How Secure are SecureDrop and Similar Services – in Design and in Use?

> Point: [How to Leak to The Intercept](https://firstlook.org/theintercept/2015/01/28/how-to-leak-to-the-intercept/) – Micah Lee at The Intercept

> Counterpoint: [The Intercept’s Invitation to Criminality — and to Intelligence Agencies](http://www.lawfareblog.com/2015/01/the-intercepts-invitation-to-criminality-and-to-intelligence-agencies/) – Benjamin Wittes at LawFare

> Additional Debate: [The Intercept, SecureDrop, and Foreign Intelligence Services: A Response](http://www.lawfareblog.com/2015/02/the-intercept-securedrop-and-foreign-intelligence-services-a-response/) – Benjamin Wittes at LawFare

> Background: “DeadDrop/StrongBox
Security Assessment (August 11, 2013)” ([pdf](http://www.czeskis.com/research/pubs/UW-CSE-13-08-02.PDF))

02/19/2015: 

WIRED Interviews Edward Snowden

The Interview: [The Most Wanted Man in the World](http://www.wired.com/2014/08/edward-snowden/) — James Bamford in Wired

Two Companion Pieces in WIRED: [I Left the NSA Clues, But They Couldn’t Find Them](http://www.wired.com/2014/08/snowden-breadcrumbs/) and [A Day With Edward Snowden](http://www.wired.com/2014/08/scott-dadich-snowden/)