Fact-checked by Grok 2 weeks ago

Cryptome

Cryptome is an online archive and disclosure platform founded in June 1996 by John Young and Deborah Natsios, dedicated to publishing documents on topics including cryptography, privacy, intelligence, national security, dual-use technologies, and secret governmental operations, encompassing both openly available and classified materials prohibited by authorities worldwide. The site's core mission centers on countering official secrecy as a perceived threat to democracy through anonymous submissions, extensive archiving since its inception, and resistance to suppression efforts, having operated for nearly three decades without court-mandated content removals. Cryptome achieved prominence as a forerunner to platforms like WikiLeaks—its founder John Young, who co-registered the wikileaks.org domain, collaborated with Julian Assange on WikiLeaks' launch in 2006—and for disseminating unredacted diplomatic cables prior to major leaks, prompting Young to publicly challenge U.S. authorities to indict him alongside Assange for similar publications.

Founders and Operators

John Young

John L. Young (c. 1936 – March 28, 2025) was an architect based in and the co-founder of Cryptome, an online repository dedicated to publishing documents on , intelligence agencies, and government secrecy. Trained as an architect, Young was an early adopter of computer-aided design tools and developed a fascination with cryptology during the , amid controversies over encryption software like Phil Zimmermann's (PGP), which faced U.S. government scrutiny for potential export violations. Young's political outlook was shaped by a nomadic childhood in and radicalization during the against the and university segregation policies. In 1996, he co-founded Cryptome with his partner, fellow architect Deborah Natsios—who was the daughter of a CIA officer—to assert the public's right to access government-secreted materials, starting with leaked and public-domain files inspired by the PGP publication saga. As the site's primary operator, Young maintained its austere, low-maintenance design—requiring about two hours daily and under $2,000 annually—with no or editorial redactions, amassing over 70,000 documents, including lists of intelligence operatives and U.S. diplomatic cables published ahead of in some cases. Young's operational philosophy prioritized unfiltered transparency, rejecting secrecy in all forms; he described himself as "a fierce opponent of secrets of all kinds… there should be none." This approach drew federal attention, including multiple FBI visits—such as one in November 2003 over recent postings—and a brief 2010 Microsoft-hosted service disruption, though he faced no legal charges. He briefly collaborated with founders but severed ties after questioning their multimillion-dollar fundraising ambitions, later criticizing Edward Snowden's selective leak strategy as insufficiently comprehensive. Young died on March 28, 2025, at age 89 in a Manhattan rehabilitation facility from complications of large-cell non-Hodgkin’s lymphoma, survived by Natsios. His stewardship positioned Cryptome as a precursor to later leak platforms, emphasizing archival persistence over publicity or funding.

Deborah Natsios

Deborah Natsios is an architect and co-founder of Cryptome, an online archive dedicated to publishing documents on , , and government . Alongside her husband, John Young, she established the site in 1996 as an extension of their architectural practice, Natsios Young Architects, in , framing it as an "architecture of information" that organizes suppressed materials into accessible repositories. Natsios, the daughter of a officer, brought a perspective informed by her family's background, which influenced Cryptome's focus on transparency and critique of secrecy. As a principal operator of Cryptome, Natsios contributed to curating and hosting thousands of leaked or restricted files, including those on cryptology, dual-use technologies, and state practices, while adhering to a policy of anonymous submissions without editorial censorship beyond legal boundaries. Her involvement extended to related projects like Cartome.org, which documents urban infrastructure, reflecting her architectural expertise in mapping physical and informational structures. Natsios has described Cryptome's mission as reversing the "panopticon" of oversight by exposing hidden flows, emphasizing empirical over narrative imposition. Following John Young's death in March 2025, Natsios continued managing Cryptome's operations, reopening the site shortly after a temporary closure and maintaining its commitment to unfiltered archival of contentious materials amid ongoing legal and technical pressures. Her scholarly work as an independent researcher has intersected with Cryptome's outputs, producing analyses on topics like discrepancies and infrastructure, often published directly on the . This hands-on role underscores her dedication to first-hand verification and causal linkages in information dissemination, prioritizing verifiable leaks over speculative commentary.

Operational Policies and Practices

Content Selection and Publication Standards

Cryptome selects content primarily focused on themes of , intelligence activities, , privacy rights, freedom of expression, and secret governmental operations, including both open-source and classified materials that challenge official secrecy. Submissions are accepted anonymously through encrypted channels or remailers, with no requirement for leaker identification, as the site encourages contributors to handle their own to avoid risks. Documents are published in their raw form, without substantive editing, , or contextual commentary, allowing the materials to speak implicitly to issues of and . Publication standards prioritize unfiltered dissemination over verification or curation, with operators explicitly disclaiming authority or reliability: as John Young emphasized, the site serves as a of potentially imaginative or unverified material, advising users not to trust its contents blindly, as they may include falsehoods or . Authenticity is not assessed by Cryptome staff, reflecting a policy that it is the public's role to evaluate submissions rather than the publishers'. Redactions are rare and limited to protecting non-public individuals' , while classified markings are typically retained to highlight practices; content is removed only under U.S. with , none of which has been served as of the site's operation. This approach stems from a to maximal as a counter to institutional opacity, though it has drawn criticism for potentially amplifying unverified or harmful leaks without safeguards. Young has described Cryptome as potentially "untrustworthy" or even a "" in cautionary terms, underscoring the site's intent to provoke scrutiny rather than endorse facts. Daily updates historically included diverse leaks, from agent lists to corporate records, maintaining an archival emphasis without thematic exclusion beyond relevance to core topics.

