How Secure are SecureDrop and Similar Services – in Design and in Use?

> Point: [How to Leak to The Intercept](https://firstlook.org/theintercept/2015/01/28/how-to-leak-to-the-intercept/) – Micah Lee at The Intercept

> Counterpoint: [The Intercept’s Invitation to Criminality — and to Intelligence Agencies](http://www.lawfareblog.com/2015/01/the-intercepts-invitation-to-criminality-and-to-intelligence-agencies/) – Benjamin Wittes at LawFare

> Additional Debate: [The Intercept, SecureDrop, and Foreign Intelligence Services: A Response](http://www.lawfareblog.com/2015/02/the-intercept-securedrop-and-foreign-intelligence-services-a-response/) – Benjamin Wittes at LawFare

> Background: “DeadDrop/StrongBox
Security Assessment (August 11, 2013)” ([pdf](http://www.czeskis.com/research/pubs/UW-CSE-13-08-02.PDF))