search
Homeweb3.0Crypto Can Do More Than Just Bail Out Julian Assange—It Can Protect Whistleblowers

While Bitcoin proved invaluable to Assange, crypto could offer a lot more than just funds — enabling decentralized storage networks for archiving, secure identity management for establishing trust, and safer communication for information dissemination.

Crypto Can Do More Than Just Bail Out Julian Assange—It Can Protect Whistleblowers

A large Bitcoin donation helped return Julian Assange to Australia, but crypto can do much more for whistleblowers.

While Bitcoin proved invaluable to Assange, crypto could offer a lot more than just funds — enabling decentralized storage networks for archiving, secure identity management for establishing trust, and safer communication for information dissemination. These are practical applications that can improve reporting and help whistleblowers avoid loss of work, crushing legal battles or, worse, jail cells.

After striking a plea deal with United States authorities, Assange's last hurrah with the U.S. legal system would take place in the territory of the Northern Mariana Islands. Just one problem — flights to a remote enclave of islands in the Western Pacific Ocean are expensive. Miraculously, a single Bitcoin donation covered nearly the entire cost, delivering Assange back to Australia debt-free.

This wasn’t the first time Assange received major support from the crypto community, with AssangeDAO raising $53 million to help cover his legal fees back in 2022. But surely crypto can offer whistleblowers something more than lump sum donations.

Although whistleblowers like Edward Snowden and Julian Assange have successfully delivered reports to the public without especially sophisticated technology, it came with enormous personal sacrifice. A user-facing app that unifies certain decentralized protocols and networks could make it simpler and safer for whistleblowers to gather, share and disseminate evidence for reports in the future.

Archiving applications, such as OpenArchive’s Safe, already allow users to document and store evidence using decentralized backends. With Safe, decentralized archivist communities can leverage Filecoin and IPFS to gather and store evidence of wrongdoing in countries like Mexico — such as electoral violence and ‘disappearing’ people (there are at least 105,000 missing people in the country). While Safe is not a Web3 app or protocol, they have integrated decentralized storage into an app designed to help people expose injustices.

Integrations can go deeper than this — but they haven’t been built (yet). The protocols and networks that could be integrated are being built, though, and in some cases, they’re quite mature.

Permawebs, such as Arweave, can be used to create data records that are not only decentralized but immutable. This is useful for tamper-proof reporting — preventing evidence from being altered or destroyed once it’s uploaded.

Adding to this, self-sovereign identity projects, like Sovrin, allow for a simple and verifiable way to prove identity. For example, this gives whistleblowers the ability to prove they actually work for (and therefore have access to information about) the organization they’re reporting on.

These approaches are vastly superior to current methods of messenger Know-Your-Customer, such as requiring a phone number on sign-up. This is because it allows the whistleblower to share their identity with just the journalist (who may be protected by source confidentiality laws), and not the platform itself. In the past, we’ve seen metadata from encrypted chat apps used to prosecute whistleblowers, such as in the case of WhatsApp and Natalie Edwards — a former Treasury Department official convicted of leaking information to BuzzFeed.

On top of all of these layers, zero-knowledge proofs and fully homomorphic encryption (FHE), pioneered by projects like Zama, allow us to verify the information required for a report without needing open access to everything. For example, a whistleblower could prove they work for an organization without revealing their name.

Imagine an all-in-one whistleblower front-end that integrated each of these technologies. A whistleblower could anonymously sign-up, encrypt evidentiary files using FHE, store them in their personal in-app archive using the Arweave, connect with a journalist, trustlessly verify each other’s identity, and start anonymously sharing evidence.

Even if the whistleblower stops responding or the chat is completely destroyed, the journalist will still have access to the files. They can compute a statistical summary of the report without requiring direct access to other private or confidential information — or metadata identifying the whistleblower. If the case ends up in court, the journalist couldn’t name the whistleblower.

Because Web3 is built to be interoperable, we should be able to fit these puzzle pieces together and create a functional crypto-based stack for whistleblowers.

In some places, major organizations, like banks, are required to provide infrastructure and protections for whistleblowers. If we want to protect the whistleblowers of the future, we should be on the front foot advocating for and building decentralized, crypto-first solutions for information gathering and reporting.