Archival and Technical Approach

Cryptome maintains a straightforward, text-based archival system hosted on a single domain since its inception in June 1996, relying on static directories and direct file links rather than dynamic databases or to ensure and resistance to . Documents are stored in common formats including PDF, archives, DOCX, , WAV audio files, and compressed files, with examples such as individual PDFs ranging from hundreds of kilobytes to several megabytes and larger compressed sets up to 50 MB or more. This approach prioritizes raw preservation over user-friendly interfaces, allowing plain-text indexing and annual compilations like "Cryptomb" volumes that catalog publications from specific periods, such as Cryptomb 1 covering June 1996 to June 1997. The platform enforces a strict no-deletion for published content, retaining all submissions indefinitely unless compelled by U.S. court orders, which have occasionally resulted in targeted removals. To mitigate risks of unauthorized alterations, Cryptome explicitly disavows official mirrors, citing historical instances of tampering, , and file modifications on third-party sites, as detailed in communications to mailing lists. Submissions are accepted anonymously via encrypted channels, utilizing PGP public keys—such as John Young's key ID 0x28679DAA—for secure transmission, with guidelines emphasizing verifiable provenance to avoid fabricated leaks. Technically, the site implements basic controls to preserve and , blocking automated downloads exceeding 100 files per day from detected bots while permitting users unrestricted . This minimalist , devoid of heavy scripting or reliance on external services, supports long-term durability against failures or evolving standards, aligning with the operators' emphasis on unadorned dissemination over enhanced .

Historical Development

Founding and Initial Growth (1996–2006)

Cryptome was established in June 1996 by City-based architects John Young and Deborah Natsios as an online repository for documents related to cryptography, intelligence agencies, surveillance, and issues. Sponsored by their architecture firm, Natsios-Young Architects, and structured as a 501(c)(3) private foundation, the site was designed to host materials submitted anonymously that governments or corporations sought to suppress or censor. Its creation stemmed directly from the founders' prior involvement in the Cypherpunks mailing list, an early group that promoted the use of strong to protect individual against state overreach. From inception, Cryptome operated on a policy of publishing submissions with minimal intervention, eschewing editorial commentary or verification to prioritize raw disclosure and encourage further contributions. Early content included technical papers on cryptographic protocols and dual-use technologies, reflecting the Cypherpunks ethos amid U.S. government export controls on encryption software treated as munitions. By 1999, the site had published key documents exposing the ECHELON signals intelligence network, a global interception system operated by the Five Eyes alliance, drawing international scrutiny and amplifying awareness of mass surveillance capabilities. The platform's growth during this period relied on word-of-mouth among privacy advocates, hackers, and whistleblowers, with submissions arriving via email and accumulating into a searchable archive hosted initially on modest web infrastructure. Notable early releases encompassed lists of purported intelligence officers and internal agency memos, prompting pushback such as a reported 1999 effort by MI6 to have Cryptome removed from its ISP for hosting sensitive personnel data. Despite such pressures, the site persisted without shutdowns, expanding its holdings through consistent, unfiltered publication that positioned it as a precursor to later transparency initiatives by demonstrating the viability of decentralized document dissemination in the pre-social media era. By the mid-2000s, Cryptome had solidified a reputation for endurance, having weathered legal and technical challenges while maintaining open access to its growing collection of over a decade's worth of leaks.

Major Challenges and Shutdown Attempts (2007–2010)

In April 2007, Cryptome received a termination notice from its hosting provider, Verio (a of NTT America), alleging violations of the company's , though no specific infractions were detailed in the communication. The notice, delivered via and certified mail on April 20, required shutdown within 10 days, prompting operators John Young and Deborah Natsios to publicly challenge the decision and rapidly migrate the site's content to a new host, thereby averting the threatened suspension. Verio later stated that the action stemmed from an unresolved situation distinct from prior disputes, but declined further elaboration, leading to unverified speculation that sensitive publications, such as documents on intelligence practices, may have influenced the move. On February 24, 2010, Cryptome faced a temporary shutdown after publishing 's "Global Criminal Compliance Handbook," a 22-page internal guide outlining the company's procedures for responding to government surveillance requests for user data. filed a (DMCA) notice claiming infringement, prompting domain registrar to lock the cryptome.org domain and take the site offline, disrupting access to its archive of over 40,000 documents. Following public criticism and advocacy from groups like the , which argued the publication qualified as for public education on corporate-government data cooperation, withdrew the complaint the next day, restoring the site by February 25. In early October , Cryptome suffered a breach when an intruder compromised an email account linked to founder , using it to access the Network Solutions registrar account and delete approximately 54,000 files totaling 7 gigabytes from the server. The attacker, who publicly boasted of the exploit and shared screenshots of internal emails as proof, claimed motivation from retaliation over Cryptome's hosting of sensitive documents, including purported banking collapse files; the incident exposed submitters' contact details and prompted Young to announce intentions to pursue federal charges for unauthorized access. The site was restored from backups within days, highlighting ongoing vulnerabilities in email-linked despite Cryptome's emphasis on operational security.

