this post was submitted on 11 Jan 2025
185 points (97.9% liked)

Asklemmy

46849 readers
902 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy 🔍

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_[email protected]~

founded 6 years ago
MODERATORS
 

After reading about the "suicide" of yet another whistleblower, it got me thinking.

When working at large enough company, it's entirely possible that at some point you will get across some information the company does not want to be made public, but your ethics mandate you blow the whistle. So, I was wondering if I were in that position how I would approach creating a dead man's switch in order to protect myself.

From wikipedia:

A dead man's switch is a switch that is designed to be activated or deactivated if the human operator becomes incapacitated, such as through death, loss of consciousness, or being bodily removed from control. Originally applied to switches on a vehicle or machine, it has since come to be used to describe other intangible uses, as in computer software.

In this context, a dead man's switch would trigger the release of information. Some additional requirements could include:

  1. No single point of failure. (aka a usb can be stolen, your family can be killed, etc)
  2. Make the existence of the switch public. (aka make sure people know of your mutually assured destruction)
  3. Secrets should be safe until you die, disappear, or otherwise choose to make them public.

Anyway, how would you go about it?

top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 6 points 2 months ago (1 children)

Set up several solar powered raspberry pies with cheap iot SIM cards, each will check a vm in the cloud or at home for a key. If the key isn’t present or can’t be reached they release the info. Could have several servers to store keys to check. Everyday you enter a code to prevent the key from being removed.

[–] [email protected] 9 points 2 months ago

You would need to account for temporary connection issues to make sure it doesn't send it after a network outage or something.

[–] [email protected] 9 points 2 months ago (1 children)

It doesn't make any sense. If you are a whistleblower is because you already published the information. They are not killing you so the information does not get revealed. They are killing because you already did.

[–] [email protected] 2 points 2 months ago

you just need more information and then you need to prove that you have more information so they can kill you anyways

[–] [email protected] 13 points 2 months ago (2 children)

Making the existence of the switch public is often something you don't want. It allows others to do troubleshooting in advance. It also destroys your reputation with many people who might otherwise work with you.

If you are content to keep things secret, share the documents with several different friends or law firms in several different countries along with conditions for release. Don't tell them or everyone who all has the documents. That sounds relatively simple.

[–] [email protected] 3 points 2 months ago

Making the existence of something public means you'd need to give away at least some details of who or what it concerned, at which point you're in the situation of either being a target or a blackmailer.

[–] [email protected] 1 points 2 months ago

I agree with all of the above, except I’d add encryption to the data.

That way you are not putting your life in their hands, at least until it doesn’t matter / you want the data released. Encryption keys are super lightweight vs data; taken to an unreasonable extreme, a KB could unlock TBs.

Though you’d probably want something more like a passphrase. Anyway, that basic idea is sound but I dunno about the exact delivery/delay mechanism. Gun to my head and I have seconds to decide… scheduled send from a major cloud email provider, pay way in advance, and an increasing flood of calendar events/reminders up to the day it sends. The message would include enough information about the encryption used and formats within that any tier 1 helpdesk level IT person could access the data.

Not perfect, but a good enough balance of simple and robust to start with.

[–] [email protected] 7 points 2 months ago (1 children)

I used to build automation tools (shudderVBAshudder) that the "proper" technology wouldn't be bothered to make. Over 15 years I had over 200 tools built out. I had tied all my code to a single file that I would use to keep everything updated. I had imagined in so many ways of setting up a dead man's switch to start slowly corrupting and degrading everything or to just implode everything... Would have worked except our company got bought out and everything became useless and I got laid off lol. Got a nice pay check out of it

[–] [email protected] 1 points 2 months ago (2 children)

You wanted to ruin your company? Why?

[–] [email protected] 3 points 2 months ago

Ha well it was more of a "oh crap we need to bring him back ASAP" kinda thing to get my job back. And as others said this was all mainly for fun thinking about it. The intrusive thoughts

[–] [email protected] 2 points 2 months ago (1 children)

When did they say they wanted to ruin their company?

