Feeds

WikiLeaks' Cablegate server touted on eBay for $3k-plus by Swedes

Assange™ memorabilia 'erased to NSA specs'

Remote control for virtualized desktops

Whistleblowing website WikiLeaks has attacked a former ally after one of the servers used to host the infamous Cablegate material was put up for auction on eBay.

The document-leaking operation – headed by Julian Assange – slammed Bahnhof, a Swedish internet service provider, for flogging the once-rented Dell Poweredge R410 server.

Proceeds from the auction will be handed to Reporters Without Frontiers, a charity dedicated to press freedom, and the 5th of July Foundation, which campaigns for free speech online. The auction began last night and with more than nine days to go, bidding has already reached $3,000.

A spokesman for WikiLeaks referred The Reg to Twitter, where the whistleblowers claimed Bahnhof was only interested in the publicity generated from the sale:

Jon Karlung, CEO of Bahnhof, announced the sale last night, tweeting:

Karlung said he spoke to Julian Assange several times during the release of the Cablegate material – the hundreds of thousands of secret US diplomatic memos and classified intelligence files it leaked online, sourced from American army private Chelsea Manning.

He said Assange's signature can be found on a hosting contract, which will be provided to the buyer of the server.

In a statement, the CEO continued: "This is indeed the physical web server from which the leaked Cablegate material was released, complete with hard drives, motherboard and everything. It can be plugged in and used immediately. We ourselves put it on a pedestal and displayed it as a museum item in our underground Thule Brunkow Ridge data center in central Stockholm, as a symbol for our values as a hoster [sic] and ISP. It constitutes a unique collector's item. A couple of years ago foreign authorities would have bid a fortune to lay hands on this specific server."

Karlung claimed he decided to offer the funds to Reporters Without Frontiers and the 5th of July Foundation because he "burns for those causes".

WikiLeaks had rented the server, Bahnhof said, and it was never used by another client.

The firm insisted the data has been deleted by overwriting it. It added: "All hardware is original, including the hard disks. Those have however been erased according to the U.S. specification DoD 5220.22-M (PDF, relevant part on page 57) where every byte of the hard disk is overwritten several times. The original information cannot be recreated, not even by NSA."

We were unable to reach Jon Karlung, CEO of Bahnhof. ®

Beginner's guide to SSL certificates

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.