Evolution and Relationship to WikiLeaks (2010–2024)

In the years following intensified government pressures in the late , Cryptome sustained its archival operations under and Deborah Natsios, expanding its repository to exceed 70,000 files by 2013, encompassing documents on , , and without altering its core non-monetized, transparent model. The site weathered a 2010 compromise of its hosting account, resulting in a hack that copied its data, yet quickly recovered and persisted in publishing unfiltered submissions. This period marked no fundamental shift in practices; instead, Cryptome emphasized endurance over expansion, rejecting the and organizational that Young viewed as deviations from pure disclosure principles. A pivotal demonstration of this stance occurred on September 1, 2011, when Cryptome released the full, unredacted cache of 251,000 U.S. diplomatic cables—originally leaked via —a day prior to ' own unredacted publication, underscoring Cryptome's policy against selective redaction even amid risks to sources. U.S. authorities never requested their removal from Cryptome, as Young later testified in Julian Assange's 2020 extradition proceedings, highlighting differential treatment compared to ' legal entanglements. Through the and into the early , Cryptome maintained a low-profile trajectory, avoiding media sensationalism and prioritizing raw document dissemination over narrative curation, in contrast to ' high-visibility partnerships and controversies. Young's early involvement with —registering its domain and briefly joining its advisory board in 2006—soured by 2010, when he publicly criticized the organization for soliciting multimillion-dollar donations and concealing internal operations, prompting his exit and accusations from WikiLeaks of a "smear campaign" after Cryptome posted purported insider emails questioning its motives. Young articulated stark contrasts, asserting Cryptome eschewed profit, secrecy, and hierarchical control, labeling WikiLeaks' approach as cult-like and potentially criminal in its opacity. Despite mutual roots in anti-secrecy , Cryptome positioned itself as the uncompromised precursor, with Young dismissing WikiLeaks' fame as a distraction from substantive ; this rift endured, as evidenced by Young's 2020 framing Cryptome's unheeded publications as against claims of reckless endangerment leveled at Assange. By 2024, Cryptome's steadfast, under-the-radar persistence reinforced its role as a foil to WikiLeaks' embattled evolution, prioritizing archival integrity over global advocacy.

Recent Events Including John Young's Death (2025)

John L. Young, co-founder of Cryptome, died on March 28, 2025, in at the age of 89. He resided there with his partner and Cryptome co-founder Natsios, who continued to operate the site alongside him until his passing. Young's death marked the end of an era for the archival platform, which he had maintained as a for unredacted document leaks since its inception in 1996, often defying government pressures without compromise. Following Young's death, tributes from advocates and enthusiasts highlighted his role as a precursor to platforms like , emphasizing his architectural background and insistence on publishing raw, unaltered materials regardless of controversy. Natsios assumed primary of Cryptome, with no reported interruptions to its operations or archival functions as of October 2025; the site remained accessible, hosting its extensive repository of intelligence, surveillance, and cryptography-related documents. No major new leaks or shutdown attempts were documented in early 2025 prior to Young's passing, though the site's enduring policy of minimal moderation persisted amid ongoing global debates over data transparency and state surveillance. obituary in major outlets underscored his skepticism toward institutional narratives, a stance that informed Cryptome's rejection of editorial filters and its focus on empirical document dissemination over interpretive commentary.

