After reading about the “suicide” of yet another whistleblower, it got me thinking.

When working at large enough company, it’s entirely possible that at some point you will get across some information the company does not want to be made public, but your ethics mandate you blow the whistle. So, I was wondering if I were in that position how I would approach creating a dead man’s switch in order to protect myself.

From wikipedia:

A dead man’s switch is a switch that is designed to be activated or deactivated if the human operator becomes incapacitated, such as through death, loss of consciousness, or being bodily removed from control. Originally applied to switches on a vehicle or machine, it has since come to be used to describe other intangible uses, as in computer software.

In this context, a dead man’s switch would trigger the release of information. Some additional requirements could include:

  1. No single point of failure. (aka a usb can be stolen, your family can be killed, etc)
  2. Make the existence of the switch public. (aka make sure people know of your mutually assured destruction)
  3. Secrets should be safe until you die, disappear, or otherwise choose to make them public.

Anyway, how would you go about it?

  • tetris11@lemmy.ml
    link
    fedilink
    arrow-up
    171
    arrow-down
    3
    ·
    edit-2
    25 days ago

    The most non-intrusive foolproof method I can think of is spite-induced action:

    1. Get a pacemaker with Zigbee mesh network connectivity
    2. Implant a small device into your wrist that vibrates if your pacemaker is ever disconnected from the network (in which case, run NOW to your nearest safehouse)
    3. Should the vibration continue for longer than 5 minutes, a vial of cyanide from a hollow tooth explodes into your mouth allowing you to spit it at your nearest enemy (should one be around)
    4. The bursting of the hollow tooth sends a signal to a remote server, which triggers the eject command on a server, causing the CD tray to come out.
    5. A confused sysadmin will bitterly get off his chair, and go inspect the server, whereupon he will see the paper instructions embedded in the CD tray, and read them.
    6. Assuming his latvian is good, and that he’s familiar with caesar cyphers, he will decode the message that will lead him to a youtube URL where he will post the following comment “Jose I slept with your mother.”
    7. One of the subscribers to the youtube channel is your friend Jose, who will read the comment, spit out his coffee, and then immediately call you.
    8. After about a week of no response, he uploads the contents of that USB stick you gave him with the instructions to “never upload this ever under any circumstance” out of sheer spite.

    Edit: Here, I made a diagram of the whole thing

    State Diagram

    (with mermaid source)
    stateDiagram-v2
        direction TB
        
        state Internet {
            state "Wider Zigbee Network" as WiderZigbeeNetwork
            --
            state "Youtube" as youtube{
                state "MuckBang
                <small>Wasabi Challenge</small>" as video1
                state "A Cat's Guide to Vomit
                <small>By Remington Steel</small>" as video2
            }        
            state "Remote Server" as server {
                state "Server
                <small>CD-Tray</small>" as cdtray
                state "SysAdmin
                <small>Some Latvian Dude</small>" as terry
            }
            --
            state "brazzers.org" as brazzers
        }
    
        state People {
            state "Jose" as jose {
               state "Youtube Subscriptions" as subs
                state "Phone" as josephone
                state "Coffee" as cuppajoe
                state "USB Stick" as usb2
            }
            state "You" as you {
                state "Pacemaker" as pmaker
                state "Wrist Implant" as wrimplant
                state "Hollow Tooth" as htooth
                state "USB Stick" as usb1
                state "Phone" as youphone
            }
            state "Enemy" as enemy {
                state "Random Person" as rando
            }
        }
    
        [*] --> pmaker : Insert next to heart
        pmaker --> WiderZigbeeNetwork : Maintain connection
        WiderZigbeeNetwork --> wrimplant : Vibrate for 5 mins if connection lost
        wrimplant --> htooth: Explode after 5 mins vibrating
    
        htooth --> cdtray: Send "eject"
        htooth --> enemy: Spit cyanide
        cdtray --> terry : Decode the paper in the CD tray
        terry --> video1 : Comment about Jose's mother
    
        video1 --> subs : subscribed to
        video2 --> subs : subscribed to
    
        subs --> cuppajoe : Spit out when reading insulting comment
        cuppajoe --> usb2
        cuppajoe --> josephone
    
        usb1 --> usb2 : Years ago - Give USB stick with instructions to never upload
        josephone --> youphone : Call to complain but get no response
        usb2 --> brazzers : Upload USB contents out of spite
    
