Crypto Can Do More Than Just Bail Out Julian Assange—It Can Protect Whistleblowers
While Bitcoin proved invaluable to Assange, crypto could offer a lot more than just funds — enabling decentralized storage networks for archiving, secure identity management for establishing trust, and safer communication for information dissemination.
A large Bitcoin donation helped return Julian Assange to Australia, but crypto can do much more for whistleblowers.
While Bitcoin proved invaluable to Assange, crypto could offer a lot more than just funds — enabling decentralized storage networks for archiving, secure identity management for establishing trust, and safer communication for information dissemination. These are practical applications that can improve reporting and help whistleblowers avoid loss of work, crushing legal battles or, worse, jail cells.
After striking a plea deal with United States authorities, Assange's last hurrah with the U.S. legal system would take place in the territory of the Northern Mariana Islands. Just one problem — flights to a remote enclave of islands in the Western Pacific Ocean are expensive. Miraculously, a single Bitcoin donation covered nearly the entire cost, delivering Assange back to Australia debt-free.
This wasn’t the first time Assange received major support from the crypto community, with AssangeDAO raising $53 million to help cover his legal fees back in 2022. But surely crypto can offer whistleblowers something more than lump sum donations.
Although whistleblowers like Edward Snowden and Julian Assange have successfully delivered reports to the public without especially sophisticated technology, it came with enormous personal sacrifice. A user-facing app that unifies certain decentralized protocols and networks could make it simpler and safer for whistleblowers to gather, share and disseminate evidence for reports in the future.
Archiving applications, such as OpenArchive’s Safe, already allow users to document and store evidence using decentralized backends. With Safe, decentralized archivist communities can leverage Filecoin and IPFS to gather and store evidence of wrongdoing in countries like Mexico — such as electoral violence and ‘disappearing’ people (there are at least 105,000 missing people in the country). While Safe is not a Web3 app or protocol, they have integrated decentralized storage into an app designed to help people expose injustices.
Integrations can go deeper than this — but they haven’t been built (yet). The protocols and networks that could be integrated are being built, though, and in some cases, they’re quite mature.
Permawebs, such as Arweave, can be used to create data records that are not only decentralized but immutable. This is useful for tamper-proof reporting — preventing evidence from being altered or destroyed once it’s uploaded.
Adding to this, self-sovereign identity projects, like Sovrin, allow for a simple and verifiable way to prove identity. For example, this gives whistleblowers the ability to prove they actually work for (and therefore have access to information about) the organization they’re reporting on.
These approaches are vastly superior to current methods of messenger Know-Your-Customer, such as requiring a phone number on sign-up. This is because it allows the whistleblower to share their identity with just the journalist (who may be protected by source confidentiality laws), and not the platform itself. In the past, we’ve seen metadata from encrypted chat apps used to prosecute whistleblowers, such as in the case of WhatsApp and Natalie Edwards — a former Treasury Department official convicted of leaking information to BuzzFeed.
On top of all of these layers, zero-knowledge proofs and fully homomorphic encryption (FHE), pioneered by projects like Zama, allow us to verify the information required for a report without needing open access to everything. For example, a whistleblower could prove they work for an organization without revealing their name.
Imagine an all-in-one whistleblower front-end that integrated each of these technologies. A whistleblower could anonymously sign-up, encrypt evidentiary files using FHE, store them in their personal in-app archive using the Arweave, connect with a journalist, trustlessly verify each other’s identity, and start anonymously sharing evidence.
Even if the whistleblower stops responding or the chat is completely destroyed, the journalist will still have access to the files. They can compute a statistical summary of the report without requiring direct access to other private or confidential information — or metadata identifying the whistleblower. If the case ends up in court, the journalist couldn’t name the whistleblower.
Because Web3 is built to be interoperable, we should be able to fit these puzzle pieces together and create a functional crypto-based stack for whistleblowers.
In some places, major organizations, like banks, are required to provide infrastructure and protections for whistleblowers. If we want to protect the whistleblowers of the future, we should be on the front foot advocating for and building decentralized, crypto-first solutions for information gathering and reporting.
The above is the detailed content of Crypto Can Do More Than Just Bail Out Julian Assange—It Can Protect Whistleblowers. For more information, please follow other related articles on the PHP Chinese website!

Top 10 free-to-view market software websites are recommended: 1. Binance, 2. OkX, 3. Sesame Open Door (KuCoin), 4. CoinMarketCap, 5. CoinGecko, 6. TradingView, 7. Investing.com, 8. Yahoo Finance, 9. Glassnode Studio, 10. LunarCrush, these websites provide real-time data, technical analysis tools and market information to help you make informed investment decisions.

To safely access the Binance official platform and download the APP, you can use the following steps: 1) Use a trusted search engine to search for "Binance" and check the domain name; 2) View the official social media to obtain the URL; 3) Consult the official customer service to confirm the URL; 4) Use a trusted navigation website. The steps to download the APP include: 1) Visit Binance official website; 2) Find the APP download portal; 3) Select the download method (scan the QR code, download the app store, and directly download the APK file).

Through the following steps, you can safely access the Ouyi official platform and download the APP: 1. Use a trusted search engine to search for "Ouyi" or "OKX" to check the domain name; 2. Check the official social media account to obtain the URL; 3. Consult the official customer service to confirm the URL; 4. Use a trusted navigation website. When downloading the APP, visit the official website, find the download portal, choose how to scan the QR code, app store, or directly download the APK file, and pay attention to checking developer information, viewing user reviews, installing security software, beware of phishing websites and APPs from unknown sources, and protecting personal information.

To safely download the Binance APP, you need to go through the official channels: 1. Visit the Binance official website, 2. Find and click the APP download portal, 3. Choose to scan the QR code, app store, or directly download the APK file to download to ensure that the link and developer information are authentic, and enable two-factor verification to protect the security of the account.

The methods to safely download the OKX APP include: 1. Use a trusted search engine to search and check the domain name; 2. Check the official social media account and identify the certification logo; 3. Consult the official customer service to confirm the authenticity of the link; 4. Use a trusted navigation website to obtain a verified download link. Through these steps, you can safely download the Ouyi APP and start your cryptocurrency trading journey.

The steps to register an Ouyi account are as follows: 1. Prepare a valid email or mobile phone number and stabilize the network. 2. Visit Ouyi’s official website. 3. Enter the registration page. 4. Select email or mobile phone number to register and fill in the information. 5. Obtain and fill in the verification code. 6. Agree to the user agreement. 7. Complete registration and log in, carry out KYC and set up security measures.

The steps to register a Binance account include: 1. Prepare a valid email or mobile phone number and a stable network; 2. Visit Binance official website; 3. Enter the registration page; 4. Select the registration method; 5. Fill in the registration information; 6. Agree to the user agreement; 7. Complete verification; 8. Obtain and fill in the verification code; 9. Complete registration.

Registering a Sesame Door Account requires 7 steps: 1. Prepare a valid email or mobile phone number and a stable network; 2. Visit the official website; 3. Enter the registration page; 4. Select and fill in the registration method; 5. Obtain and fill in the verification code; 6. Agree to the user agreement; 7. Complete registration and log in, it is recommended to carry out KYC and set security measures.

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

Dreamweaver Mac version
Visual web development tools

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

Atom editor mac version download
The most popular open source editor

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.