[–] [email protected] 0 points 2 months ago (1 children)

The slowly corrupting and degrading everything part.

[–] [email protected] 2 points 2 months ago (1 children)

But when did they say they wanted to do that? They just said they imagined it. I've imagined ways to screw over my workplace as well, it doesn't mean I want to

[–] [email protected] 1 points 2 months ago (1 children)

I think you are being needlessly pedantic.

[–] [email protected] -1 points 2 months ago* (last edited 2 months ago)

I'm not being pedantic at all. The entire premise of your question was them "wanting" to ruin their company. There's no other way to interpret that

If you want to rephrase what you said to clear up the confusion, I'm all ears

[–] [email protected] 5 points 2 months ago (3 children)

A whistleblower doesn't need a dead man's switch as they'd just release the document.

A muckracker does.

[–] [email protected] 1 points 2 months ago

A whistleblower is likely to have access to sensitive data or other forms of leverage not directly linked to whatever they're whistleblowing on. Of course this sort of insurance policy would be useful to them.

[–] [email protected] 1 points 2 months ago

I think its useful for situation where I'm in process of collecting evidence, so I can keep tge switch just in case I get caught in the process but at least the evidence so far can be public

[–] [email protected] 2 points 2 months ago (1 children)

You may not be able to collect more if you publish everything at the start

[–] [email protected] 1 points 2 months ago

True that...

[–] [email protected] 8 points 2 months ago (1 children)

The whole point in being a whistleblower is to release the documents. Why would you tell everyone what's happening and not provide the evidence? After you release it, there's less chance of being harmed, and your job is done besides showing up to court.

[–] [email protected] 2 points 2 months ago

Maybe he wants to release a censored version of the documents and have the dead man switch release the uncensored version.

[–] [email protected] 9 points 2 months ago (1 children)

Pretty easy if you don’t work for google.

  1. Upload everything to a google drive.
  2. setup inactive account manager
  3. add all the news agencies you can get a hold of, government offices, police etc.
  4. make sure it’s read only access.

If they want to silence you they have to 1. Know about your account. 2. Keep it active.

[–] [email protected] 10 points 2 months ago* (last edited 2 months ago) (1 children)

It relies on the news agencies and such actually caring.

As someone who's been fighting a huge fight against a casino threatening my performance home, lemme tell you that most don't give a single shit

[–] [email protected] 2 points 2 months ago

Everything relies on someone caring, in this context.

[–] [email protected] 9 points 2 months ago* (last edited 2 months ago) (1 children)

Depends on your background and industry.

If you work in IT, and are technically adept, you can...

  1. Store said files on a proton drive or mega.nz drive set to be only accessible to read by those who have the unique URL.
  2. Create a small server with a cron job that every 24 hours sends you a text message to a Google Voice number accessible anywhere with internet connectivity and you have 60 seconds to reply otherwise the cron job will craft a premade email to all international news agencies as well as government agencies responsible for the control of this issue, along with links to download the information.
[–] [email protected] 17 points 2 months ago* (last edited 2 months ago) (1 children)

60 seconds in 24 hours seems too prone to the possibility of a false positive. What if you forget and take a nap? What if there's a power outage? What if your phone breaks unexpectedly?

[–] [email protected] 6 points 2 months ago (1 children)

All good points, however the purpose of a deadman's switch is that you fear for your life, taking a nap might not be as easy under those circumstances. Also, if you know at what time the SMS is set to arrive you can plan ahead to make sure you have Internet in order to respond, but OK maybe 60 seconds is too short of a time so let's make it 5 minutes. Being that this is using Google Voice, you can receive the SMS over a tablet or laptop so a backup would be a must have.

[–] [email protected] 5 points 2 months ago (1 children)

Even 5 minutes seems short. You're already dead, what's the rush?

[–] [email protected] 1 points 2 months ago (1 children)

You don't want to give the people chasing you time to identify and disable the deadmans switch

[–] [email protected] 3 points 2 months ago

That’s why you create a backup deadman’s switch.

load more comments
view more: next ›