Notable Leaks and Publications

Intelligence and Surveillance Documents

Cryptome has hosted extensive archives of documents revealing operational details of intelligence agencies' surveillance programs, including signals intelligence (SIGINT) directives, interception systems, and countermeasures against emanations-based spying. These publications, often sourced from leaks, whistleblowers, or declassified materials, predate major revelations like those from Edward Snowden and include NSA guidelines on collection procedures and global monitoring networks. A key focus has been the ECHELON system, a collaborative SIGINT effort among the Five Eyes nations (United States, United Kingdom, Canada, Australia, and New Zealand) for intercepting global communications. Cryptome published critical files in the early 2000s, such as the US Signals Intelligence Directive 18 (USSID 18) from 1993, released on June 23, 2001, which specifies legal and procedural constraints on targeting foreign communications while minimizing incidental collection on U.S. persons. These materials, including European Parliament inquiries into ECHELON's scope, highlighted automated interception of satellite, microwave, and fiber-optic traffic for keywords and patterns, fueling debates on transatlantic privacy violations as early as 2000. Surveillance countermeasures featured prominently in NSA-related releases, notably the Telecommunications and Systems Security Instruction (NSTISSI) No. 7000 on , published January 2, 2001. This directive outlines protections against and other techniques exploiting electromagnetic leaks from computers and devices to remotely capture data without physical access, underscoring agencies' awareness of domestic vulnerabilities in classified environments. Personnel exposure documents have also been central, with Cryptome compiling and publishing lists of alleged intelligence operatives. In 2005, it released a combined roster of 276 officers, aggregating prior disclosures from May 1999 (116 names), August 1999 (82 names), and November 2002 (78 names), including diplomatic cover identities and postings. Similar releases covered CIA station assignments in and, following a 2011 hack of , emails containing contact details for hundreds of U.S. officials, amplifying risks to covert networks. These actions, defended by founder John Young as essential for transparency, drew rebukes from agencies over potential endangerment but lacked verified harm in public records.

Cryptography and Privacy Materials

Cryptome has archived and published numerous documents illuminating U.S. government policies on , particularly restrictions on exports during the 1990s "." These include primary sources such as (NSA) assessments and Commerce Department announcements, which detail efforts to limit strong 's dissemination abroad while balancing claims against commercial interests. For instance, in October 1998, Cryptome released the document "NSA: 56-Bit Crypto Export OK," outlining the agency's conditional endorsement of exporting 56-bit symmetric , a key length later criticized as insufficient against brute-force attacks feasible by state actors with sufficient computational resources. Similar publications covered disclosures and advocacy against export bans, contributing to public discourse that pressured revisions in U.S. regulations by 2000, when most commercial was exempted from strict controls. Beyond policy critiques, Cryptome hosts technical materials on cryptographic implementations and vulnerabilities, often sourced from academic or industry leaks. Examples encompass analyses of public-key systems, digital signatures, and countermeasures against side-channel attacks, such as those exploiting electromagnetic emanations in secure devices—a topic addressed in archived standards documents from the 1970s onward, which specify shielding requirements to prevent unintended information leakage from encrypted systems. These publications underscore causal risks in hardware-based crypto, where physical proximity or specialized equipment can compromise confidentiality without breaking algorithms directly, a concern validated by subsequent into attacks. On privacy, Cryptome emphasizes materials advancing and resistance to , including peer-reviewed papers on protocols foundational to tools like . Notable entries cover defenses in low-latency networks, where adversaries correlate entry and exit points to deanonymize users, and proposals for accountable anonymity systems blending pseudonymity with verifiable compliance. Such documents, often prohibited or classified elsewhere, highlight empirical trade-offs: enhanced via layered increases and resource demands, potentially limiting , while design flaws enable state-level deanonymization as demonstrated in real-world exploits. Cryptome's unfiltered hosting of these—without editorial endorsement—facilitates scrutiny of both innovative defenses and inherent limitations, drawing from direct submissions rather than mediated outlets prone to institutional filtering.

High-Profile Releases and Their Immediate Effects

One notable series of releases involved lists of alleged intelligence officers. In May 1999, Cryptome published initial compilations of purported officers, followed by updates, culminating in a 2005 aggregation of 276 names drawn from prior disclosures. These publications prompted immediate official inquiries; by February 2006, FBI agents contacted Cryptome to ascertain the sources of the lists, reflecting concerns over potential compromises to active operations. Similar releases of alleged CIA and other agency personnel identities, dating back to the site's early years, elicited comparable scrutiny but no verified prosecutions tied directly to the disclosures, as the names often derived from public or previously leaked materials. In February 2011, Cryptome hosted and disseminated over 70,000 leaked emails from HBGary Federal, obtained via an hack targeting the firm's attempts to unmask group members. The emails exposed HBGary's proposals, in collaboration with firms like and Berico Technologies, to deploy disinformation campaigns against critics, including fabricated personas and surveillance tactics for corporate clients. Immediate repercussions included the resignation of HBGary Federal CEO Aaron Barr on February 7, 2011, amid public backlash, alongside operational fallout for the firm, which faced lawsuits and lost contracts valued in the millions. The release amplified scrutiny of private intelligence practices, prompting congressional inquiries into ethics. Cryptome's 2007 publication of the Kroll Associates report on Kenyan government corruption, originally commissioned in 2004, detailed alleged embezzlement of over $1 billion in public funds by high-ranking officials. The disclosure triggered swift political reactions in , including parliamentary debates and calls for investigations, though it also drew legal threats against leakers without directly implicating Cryptome in prosecutions. These cases underscore the site's role in catalyzing short-term accountability pressures, often through amplification of existing leaks rather than original sourcing, while evading sustained legal repercussions due to First Amendment protections.

