SecureDrop is a free software platform for secure communication between journalists and sources (whistleblowers).[2] It was originally designed and developed by Aaron Swartz and Kevin Poulsen under the name DeadDrop.[3][4] James Dolan also co-created the software.[5]

SecureDrop
Original author(s)
Developer(s)Freedom of the Press Foundation
Initial release15 October 2013; 10 years ago (2013-10-15)
Stable release
2.8.0[1] Edit this on Wikidata (12 March 2024; 54 days ago (12 March 2024))
Repository
Written inPython
Operating systemLinux
TypeSecure communication
LicenseGNU Affero General Public License, version 3
Websitesecuredrop.org Edit this at Wikidata

History edit

After Aaron Swartz's death, the first instance of the platform was launched under the name Strongbox by staff at The New Yorker on 15 May 2013.[6] The Freedom of the Press Foundation took over development of DeadDrop under the name SecureDrop, and has since assisted with its installation at several news organizations, including ProPublica, The Guardian, The Intercept, and The Washington Post.[7][8][9]

Security edit

SecureDrop uses the anonymity network Tor to facilitate communication between whistleblowers, journalists, and news organizations. SecureDrop sites are therefore only accessible as onion services in the Tor network. After a user visits a SecureDrop website, they are given a randomly generated code name.[6] This code name is used to send information to a particular author or editor via uploading. Investigative journalists can contact the whistleblower via SecureDrop messaging. Therefore, the whistleblower must take note of their random code name.[3]

The system utilizes private, segregated servers that are in the possession of the news organization. Journalists use two USB flash drives and two personal computers to access SecureDrop data.[3][6] The first personal computer accesses SecureDrop via the Tor network, and the journalist uses the first flash drive to download encrypted data from the SecureDrop server. The second personal computer does not connect to the Internet, and is wiped during each reboot.[3][6] The second flash drive contains a decryption code. The first and second flash drives are inserted into the second personal computer, and the material becomes available to the journalist. The personal computer is shut down after each use.[3]

Freedom of the Press Foundation has stated it will have the SecureDrop code and security environment audited by an independent third party before every major version release and then publish the results.[10] The first audit was conducted by security researchers at the University of Washington and Bruce Schneier.[11] The second audit was conducted by Cure53, a German security firm.[10]

SecureDrop suggests sources disabling JavaScript to protect anonymity.[12]

Prominent organizations using SecureDrop edit

The Freedom of the Press Foundation now maintains an official directory of SecureDrop instances. This is a partial list of instances at prominent news organizations.[13]

Name of organizationImplementation date
The New Yorker[14][3]15 May 2013
Forbes[14][15][16][17]29 Oct 2013
Bivol[14][18]30 Oct 2013
ProPublica[14][19][20]27 Jan 2014
The Intercept[14][21]10 Feb 2014
San Francisco Bay Guardian[14][22]18 Feb 2014
The Washington Post[14][23]5 Jun 2014
The Guardian[14][2]6 Jun 2014
The Globe and Mail[14][24]4 Mar 2015
Radio-Canada20 Jan 2016
Canadian Broadcasting Corporation[14][25]29 Jan 2016
Committee to Protect Journalists[26]12 May 2016
Associated Press18 Oct 2016
The New York Times[14][27]15 Dec 2016
BuzzFeed News21 Dec 2016
USA Today[14][28]22 Feb 2017
Bloomberg NewsUnknown
The Wall Street JournalUnknown
AftenpostenUnknown
Australian Broadcasting Corporation[29]28 Nov 2019

Awards edit

See also edit

References edit

External links edit