    
  • Lurker123 [he/him]@hexbear.net
    link
    fedilink
    English
    arrow-up
    3
    ·
    25 days ago

    One issue from a legal/prosecutorial point of view (even assuming there is a willingness for the government to prosecute) is that the rules of evidence require authentication of documents. In the case of a whistleblower, they are themselves a witness and can authenticate (that is, attest to the genuine nature of) any supporting documents they bring in. If a whistleblower is killed, even if the government has the documents the whistleblower intended to authenticate, it becomes a lot trickier to use.

  • daniskarma@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    10
    arrow-down
    2
    ·
    24 days ago

    It doesn’t make any sense. If you are a whistleblower is because you already published the information. They are not killing you so the information does not get revealed. They are killing because you already did.

    • nutsack@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      24 days ago

      you just need more information and then you need to prove that you have more information so they can kill you anyways

  • Sequentialsilence@lemmy.world
    link
    fedilink
    arrow-up
    10
    arrow-down
    1
    ·
    25 days ago

    Pretty easy if you don’t work for google.

    1. Upload everything to a google drive.
    2. setup inactive account manager
    3. add all the news agencies you can get a hold of, government offices, police etc.
    4. make sure it’s read only access.

    If they want to silence you they have to 1. Know about your account. 2. Keep it active.

    • Tiefling IRL@lemmy.blahaj.zone
      link
      fedilink
      arrow-up
      10
      ·
      edit-2
      25 days ago

      It relies on the news agencies and such actually caring.

      As someone who’s been fighting a huge fight against a casino threatening my performance home, lemme tell you that most don’t give a single shit

  • meyotch@slrpnk.net
    link
    fedilink
    arrow-up
    13
    ·
    25 days ago

    This one works if you are an inbox-zero sort of person. Write a script to send yourself an email daily. Have another utility look for your reply. If you go too long without replying, have it trigger whatever other emails/actions you would like to happen.

  • glans [it/its]@hexbear.net
    link
    fedilink
    English
    arrow-up
    3
    ·
    25 days ago

    Well there are various services that let you disclose info to certain people upon death. examples: https://www.pcmag.com/how-to/how-to-prepare-your-digital-life-accounts-for-your-death

    So you could create those and send them to various journalists or whoever you think would be interested. Then ensure in your will that they are notified of your death. Will them a small object or something.

    Tbh I think the concept of a dead man switch is fantasy. You always hear about them in place but then nothing happens when the person dies.

    Has there EVER been a dead man switch that worked?

        • Belly_Beanis [he/him]@hexbear.net
          link
          fedilink
          English
          arrow-up
          1
          ·
          23 days ago

          That’s what I mean. Maybe I’m misremembering, but didn’t he have one that was supposed to put out a list of names online or some shit? And then he died and nothing happened, likely because feds got to it.

          • glans [it/its]@hexbear.net
            link
            fedilink
            English
            arrow-up
            1
            ·
            23 days ago

            Well then it didn’t work. If it ever existed in the first place.

            And there were no other replies to my question, so my hypothesis stands. :D

            (Tho I looked at this thread on the original instance and it has 96 comments vs 32 here on hb; likely few people saw it due to non-federations.)

  • Churbleyimyam@lemm.ee
    link
    fedilink
    arrow-up
    10
    ·
    25 days ago

    Give the encrypted file to one person, the key to another and do not keep either yourself. They exchange them if you die.

    • souperk@reddthat.comOP
      link
      fedilink
      arrow-up
      12
      ·
      25 days ago

      Why not keep a copy?

      Also, both people are single point of failures. Maybe, 5-6 people where each has an encrypted payload and the keys to decrypt everyone else’s payload.

      • Random Dent@lemmy.ml
        link
        fedilink
        English
        arrow-up
        3
        ·
        25 days ago

        IIRC Julian Assange had something like that set up. There used to be a file you could download from WikiLeaks that was encrypted and supposedly contained something very spicy, and if anything happened to him the password would be released somehow.