Reception, Impact, and Controversies

Achievements and Positive Recognition

Cryptome received the Defensor Libertatis award at the Big Brother Awards in , honoring its operators for a lifetime commitment to combating and through the maintenance of the Cryptome.org platform. The prize specifically recognized John Young and Deborah Natsios for defending liberty by hosting prohibited documents on topics including freedom of expression, , and cryptology. Established in 1996, Cryptome amassed over 70,000 files by 2013, establishing itself as a foundational archive for leaked materials on intelligence agencies, cryptographic tools, and government surveillance practices. This longevity and volume of publications positioned it as a precursor to later transparency initiatives, with founder John Young advising Julian Assange during WikiLeaks' inception in 2006. Cryptome's model of unredacted document hosting influenced subsequent whistleblowing platforms by prioritizing raw disclosure over editorial curation. Privacy advocates and technologists have praised Cryptome for advancing public awareness of state secrecy without adopting user tracking or , a principle upheld throughout its operation. Following John Young's death in 2025, obituaries in major outlets described the site as a pioneering effort that "preceded " and demonstrated the internet's potential for unfiltered information dissemination. Its resistance to shutdown attempts and consistent focus on empirical documentation of abuses earned it retrospective acclaim as an under-recognized cornerstone of digital movements.

Criticisms and Security Concerns

Cryptome has drawn criticism for publishing materials perceived as threats to , including detailed guides and imagery highlighting vulnerabilities in . In a 2005 Reader's Digest article, correspondent Michael Crowley labeled the site an "invitation to terrorists," citing its postings of maps, photographs, and other data on rail tunnels, gas lines, and similar targets that could facilitate attacks. The platform's policy of releasing documents without has similarly provoked objections, particularly regarding its 2011 publication of over 250,000 unredacted U.S. diplomatic cables a day before ' full archive surfaced. Critics, including U.S. government representatives, argued that such disclosures endangered sources by exposing unmasked identities in hostile environments. Further controversy arose from Cryptome's dissemination of alleged agent lists and related sensitive files, which detractors claimed risked operatives' lives by providing adversaries with actionable . Security vulnerabilities have compounded these concerns. In 2010, hackers breached Cryptome's server, accessing email accounts and potentially revealing whistleblower identities and submission details, thereby undermining trust in the site's safeguards for contributors. A June 2014 infection prompted host Network Solutions to deactivate the domain temporarily, with founder John Young decrying the action as disproportionate despite confirmed threats to visitors' systems. In September 2015, the theft of Cryptome's PGP encryption keys heightened fears over intercepted communications, as the compromise could decrypt prior exchanges with sources reliant on the keys for secure transmission. Legal pressures have also spotlighted operational risks; in February 2010, successfully lobbied for a temporary shutdown after Cryptome posted a technical guide to exploiting its software for data access, framing the release as a violation. have repeatedly contacted Young over espionage-related leaks and perceived security gaps, though no prosecutions followed, underscoring ongoing scrutiny without resolution.

Broader Influence on Transparency Movements

Cryptome's pioneering approach to archiving and disseminating unredacted documents on , , and since 1996 established a foundational model for digital transparency platforms, predating and influencing entities like . , ' founder, explicitly credited Cryptome as its "spiritual godfather," noting that he contacted co-founder John Young in 2006 to discuss after encountering the site through cypherpunk mailing lists. This influence stemmed from Cryptome's emphasis on raw, unaltered releases—over 58,000 files by 2010, including suppressed images of U.S. military casualties in —which demonstrated the viability of online repositories for fostering public scrutiny of powerful institutions without editorial filtering. Rooted in principles advocating "privacy for the weak and for the powerful," Cryptome contributed to a broader in that prioritized cryptographic tools and leak dissemination to counter state secrecy. Young's architectural background and aggressive use of Freedom of Information Act (FOIA) requests amplified this, turning Cryptome into a hub for whistleblower submissions and legal challenges to practices, which inspired subsequent groups to integrate FOIA with technological mechanisms. By hosting materials that paralleled ' releases, such as diplomatic cables and reports, Cryptome normalized the risks of publishing sensitive data, as evidenced by Young's 2022 public demand to be indicted alongside Assange for disseminating identical content, reinforcing a precedent for accountability through exposure. This legacy extended to shaping transparency movements beyond leaks, influencing the development of tools like OpenLeaks and by proving the endurance of decentralized, non-profit archiving against shutdown attempts and legal pressures from entities including in 2010. Cryptome's unyielding stance—eschewing opacity that Young criticized in peers—fostered skepticism toward centralized operations, promoting instead , verifiable disclosure as a bulwark against institutional overreach in and erosion.

