Get the latest tech news
Building a serverless secured dead drop
I ran into this fascinating article (I wrote another blog post discussing it) and that got me thinking. How would I approach building a dead-drop i...
It isn’t science fiction today to obtain the security footage (which we can safely assume exists), run it through a facial recognition system and get a list of people to check. If we have a few of those bots, and they send each other “messages” that generate decoy traffic, it is going to be much harder to track who and what is happening, since you’ll have activity (anonymized via Tor) that hides the real actions. A malicious party could also disable expiration and retain long-term all the uploaded files, in case they get the keys at a later time, but beyond that, I can’t think of anything else that they will get from actually having control over the system.
Or read this on Hacker News