Feeds

Wikileaks publishes secret donor list

Hoist by its own leaky petard

Choosing a cloud hosting partner with confidence

Whistleblower website Wikileaks faced a dilemma this week when a list of email addresses for the site's donors was submitted as a leaked document.

The issue arose after a fund raising email on Saturday went out with all 58 addresses in the To field (instead of the bcc field). The all too common schoolboy error meant that all the recipients found out the online identities of other donors.

The list was promptly resubmitted as a leaked document which, to its credit, Wikileaks published along with the comment from the leaker that "WikiLeaks leaks its own donors, aww irony. BCC next time kthx".

In a note, Wikileaks described the list as a partial list of its donors, adding its speculation as to the likely motives of the leaker.

"A prankster, apparently connected to one of the donors, then submitted this list to Wikileaks, possibly to test the project's principles of complete impartiality when dealing with whistleblowers," it said.

Enterprisingly, the same page includes a link to make donations.

Some comments on the story try to reassure would-be leakers that the slip-up is unrelated to Wikileaks' procedures for protecting its sources.

"It doesn't reflect anything to do with the wikileaks source protection operations, which are separate to office admin," one comment states. "While the release of these addresses is not optimal, all such donations have bank records and confirmations that travel over plain email."

Other comments highlight concerns that the leaked list might be used to make life difficult for the controversial project. "Hopefully, Scientologists don't go after the people listed here. I wouldn't put it past them," one person notes.

Previous notable leaks that have come through the whistleblower website include Guantánamo Bay procedures, internal documents related to the Church of Scientology, the BNP membership list and a costing plan by Bavarian police related to a project to develop software capable of intercepting Skype traffic. ®

Intelligent flash storage arrays

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Managing SSL certificates with ease
The lack of operational efficiencies and compliance pitfalls associated with poor SSL certificate management, and how the right SSL certificate management tool can help.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.