though I doubt anyone will care if society is ok with billionaires having paedo islands.
>>
>>84456623
>from pics i believe.
Source: i believe
>>
Use Tails and give them to Wikileaks.
http://rpzgejae7cxxst5vysqsijblti4duzn3kjsmn43ddi2l3jblhk4a44id.onion
>>
Just do it OP and say fuck it to the consequences. The worst they'll do is blacklist you from society and ruin your life, but at least justice will be served. This is why these companies get away with literal murder, because everyone is too fucking scared to deal with the repercussions of doing the right thing. This is why things are the way they are, because they've managed to scare everyone from doing the right thing. I wish I knew you personally because I'd leak them myself and take full responsibility. They already fucked up my life so I have nothing to lose at this point.
>>
>>84458239
scenario a:
>ip address for mcdonalds is attached to the leak
>subpoena ISP
>ISP gives customer information saying it's at this specific mcdonalds
>subpoena that mcdonalds for security footage as well as any businesses with cameras that can see its parking lot
>cross reference any names that paid for food/drink with employees or people that have had access to the place the pictures were taken
>case closed
scenario b:
>ip address for mcdonalds is attached to the leak
>subpoena ISP
>ISP gives customer information saying it's at this specific mcdonalds
>subpoena google and apple with a geofence warrant, find phones that have been to the mcdonalds and the location the pictures were taken
>case closed
god I hope you're not an actual criminal in real life because you would suck ass and be caught immediately
>>
Man I'm reading a lot of these posts and am genuinely disappointed to see how many people fell for the fear mongering meme spread by this bullshit government. You all should be ashamed of yourselves. Fuck money, fuck a "normal life". None of you have the right to complain about anything.
>>
>>84455054
^ This.

I'd live boot TAILS to RAM and obfuscate your MAC address then go somewhere that has public wifi but broad enough to ensure you're not easily identified. For example a crowded parking lot with your license plate facing away from structure would do nicely.

You have time to learn so be in no hurry. A burner phone bought for cash, used for wifi (no SIM card) then smashed and discarded gets rid of anything interesting (no phone means no device with the MAC address used for the contact).
>>
>>84458435
There's people suggesting to use a VPN here, can't get more retarded than that.
I am suggesting him to avoid leaving proof, not total anonymity.
Also I never said he should have his phone on him.
>>
>>84455614
Never trust anyone else. That's stupid.
>>
>>84455739
They can investigate then kill both of you. You aren't a professional and larping is deadly. Keep everything dead simple with zero Hollywood faggotry.
>>
>>84458435
>>cross reference any names that paid for food/drink
Didn't realize you mentioned this.
Why in hell would you use your card?
Use cash.
>>
>>84453991
If I ran a megacorp I'd hide invisible water marks in literally everything my employees see lmao
>>
>>84455968
You could remove the EXIF data from pics you send but keep the originals suitably hidden in case of future need.

>>84455979
^Don't print anything ever, and printed pages can carry microDNA. Never send physical objects.

You can also replace your phone and delete any pics ever taken and saved using it or alter their EXIF data to match your new phone.

>>84456209
Snowdens life is fucked. Stop being stupid. It's easy enough to whistleblow anonymously if you're not an attention whore.

OP should not use a US agency or media. Leak that shit via Tor to a variety of foreign papers in India and Asia (letting each know you've sent it to multiple papers so the first with the scoop wins). It will percolate back if the info is good.

Everything in the US is untrustworthy. Everyone in the US is untrustworthy because anyone can be forced or tricked into doing anything. No political entity or news provider in the US can be trusted because lawsuits.
>>
>>84458603
If I ran a megacorp I'd hide invisible watermarks in my employees when I had their heart plugs installed.
>>
File: 1618607214987.png (128 KB, 1267x690)
128 KB
128 KB PNG
>>84454137
Veritas literally just got owned by the FBI. Why the fuck would you trust sensitive info to some organization that is currently being investigated by the feds, retard?

>>84453991
This >>84454509

Whistleblowers are easy to catch, especially if they were vocally displeased about whatever they're blowing the whistle about prior to actually doing it. You WILL get caught. Your only viable option is to leak everything in a very public way so then your company has no choice but to fire you because you aired out their dirty laundry, thus making yourself a martyr and hopefully landing you with a new job elsewhere.
Protip: That last bit isn't going to happen unless you start a new career with a nonprofit or as an investigative journalist. You'll just end up committing career suicide.
>>
>>84453991
big companies have anonymous reporting systems like ombuds, use that and don't be a fucking idiot. the entire point is that you can bring up any safety or compliance issue and completely bypass management. ombuds will do a full investiation
>>
1.Scrub it with a metadata remover or edit it in ImageGlass.
2. Watermarks can be embedded into files but its usually done by porn artists trying to stop people sharing paywalled content. If you grayscale or compress the image it might go away. screencappping it usually does nothing
3. 7 proxies, + VPN
4. Maybe. Who knows, I'm unfamiliar with that stuff

5. Good on you for tripfagging
>>
OP buy a shitty phone and flash it w lineageos. Example: shitty samsung 2012 phone
>>
>>84456655
elaborate or shut the fuck up
>>
>>84458374
It's true. People used to use it against ignorant posters here. So much so that the admins implemented exif stripping on all boards except /p/ to prevent that. Try it yourself.
>>
>>84459450
>Watermarks can be embedded into files
This is the most retarded suggestion I have ever written but you can also take a photo of the display, especially a low DPI one, and the distortion will distort the watermark as well. Or a CRT.
You know, like redditors who don't know how to take a screenshot.
>>
any good stenography tools?
>>
>>84453991
1) ExifCleaner will work pretty well
2)Probably not
3 and 4) Try making a whonix VM and then using securedrop on it. If you don't trust journalists, try making a torrent, posting the magnet link on 4chan. Preferably use a VPN like proton.
>>
>>84453991
>>1. Can I trust a program like FileMind to scrub EXIF data from photos, or is that not enough to cover my tracks with files if my company decided to come after me with people who know what they're doing?
>2. Is there any other kind of data embedded into files that will fuck me?
take a screenshot of you're images

>3. I don't know much about VPNs and other general stuff about staying anonymous and not leaving a trail on the internet. Would it be easy to hide my tracks without much know how?
use tails

>4. Is there perhaps some sort of whistleblower platform on TOR that will basically leak stuff for me so I don't need to directly interface with the place where something is leaked?
probably
>>
>>84453991
> I work for a Fortune 100 company and there's some extremely fucked up shit going on that I've brought up to senior management many times

you doxed yourself when you wrote that.
>>
>this thread
LARPers LARPing as LARPers LARPING
>>
>>84453991
Don't leak shit to Project Veritas if your goal is to start a big shitstorm. The reason is simple, normies are taught by the media to hate PV for being a bery ebil wight bing owganization. They ignore everything said by the outlet, so you'd be wasting your impact potential there.
>>
>>84453991

No one would believe you anyways.
>>
just DO IT FAGGOT
>>
>>84453991
get a hex editor and check the images by hand, refer to the spec of your format.
do not use a public network as they can track you with cameras even though you managed to log in without your personal info, instead try to gain access to a random house's wifi, you can look up attack strategies, I'd say go with a social engineering one.
use tails as other anons said and destroy the computer
be as schizo as possible (in this case your life depends on it) but act normal. good luck
>>
>>84454319
Fuckin pussy
>>
Get someone else to leak them. Like leaving them in public somewhere, someone else finds them and posts on their own facebook because they are dumb.
>>
>Snowden
>Assange
>Galizia
>Epstein
We’re no kinder to whistleblowers than the totalitarian shitholes. We just pretend otherwise. Be careful OP.
>>
Bump for interest.
>>
Buy a raspberry pi in cash
Place it in some building using someone's wifi
Make it seed the files in all major trackers
Simple as
>>
>>84453991
Just quit your job.
>>
Btw the images may be watermarked with steganography with informations about you (thats how they do in blackmarkets, they watermark everything with the user's info so they know who leaked shit). So, watch out.
>>
>>84453991
>4. Is there perhaps some sort of whistleblower platform on TOR that will basically leak stuff for me so I don't need to directly interface with the place where something is leaked?
Contacting certain journalists and asking them to keep your identity private might be a good idea.
A oerson did something similar here, execpt he was a hacker and not an insider. If I remember correctly the host goes over the process of getting the news out.
https://darknetdiaries.com/episode/2/

>I might be held accountable for damages in the tens of millions if they found out it was me.
I doubt this would be the case, especially if you've made multiple attempts trying to get it fixed, as long as it's in writing.

Take care and I hope we'll get to hear about it soon.
>>
>>84453991
exiftool
onionshare
park in mcdonalds and use their wifi
install gentoo
>>
>>84456245
blizzard isn't a fortune 100
>>
>>84453991
Love how everyone is projecting their persecution complex here

Op probably found evidence that using “nigger” in a work email is explicitly grounds for firing and the heroic project veritas heroes will dress up like a pimp again and expose the white genocide
>>
>>84462501
How about you project yourself off a bridge dumb fucking tranny
>>
you're all braindead niggers.
>get polaroid camera
>make photo of monitor
>send polaroid to multiple kike journals
>add some short text explaining context
>>
go to public wifi
call indian tech support scammers
tell them to upload pictures for gift cards
actually give them gift cards for the work
>>
>>84462965
this, but sanitize the photos/copies. Digital communication can always be traced eventually.
>>
>>84454188
would guerrilla mail be good enough to use?
>>
>>84453991
Dude you're glowing.

The hacker known as 4chan isn't this fucking retarded.
>>
Exiftool to remove metadata https://exiftool.org/
Imagemagick to reduce the number of colors and avoid watermarks https://imagemagick.org/index.php

https://www.funkyspacemonkey.com/how-to-remove-exif-metadata
https://legacy.imagemagick.org/discourse-server/viewtopic.php?t=31703
>>
>>84453991
>I've brought up to senior management many times
It's already too late to leak them, everyone would know it's you.
>>
if you decide to go public as >>84454948 says, contact multiple parties, and inform them that you are talking to other parties as well, just in case something happens to you...
also, if you already brought up to management in detail (including those pics), you might as well go that route, because they WILL know it was you probably.
also, if you think they will sue you, you might as well be prepared to leave the country just in case. buy bitcoin and leave to brazil or some shit.
>>
>>84456755
Everyone knows the election was stolen and that's exactly why the feds are up their ass
>>
>>84456329
>source myass
>>
btw, if you do end up using tor, make sure to disable javascript (and CSS if posible)
also, maybe contact glenn greenwald (the snowden leaks journalist)
>>
>>84453991
Take your meds.
>>
Is OP dead?
>>
>>84464203

It is one thing if people suspect it was you or if they can actually prove it.

Unless we are talking about politicians with mafia ties or something, all they can do is throw you out and try to sue the shit out if you.

I would contact a trustworthy lawyer (maybe get a contact about some whistleblower plattform) and inform yourself how to not leave evidence in the first place.
>>
Regardless of what happens now, if a "huge leak" comes out everybody in this thread is going to remember OP and the glowies might ask the admins to give up their IP address.

You done fucked up OP
>>
>>84453991
just post it on 4chan, we will later blame ebaumsworld if FBI comes asking
trust us, you're safe here
>>
You should print them on paper, disguise yourself, and walk them to a newspaper office. Say you have something they can lead with
>>
OP here, I was just joking lol this thread blew up!
edit: tnx for the gold tho
>>
>>84461382
OP didn't say if the info goes just against the company or against something bigger, Assange Snowden and Epstein had information that could fuck people up in higher branches, not just a lowly fortune 100 company
>>
>>84465461
>ask
You think they don't have admin access?
>>
>>84465446
>It is one thing if people suspect it was you or if they can actually prove it.
that's if you believe in the justice system. things don't always work like that in real life
>>
>>84455521
>sassy cat
anyone still have that image?
>>
>>84456184
Project Veritas is fake, retarded news.
>>
>>84453991
OP. If you're serious, I can put you in contact with some reporters. Email me: c9592@protonmail.ch
>>
Just sap the wifi from your neighborhood McDonalds and upload from there. You'll be gucci my friend.
>>
Bump.
>>
File: 1635859976945.gif (56 KB, 220x220)
56 KB
56 KB GIF
>>84453991
>Try Tails maybe and try to leak it in a public place/using good VPN