The above is the detailed content of Crypto Can Do More Than Just Bail Out Julian Assange—It Can Protect Whistleblowers. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Free viewing market software websites What are the top ten free viewing market software websitesFree viewing market software websites What are the top ten free viewing market software websitesApr 24, 2025 pm 02:21 PM

Top 10 free-to-view market software websites are recommended: 1. Binance, 2. OkX, 3. Sesame Open Door (KuCoin), 4. CoinMarketCap, 5. CoinGecko, 6. TradingView, 7. Investing.com, 8. Yahoo Finance, 9. Glassnode Studio, 10. LunarCrush, these websites provide real-time data, technical analysis tools and market information to help you make informed investment decisions.

Binance Trading App Official Website Download Portal Binance Trading App Official WebsiteBinance Trading App Official Website Download Portal Binance Trading App Official WebsiteApr 24, 2025 pm 02:18 PM

To safely access the Binance official platform and download the APP, you can use the following steps: 1) Use a trusted search engine to search for "Binance" and check the domain name; 2) View the official social media to obtain the URL; 3) Consult the official customer service to confirm the URL; 4) Use a trusted navigation website. The steps to download the APP include: 1) Visit Binance official website; 2) Find the APP download portal; 3) Select the download method (scan the QR code, download the app store, and directly download the APK file).

Ouyi Trading App Official Website Download Portal Ouyi Trading App Official WebsiteOuyi Trading App Official Website Download Portal Ouyi Trading App Official WebsiteApr 24, 2025 pm 02:15 PM

Through the following steps, you can safely access the Ouyi official platform and download the APP: 1. Use a trusted search engine to search for "Ouyi" or "OKX" to check the domain name; 2. Check the official social media account to obtain the URL; 3. Consult the official customer service to confirm the URL; 4. Use a trusted navigation website. When downloading the APP, visit the official website, find the download portal, choose how to scan the QR code, app store, or directly download the APK file, and pay attention to checking developer information, viewing user reviews, installing security software, beware of phishing websites and APPs from unknown sources, and protecting personal information.

Binance download link Binance download pathBinance download link Binance download pathApr 24, 2025 pm 02:12 PM

To safely download the Binance APP, you need to go through the official channels: 1. Visit the Binance official website, 2. Find and click the APP download portal, 3. Choose to scan the QR code, app store, or directly download the APK file to download to ensure that the link and developer information are authentic, and enable two-factor verification to protect the security of the account.

Ouyi download link Ouyi download pathOuyi download link Ouyi download pathApr 24, 2025 pm 02:09 PM

The methods to safely download the OKX APP include: 1. Use a trusted search engine to search and check the domain name; 2. Check the official social media account and identify the certification logo; 3. Consult the official customer service to confirm the authenticity of the link; 4. Use a trusted navigation website to obtain a verified download link. Through these steps, you can safely download the Ouyi APP and start your cryptocurrency trading journey.

How to register an account on Ouyi Exchange Ouyi Exchange Registration TutorialHow to register an account on Ouyi Exchange Ouyi Exchange Registration TutorialApr 24, 2025 pm 02:06 PM

The steps to register an Ouyi account are as follows: 1. Prepare a valid email or mobile phone number and stabilize the network. 2. Visit Ouyi’s official website. 3. Enter the registration page. 4. Select email or mobile phone number to register and fill in the information. 5. Obtain and fill in the verification code. 6. Agree to the user agreement. 7. Complete registration and log in, carry out KYC and set up security measures.

How to register an account on Binance Exchange Binance Exchange Registration TutorialHow to register an account on Binance Exchange Binance Exchange Registration TutorialApr 24, 2025 pm 02:03 PM

The steps to register a Binance account include: 1. Prepare a valid email or mobile phone number and a stable network; 2. Visit Binance official website; 3. Enter the registration page; 4. Select the registration method; 5. Fill in the registration information; 6. Agree to the user agreement; 7. Complete verification; 8. Obtain and fill in the verification code; 9. Complete registration.

How to register an account on Sesame Open Exchange? Tutorial on Registration of Sesame Open ExchangeHow to register an account on Sesame Open Exchange? Tutorial on Registration of Sesame Open ExchangeApr 24, 2025 pm 02:00 PM

Registering a Sesame Door Account requires 7 steps: 1. Prepare a valid email or mobile phone number and a stable network; 2. Visit the official website; 3. Enter the registration page; 4. Select and fill in the registration method; 5. Obtain and fill in the verification code; 6. Agree to the user agreement; 7. Complete registration and log in, it is recommended to carry out KYC and set security measures.

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment

Dreamweaver Mac version

Dreamweaver Mac version

Visual web development tools

VSCode Windows 64-bit Download

VSCode Windows 64-bit Download

A free and powerful IDE editor launched by Microsoft

Atom editor mac version download

Atom editor mac version download

The most popular open source editor

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.