        No idea if that’s still a thing or not though.

  • preludeofme@lemmy.world
    link
    fedilink
    arrow-up
    7
    ·
    25 days ago

    I used to build automation tools (shudderVBAshudder) that the “proper” technology wouldn’t be bothered to make. Over 15 years I had over 200 tools built out. I had tied all my code to a single file that I would use to keep everything updated. I had imagined in so many ways of setting up a dead man’s switch to start slowly corrupting and degrading everything or to just implode everything… Would have worked except our company got bought out and everything became useless and I got laid off lol. Got a nice pay check out of it

          • starman2112@sh.itjust.works
            link
            fedilink
            arrow-up
            3
            arrow-down
            1
            ·
            24 days ago

            But when did they say they wanted to do that? They just said they imagined it. I’ve imagined ways to screw over my workplace as well, it doesn’t mean I want to

              • starman2112@sh.itjust.works
                link
                fedilink
                arrow-up
                1
                arrow-down
                2
                ·
                edit-2
                24 days ago

                I’m not being pedantic at all. The entire premise of your question was them “wanting” to ruin their company. There’s no other way to interpret that

                If you want to rephrase what you said to clear up the confusion, I’m all ears

      • preludeofme@lemmy.world
        link
        fedilink
        arrow-up
        3
        ·
        24 days ago

        Ha well it was more of a “oh crap we need to bring him back ASAP” kinda thing to get my job back. And as others said this was all mainly for fun thinking about it. The intrusive thoughts

  • orcrist@lemm.ee
    link
    fedilink
    arrow-up
    13
    ·
    24 days ago

    Making the existence of the switch public is often something you don’t want. It allows others to do troubleshooting in advance. It also destroys your reputation with many people who might otherwise work with you.

    If you are content to keep things secret, share the documents with several different friends or law firms in several different countries along with conditions for release. Don’t tell them or everyone who all has the documents. That sounds relatively simple.

    • Analog@lemmy.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      24 days ago

      I agree with all of the above, except I’d add encryption to the data.

      That way you are not putting your life in their hands, at least until it doesn’t matter / you want the data released. Encryption keys are super lightweight vs data; taken to an unreasonable extreme, a KB could unlock TBs.

      Though you’d probably want something more like a passphrase. Anyway, that basic idea is sound but I dunno about the exact delivery/delay mechanism. Gun to my head and I have seconds to decide… scheduled send from a major cloud email provider, pay way in advance, and an increasing flood of calendar events/reminders up to the day it sends. The message would include enough information about the encryption used and formats within that any tier 1 helpdesk level IT person could access the data.

      Not perfect, but a good enough balance of simple and robust to start with.

    • moopet@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      3
      ·
      24 days ago

      Making the existence of something public means you’d need to give away at least some details of who or what it concerned, at which point you’re in the situation of either being a target or a blackmailer.

    • OneMeaningManyNames@lemmy.ml
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      1
      ·
      25 days ago

      That more like coalmine canary than dead man switch. Also, if you happen to be arrested on a weekend or get tangled/hooked up then you will have no way of cancelling it. Then all hell breaks loose.

      • Evotech@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        24 days ago

        Could set it up like every month. It’s what I would do anyway, simple enough to set up. Low chance of anyone being able to do anything about it

      • Trainguyrom@reddthat.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        24 days ago

        Make it 60-72 hours and your death will still be fresh enough for it to be relevant, but plenty of time to figure out how to work around whatever calamity might prevent still-alive you from stopping it. It’s even enough time that if your death makes the news it’ll have been seen by most relevant journalists and newsrooms already so they’ll have more context for the strange email they find

  • thedeadwalking4242@lemmy.world
    link
    fedilink
    arrow-up
    7
    ·
    24 days ago

    Set up several solar powered raspberry pies with cheap iot SIM cards, each will check a vm in the cloud or at home for a key. If the key isn’t present or can’t be reached they release the info. Could have several servers to store keys to check. Everyday you enter a code to prevent the key from being removed.

