Skip to main content

WikiLeaks – Good to be bad

FansOfWikiLeaksI never thought that I would be writing on this topic. Its a no-brainer why governments across the world are pissed at WikiLeaks. And I naively assumed that every ordinary citizen would automatically see the potential benefits of WikiLeaks. My belief was cemented by the presence of 600,000+ fans of WikiLeaks on Facebook.  But I have come across people and watched shows on TV which basically debate whether WikiLeaks has done a good thing  by leaking the embassy cables or whether they are essentially an anarchist. Some people have argued that it leads to an erosion of privacy as the cables are private conversations between two individuals. The leaks are nothing but voyeurism on WikiLeaks part which may even lead to deaths of human rights activists across the world. Another argument that is put forth is that WikiLeaks is specifically targeting United States as all the cables are US embassy cables and not of any other country. While all these are good arguments, I will try to show you how these don’t hold much water.

If WikiLeaks were following the approach of telling-Harry-what-Susan-told-Sally, I would also say that it is an invasion of privacy. But these leaks are not bedtime conversations between a couple but between diplomats of nations who are answerable to the people of that nation. These diplomats are part of the government which is elected by its people, for its people and is of its people. If the people don’t know what their government is saying or doing about them, then its better to get rid of that government. A fine example of governments behaving like private corporation is in the cable regarding Yemeni president in which he tells the Americans that “We'll continue saying the bombs are ours, not yours”. If you still think that the leaks are an invasion of privacy, then I would embrace that invasion any day. After all isn’t your privacy violated everyday when you are searched/scanned/fondled at every shopping mall/airport/metro station?

A leak from WikiLeaks has showed that in one incident western troops reported killing 30 Taliban fighters, but a UN investigation found 90 civilian deaths including 60 children. Who will account for deaths of these people? If not for WikiLeaks, we would still be believing the US propaganda. So in fact, WikiLeaks aims at exposing these very acts which may even one day lead to prevention of deaths of innocent civilians rather than causing any more deaths. If you read the cables yourselves, the sensitive names are carefully redacted. Probably this might be one of the reasons that they are leaking them slowly and not all at one go.

The leaks expose governments from every part of the world from Pakistan, Afgahnistan to Saudi Arabia and Zimbabwe. It is therefore a misconception that WikiLeaks primary aim is to destabilise the US government. If there is no fundamental difference between what a government does and what it tells its people, it would have nothing to be embarrassed about. Sadly this is not true in the case of US and that’s the primary reason it is the most embarrassed.

Predictably, the US government is applying all its pressure to crush WikiLeaks. It was ousted from Amazon servers, kicked out by its DNS host. It is due the distributed nature of the internet that it is able to resurface every time it goes down. I hope that US government would stop its whack-a-mole policy and let the world know. In the meantime the least we can do is “Like” WikiLeaks on Facebook.


  1. you picked one argument of Yemen and one argument of the old war diary section to justify the release of of over a million documents in public domain. if wikileaks is so interested in bringing out the truth why doesnt it tell from whom it got the files of its sources. that is also a truth that i am interested in knowing.
    What a crap that assange fellow is. This release is nothing compared to washington diaries that actually showed some level of crime done by the gov. These release is what the american government is calling it - digital anarchists. The idiots are turning over all the trash cans hoping some of them will show what kind of garbage people throw out.

  2. @Anonymous No offence, but you are sounding like Joe Lieberman/Sarah Palin (pick whatever suits you). I picked those documents as they are the best ones that show why WikiLeaks is needed. If you want to read it all, go to WikiLeaks website.

    WikiLeaks is just not exposing crimes done by governments (Pakistan, Afghanistan, Yemen, