If Government Kills You, This Company Promises to Blow Your Whistle


"So what if something happens to you?" A company called Dead Man Zero (DMZ) poses the question. "Especially if you're trying to do something good like blow the whistle on something evil or wrong in society or government. There should be consequences if you are hurt, jailed, or even killed for trying to render a genuine and risky service to our free society."
Well, Dead Man Zero says it can help you out in these kinds of situations. If the government (or some other entity) kills you to try to stop you from leaking important information, they'll leak it for you.
The organization says its services became necessary after Edward Snowden blew the lid on the National Security Agency's mass surveillance of the American public, and the Obama administration responded by "ordering federal employees to report suspicious actions of their colleagues based on behavioral profiling techniques that are not scientifically proven to work."
Vice contributor Joseph Cox spotlighted the service yesterday and explained its basics:
First, you upload your files, encrypted with a password, to a cloud storage service. Then you include this link, along with the password and an optional description of your material. The site will then add its own layer of encryption, too. You are then given your own unique URL to log in from, accessible only using the Tor browser.
If you don't log back into it once a day, week or month (those are the options), your documents and respective password will be published on the site, and sent to a list of email addresses that you provide in advance; most likely journalists you trust to do the story justice, or your lawyer. The site can also be accessed via a smart phone, assuming you can browse hidden services on it.
"If events overtake you, you can still overtake your adversaries," the site reads. For a user to upload their archive, they are required to pay 0.30 Bitcoin (around £70 or $120 at today's rate), and according to a counter on the site, 399 sets of documents have been uploaded, and 17 will be released if their owner doesn't log in within the next 24 hours.

DMZ didn't respond to his request for more information, but Cox points out some potential issues: First, no one knows who is behind DMZ; Second, as security expert Bruce Schneier has suggested about similar setups, it could give someone incentive to kill a DMZ user, or even just stop them from logging in; Third, the cloud's security could be compromised; Fourth, there's no guarantee DMZ will be around for years to come.
If you've got some secrets that you think will outlive you, and want to give it whirl, the address is "http://wntxyw6zdeos7ag6.onion".
Editor's Note: As of February 29, 2024, commenting privileges on reason.com posts are limited to Reason Plus subscribers. Past commenters are grandfathered in for a temporary period. Subscribe here to preserve your ability to comment. Your Reason Plus subscription also gives you an ad-free version of reason.com, along with full access to the digital edition and archives of Reason magazine. We request that comments be civil and on-topic. We do not moderate or assume any responsibility for comments, which are owned by the readers who post them. Comments do not represent the views of reason.com or Reason Foundation. We reserve the right to delete any comment and ban commenters for any reason at any time. Comments may only be edited within 5 minutes of posting. Report abuses.
Please
to post comments
Fifth, seems like this service is begging to be used as an anonymous proxy service by extortionists.
I dont think this is good at all.
The url ends in .onion. Hmm....
Did you try clicking it?
Interesting.
TOR stands for The Onion Router.
All TOR addresses end in .onion
TOR is not the issue here. It is open source and publicly audited.
What kind of game are you playing at, boy? The only audit an American needs is a wholesome IRS look-see. Don't even get me started on this commie "open-source" business.
They stole this idea from Stringfellow Hawke.
The site was probably set up by the NSA. What better way to find out who is "working against" the US.
And if it wasn't, how long will it take the FISC to issue warrants for that information?
Honeypots are always a concern when dealing with a third party. I would think an open source solution that resides locally but makes setting in multiple deadman switches would be a better option.
Obvious NSA scam is obvious.
"Steve, if you're reading this it means I didn't make it back. It also means you've broken a filament controlling a 13-second delay trigger. End of game. Bang! You're dead."
Oh, and if you haven't seen The Mechanic, I just spoiled it for you. Ha ha!
Oh, and if you haven't seen The Mechanic, I just spoiled it for you. Ha ha!
Except for the totally predictable part that you left off...
*squints suspiciously* which one - the Bronson/Vincent one or the 'other'?
There have been services kind of like this before. Not surprisingly, 99.9% of the alerts sent out were because people forgot to reset the timer.
good article
maha navratri 2014
durga puja time table
First, you upload your files, encrypted with a password, to a cloud storage service.
Which has already been hacked by the NSA, and has an open-ended National Security Letter applied against it.
http://deadopen.com/