Just Wondering...
why Mr Cryptome does use a plain email in box to receive all those "secret" revelations ?
He certainly knows about the interception capabilities of various governments and has to assume his email address and all other unique identifiers are certainly being on their watch lists.
His security practices are simply hilarious.
For starters, I would
1.) receive only gpg-encrypted email and bounce everything else.
2.) suggest leakers use The Onion Router.
3.) Decrypt "raw" material only on a computer disconnected from the net. That makes attacks like this very difficult. The attacker would have to somehow inject a virus and find a way to get the results back.
4.) All "raw" material must of course reside on an encrypted volume, which is safely locked away together with the computer containing the harddisk.
Can I have 10 FAIL images above this post, please ?