References

  1. [1]
    Cryptome
    No information is available for this page. · Learn why
  2. [2]
    Indict Us Too: Daniel Ellsberg & Cryptome's John Young Demand ...
    Dec 14, 2022 · Cryptome is a website that began in 1996 and is seen by many as a precursor to WikiLeaks. Young also helped Assange start WikiLeaks in 2006.
  3. [3]
    Cryptome Founder Asks to Be Indicted with Assange
    Dec 5, 2022 · John Young, the founder of the Cryptome website, has asked the US Justice Department to also indict him as he published un-redacted State Dept. files before ...
  4. [4]
    John L. Young, 89, Dies; Pioneered Posting Classified Documents ...
    Jul 3, 2025 · John L. Young, who used his experience as a computer-savvy architect to help build Cryptome, a vast library of sensitive documents that both preceded WikiLeaks.Missing: biography | Show results with:biography
  5. [5]
    John Young, co-founder of web archive Cryptome, dies at 89
    May 24, 2025 · Cryptome was set up by Young and his partner Deborah Natsios, who were architects living in New York at the time. They had similar backgrounds - ...Missing: biography | Show results with:biography
  6. [6]
    Deborah Natsios | CCCB
    Deborah Natsios is a principal of Natsios Young Architects in New York City. She is co-founder with John Young (1996), of Cryptome.org and Cartome.org.
  7. [7]
    Open Source Design 01: The architects of information - DOMUS
    Jun 18, 2011 · The architecture of John Young and Deborah Natsios is made of information. Their portfolio: Cryptome.org, which hosts thousands of suppressed and classified ...
  8. [8]
    Reversing the Panopticon - USENIX
    Abstract: Cryptome welcomes documents for publication that are prohibited by governments worldwide--in particular, material on cryptology; dual-use technologies ...
  9. [9]
    The Whistleblower Architects: surveillance, infrastructure, and ...
    Jul 5, 2016 · For one, Natsios and Young are practicing architects based in New York City, who find few points of distinction between their work with Cryptome ...<|control11|><|separator|>
  10. [10]
    John L. Young, architect and the co-founder (with his wife Deborah ...
    Jun 4, 2025 · He was born on July 17, 1927 in Whitley County, Kentucky to the late Arthur Grant Young and Elizabeth “Lizzie” (Powers) Young.Missing: biography | Show results with:biography
  11. [11]
    Deborah Natsios, Cryptome
    Deborah Natsios, Cryptome: 2016-0050.vid (±) False Tallies-the Prisoner's ... Bowery Ghost Ships Launched - Natsios-Cryptome May 14, 2015 Deborah Natsios John ...
  12. [12]
    John Young and Deborah Natsios (Cryptome.org) Interviewed in ...
    Jun 20, 2011 · The founders of Cryptome.org, architects John Young and Deborah Natsios, are interviewed in Domus magazine as part of their open source themed issue.
  13. [13]
    Requester's Voice: John Young - MuckRock
    Nov 15, 2013 · We aim to avoid anal ysis, editorializing, and such. What we publish does that implicitly. We like to publish feedback, in particular ...
  14. [14]
    An Excerpt From 'This Machine Kills Secrets': Meet The 'Spiritual ...
    Sep 17, 2012 · Before WikiLeaks, there was Cryptome. John Young, a New-York-based architect and political activist, was publishing secret intelligence ...Missing: founder biography
  15. [15]
  16. [16]
  17. [17]
  18. [18]
    Cryptome 2016 - 1996
    Donate for the Cryptome archive of files from June 1996 to the present ...
  19. [19]
    Cryptome - Bitcoinwiki
    According to the website's mission statement, “Cryptome welcomes documents for publication that are prohibited by governments worldwide, in particular material ...
  20. [20]
    Older, quieter than WikiLeaks, Cryptome perseveres - KVAL
    Mar 8, 2013 · The website says Cryptome welcomes classified and confidential documents from governments worldwide, "in particular material on freedom of ...
  21. [21]
    In memory of John Young - News From Dyne
    May 26, 2025 · John Young has died. He was eighty-nine years old. His work with Cryptome stands as pre-eminent for many who were active in the early days of digital networks.Missing: biography | Show results with:biography
  22. [22]
    ECHELON - Buggedplanet.info
    Oct 6, 2016 · 23.12.1999, cryptome.org, NEW EXPOSURE ON ECHELON - Sigint/Surveillance/Denmark ; 21.12.1999, cryptome.org, INTERVIEW: ECHELON WAS MY BABY - ...
  23. [23]
    Attack on Spy Activist's Site - WIRED
    Jul 24, 2000 · But what brought the struggling machine to its knees was what cryptome.org publisher John Young says is a denial-of-service attack. "News ...<|separator|>
  24. [24]
    Cryptome.org Lives, Moves to Network Solutions - WIRED
    May 4, 2007 · We still don't know why Verio/NTT gave Cryptome.org the boot, but John Young says he's found a new home for the controversial government-secrets ...
  25. [25]
    Who Killed Cryptome.org? - WIRED