what i would do is buy a burner laptop off craigslist or a far away pawnshop or in another city in a way it cannot be traced back to me, i would go to a place in another city with free wifi with no cameras and download a copy of T.A.I.L.S. (not furry p0rnz) with said burner laptop, then i would boot T.A.I.L.S. and using a dumb camera i bought at a trift store i would take a picture of what i want to leak in the burner laptop and upload said pictures of the burner camera to forums or where ever the fuck they need to be.

be sure to take a relative's car and use a face covering so cameras dont know it's you if it where possible to be backtracked.

Make sure that nothing that ties to you is showing in the pictures such as your phone, a reflection, or any of your belongings.

Maybe email the crap to project veritas?
>>
>>84454269
>get in touch with a reporter, let them publish the images for you and theyll protect y

hahahahahahahahahahha good one!
>>
>200 post and no one asked
What THE FUCK is in those photos?
>>
File: Sassy-Cat-Pic-640x607.jpg (94 KB, 640x607)
94 KB
94 KB JPG
>>84467133
found it nevermind now how do i activate this file do i need to do some kind of ritual with my VMs or some shit

>>84455421
i knew it all along journalists were hypocrites or paid shill from the start and they shove social issues down your throat

>>84455379
yeah OP do it faggot post it
one day when i work at a lgbt friendly company imma put hidden cameras in my uniform to record these abominations
>>
>>84456755
>>84456697
butthurt JIDF shill has no arguments against Veritas. You are shaking with snot coming out your nose right now. Scared
>>
>>84468441
the truth
>>
>>84468441
>tell me you didn't read the thread without saying you didn't read the thread
>>
If you post data like images they will be hashed and traceable from the network you pulled them from. Take a photo using a shitty camera of the picture printed on a piece of paper or aimed on an angle of your screen instead
Don't post on Reddit. Use a VPN and then tor and post in multiple locations at once. Once the information is out there, break the tails distro USB or cd , bleachbit your drives or anything that links you to this post and keep your head down
Tell no one. Absolutely no one. Not even your best friend. Keep it to yourself until the day you die.
>>
>>84453991
is this another pizzagate?
>>
>>84456345
>is that why the FBI raided the fuck out of them?
To be fair, that doesn't mean much in the modern "post-truth" world. It's very much a system where the left hand doesn't realize that it's part of the same body as the right hand.
>>
>>84453991
make a bzip'd tarball. encrypt using gpg public keys and send to users here. put it in those journo dropbox things over tor
>>
>>84453991
4chan is the place for this.

post em
>>
https://securedrop.org/directory/
Use this over tor, scraping exif is trivial. Good luck soldier.
>>
File: yAYoahX.png (2.69 MB, 2048x1889)
2.69 MB
2.69 MB PNG
>>84456655
kys troon
>>
File: 1634575777246.jpg (20 KB, 250x250)
20 KB
20 KB JPG
>>84456657
op has unironically been caught
>>
okay /g/
I'll give you all just a small sample of what my company has done..... This is very graphic please don't open it with anyone else around. I don't think they'll be able to know who I am from just this one pic.
https://files.catbox.moe/s9uwmu.gif
>>
File: numerous.png (3.02 MB, 1280x960)
3.02 MB
3.02 MB PNG
bunp
>>
>>84454007
At some point just quitting your job becomes negligence and in some cases culpability either ethically or legally. If you quit but don't raise the alarm, and something happens, you'll be the guy that could've done something, but chose not to.
>>
What about security cameras in public Wi-Fi hotspot locations?
They ID you with those.
>>
>>84472565
>no tripcode
sus



Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.