    • lightnsfw@reddthat.com
      link
      fedilink
      arrow-up
      9
      ·
      24 days ago

      You would need to account for temporary connection issues to make sure it doesn’t send it after a network outage or something.

  • shastaxc@lemm.ee
    link
    fedilink
    arrow-up
    11
    arrow-down
    2
    ·
    25 days ago

    The whole point in being a whistleblower is to release the documents. Why would you tell everyone what’s happening and not provide the evidence? After you release it, there’s less chance of being harmed, and your job is done besides showing up to court.

    • MisterD@lemmy.ca
      link
      fedilink
      arrow-up
      2
      ·
      24 days ago

      Maybe he wants to release a censored version of the documents and have the dead man switch release the uncensored version.

  • CosmicTurtle0@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    29
    arrow-down
    2
    ·
    25 days ago

    If you really have secrets, you shouldn’t have a dead man’s switch.

    You should have released it all on day one.

    “What makes them keep you alive then?”

    It’s not like corporations are going to get punished for killing you regardless.

    • souperk@reddthat.comOP
      link
      fedilink
      arrow-up
      16
      ·
      25 days ago

      Another thing to consider is that you won’t know immediately that the information you stumbles upon is incriminating. Sometimes it may take years until you have all the pieces of the puzzle.

      • CosmicTurtle0@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        6
        ·
        25 days ago

        Fwiw I’ve actually thought about a dead man’s switch for a while now. When my partner and I were going through end-of-life stuff, having the ability to delete or open things as needed after you’re dead can be important.

        I have a rough design in my head where you register various monitors (e.g. checking email, logging into Lemmy, etc) and so long as you reach a specified threshold you’re considered alive.

        Build in a duress code or dead code that can be entered by your next of kin, then you got something workable.

        For a dead drop like you described in your OP, I agree that instructions to an attorney is probably your best bet. But in the scenario you’re describing, it sounds like having this code won’t be valuable.

    • notabot@lemm.ee
      link
      fedilink
      arrow-up
      29
      ·
      25 days ago

      The problem with releasing them on day one is that you then can’t gather more. If you’ve only just exposed the edges of the malfeasance you need time to get the rest before exposing it. Go too early and the rest of the evidence can be destroyed, covered up or those holding it coearsed into silence.

      Having a dead man’s switch is a way to ensure whatever you’ve gathered gets released if you’re no longer in a position to gather more. As such I disagree with the poster about making it public knowledge before release. Keep it secret until you have everything, then release it.

  • originalfrozenbanana@lemm.ee
    link
    fedilink
    arrow-up
    105
    arrow-down
    1
    ·
    25 days ago

    The real answer: hire a law firm, entrust them with your documents, write into your will what you want to happen with them, and then go on about your business.

    • acidred@lemmy.ml
      link
      fedilink
      arrow-up
      17
      arrow-down
      1
      ·
      25 days ago

      The question assumes that you family could be killed. Why the law firm is protected against such violence in that case?

      • Object@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        15
        ·
        edit-2
        25 days ago

        A dead man’s switch doesn’t quite protect you from garden hose cryptanalysis though. Nothing stops them from asking you to tell them if he got a dead man’s switch.

    • Anonymouse@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      25 days ago

      This is only partially true in the situation the poster named. What if your secrets are from the government or governmental organization? What if you live under a repressive regime where the law firms are either corrupt or that the law is not in your favor?

      That being said, I have a will and a bank safe deposit box. It is filed with the state that I have a will and the will is (also) in the safe deposit box along with stuff that I’d prefer not be released until my death. There’s also a clause in the will that says something to the effect that if somebody sues to invalidate the will, they are automatically excluded from any benefit (or responsibilities). Also, if an individual is found to be somehow responsible or had an intentional involvement in my death, then they are also excluded.

      It’s not air tight, but works for my needs. By the way, I don’t have any company or government secrets, it’s just normal family drama, so please don’t kill me.

    • souperk@reddthat.comOP
      link
      fedilink
      arrow-up
      28
      ·
      25 days ago

      Maybe, add a clause what should happen if you disappear for more than x days. For most jurisdictions you are considered dead if you disappear for a few years.