    May 1, 2007 · The serial website builder Riley Walz launched a project that tracked San Francisco parking enforcement in real time—until the public data feed ...
  26. [26]
    ISP pulls Cryptome site after Deepwater docs are posted - ZDNET
    May 8, 2007 · In a statement, Verio revealed no details about why Cryptome was terminated. "Verio's decision to terminate Cryptome in this instance ...
  27. [27]
    Cryptome.org, repository of sensitive docs, gets shutdown notice ...
    Cryptome.org, an online document repository maintained for years by open information advocate John Young, has received a notice from host Verio/NTT that the ...
  28. [28]
    Microsoft Takes Down Whistleblower Site, Read the Secret Doc Here
    Feb 24, 2010 · Regardless, Cryptome was shut down by Network Solutions and its domain name locked on Wednesday -- shuttering a site that thumbed its nose at ...
  29. [29]
    Cryptome's Publication of Microsoft's Compliance Manual is a Fair Use
    Feb 26, 2010 · Cryptome used the manual for a noncommercial, transformative purpose—to educate the public on how the government and Microsoft work together ...
  30. [30]
    Cryptome restored after Microsoft change of heart - The Register
    Feb 25, 2010 · Microsoft has rescinded the copyright complaint that resulted in the shutdown of the long-standing whistleblower website, Cryptome.org, ...
  31. [31]
    Secret-Spilling Sources at Risk Following Cryptome Breach - WIRED
    Oct 5, 2010 · Young, who has long been suspicious of WikiLeaks' motives, began publishing the tips this spring, despite expressing doubts publicly about their ...
  32. [32]
    Cryptome Hack Under Investigation - Dark Reading
    Oct 7, 2010 · Whistleblowing site's founder claims attacker was retaliating against posting of sensitive documents.Missing: seizure 2007-2010
  33. [33]
    Cryptome vows to pursue those who breached site • The Register
    The hacker claims to have accessed John Young's email at Earthlink, a federal crime, and Zetter said she was shown screen shots of email to prove access.
  34. [34]
    Older, quieter than WikiLeaks, Cryptome perseveres
    Mar 9, 2013 · John Young, 77, started Cryptome in 1996, and it has since amassed more than 70,000 files, from lists of secret agents to high-resolution photos ...Missing: evolution | Show results with:evolution
  35. [35]
    Wikileaks' estranged co-founder becomes a critic (Q&A) - CNET
    Jul 20, 2010 · John Young, editor of document-leaking site Cryptome.org, has switched from being one of Wikileaks biggest fans to one of its prominent critics.Missing: selection | Show results with:selection
  36. [36]
    US has never asked WikiLeaks rival to remove leaked cables, court ...
    Sep 24, 2020 · The evidence was given by a veteran internet activist whose website, Cryptome, published more than 250,000 classified documents a day before ...Missing: 1996-2000 | Show results with:1996-2000
  37. [37]
    Wikileaks Unlike Cryptome
    Oct 18, 2010 · 1. Cryptome primary purpose is not to make money, Wikileaks wants to make a lot of money. · 2. Cryptome does not practice secrecy, Wikileaks does ...
  38. [38]
    John L. Young, the Guy Who Created Wikileaks Before ... - Gizmodo
    Jun 11, 2025 · “John L. Young, architect and the co-founder (with his wife Deborah Natsios) of Cryptome, passed away in March,” the publication wrote, but ...Missing: biography | Show results with:biography
  39. [39]
    John Young, RIP - AntiPolygraph.org
    Jun 8, 2025 · New York architect John Young, who co-founded the website Cryptome, died on 28 March 2025. He was 89 years old.
  40. [40]
    NSA Documents on Cryptome
    ... published by Cryptome from March 1995 to the present. Two collections on ECHELON and TEMPEST. Key Echelon Files nsa-ussid18.htm US Signals Intelligence ...
  41. [41]
  42. [42]
  43. [43]
    [PDF] Project Echelon: U.S. Electronic Surveillance Efforts - EPIC
    Mar 2, 2000 · 19. Links to the reports have been published on a private web-site, http://cryptome.org/dst-1.htm.
  44. [44]
  45. [45]
    276 British Spies - Schneier on Security -
    Aug 31, 2005 · The website Cryptome has a list of 276 MI6 agents: This combines three lists of MI6 officers published here on 13 May 1999 (116 names), 21 ...
  46. [46]
    Intel officials' emails posted after hack of cybersecurity group
    Sep 17, 2011 · The names and email addresses of hundreds of U.S. intelligence officials have been posted on an anti-secrecy website ... Cryptome.org ...
  47. [47]
    How Old IsTEMPEST? - Cryptome
    TEMPEST (NACSIM-5001) was intended to to prevent 'compromising emanations', including classified information leaking on encrypted links. This is the basic ...
  48. [48]
    [PDF] Digital Signatures, Certificates and Electronic Commerce
    Public key cryptography can be used to achieve either confidentiality or digital signatures. Confidentiality is provided when the deciphering key is kept ...
  49. [49]
    [PDF] Introducing Accountability to Anonymity Networks - arXiv
    Nov 13, 2013 · Abstract—Many anonymous communication (AC) networks rely on routing traffic through proxy nodes to obfuscate the originator of the traffic.
  50. [50]
    [PDF] Traffic Analysis Attacks and Defenses in Low Latency Anonymous ...
    In general, de-anonymization of anonymous communication is a two-step process. The first step involves finding the anonymity set. In anonymity and privacy ...
  51. [51]
    (PDF) Seeking Anonymity in an Internet Panopticon - ResearchGate
    Aug 6, 2025 · Obtaining and maintaining anonymity on the Internet is challenging. The state of the art in deployed tools, such as Tor, uses onion routing ...
  52. [52]
    Intelligence: NZ's Tomlinson Draws MI6 Wrath Again | Scoop News
    Jul 5, 2006 · On February 9 2006 the website Cryptome reported that FBI agents had sought information on how it acquired lists of MI6 agents. Cryptome wrote: ...<|separator|>
  53. [53]
    HBGary's leaked e-mail ain't getting boring yet - Risky Business Media
    Well, thanks to the "liberation" of HBGary's e-mail by Anonymous and the leak-sifters over at Cryptome, we've now all got access to everything from a high ...Missing: effects | Show results with:effects
  54. [54]
    HBGary Federal Hacked by Anonymous - Krebs on Security
    Feb 7, 2011 · Anonymous responded by hacking into HBGary's networks and posting archives of company executive emails on file-trading networks.Missing: effects | Show results with:effects
  55. [55]
    Anonymous hackers attack US security firm HBGary - BBC News
    Feb 7, 2011 · Online activist group Anonymous hacks an American security firm that claimed to know the identities of the group's leaders.
  56. [56]
    Anonymous vs. HBGary: the aftermath - Ars Technica
    Feb 24, 2011 · <+greg> you realize that releasing my email spool will cause millions in damages to HBGary? <@`k> yes <+c0s> greg: another reason its not ...Missing: Cryptome | Show results with:Cryptome<|control11|><|separator|>
  57. [57]
    Preistraeger - Big Brother Awards 2010
    Oct 22, 2010 · ... Cryptome. John und seine langjährige Partnerin, die Kartografin ... Defensor Libertatis" an den Verteidiger der Freiheit, John Young verliehen.
  58. [58]
    Why Cryptome Launched a Kickstarter Campaign - Business Insider
    May 30, 2014 · Before there was Wikileaks, there was Cryptome, still one of the web's premiere clearing-houses for information that government, industry, ...
  59. [59]
    Transparency and Secrets - MIT Technology Review
    Feb 22, 2011 · WikiLeaks wants to undermine states and corporations by interfering with their ability to “think.” It may not survive, but its innovations ...Missing: influence | Show results with:influence
  60. [60]
    Cryptome pulled OFFLINE due to malware infection: Founder cries foul
    Jun 25, 2014 · Microsoft filed a DMCA notice of copyright violation with NetSol against Cryptome which led to temporary closure back in February 2010.
  61. [61]
    Someone Stole the Encryption Keys of WikiLeaks Precursor 'Cryptome'
    Sep 16, 2015 · The PGP encryption keys of established leaking and archival site Cryptome have reportedly been compromised, according to John Young, ...Missing: cryptography publications
  62. [62]
    Microsoft backs down over online 'spy guide' - The Guardian
    Feb 25, 2010 · Software company had forced closure of Cryptome website for publishing guide that explains how to access millions of pieces of private data.
  63. [63]
    Hitting the Books: The media's role in history's most damaging data ...
    Jun 27, 2020 · “We publish people who object to what's appearing, and then let people decide.” It is unlikely that Cryptome was exploited at scale by ...
  64. [64]
    A swarm of leaks - The Economist
    Dec 9, 2010 · An existing rival is Cryptome, founded in 1996 as a part-time “amateur operation” by John Young and Deborah Natsios, two New York architects ...Missing: biography | Show results with:biography<|control11|><|separator|>
  65. [65]
    Transparency for the Powerful | 6 | Cypherpunk Ethics | Patrick D. And
    The cypherpunk movement has a unifying slogan: privacy for the weak, transparency ... Cryptome—it discusses the two central function of Julian Assange's WikiLeaks ...Missing: activism | Show results with:activism
  66. [66]
    The Whistleblower Architects: surveillance, infrastructure, and ...
    Jul 7, 2016 · A two-part interview with Cryptome, an online repository of leaked government secrets and other documents relevant to contemporary surveillance and its ...
  67. [67]
    [PDF] Disclosure's Effects: WikiLeaks and Transparency
    Feb 13, 2012 · An important predecessor to WikiLeaks as an anonymous host for leaked documents is Cryptome, whose founder, Paul Young, served briefly on the ...
  68. [68]
    John L. Young, 89, Dies; Pioneered Posting Classified Documents Online
    New York Times obituary detailing John Young's early involvement with WikiLeaks, including co-registering its domain.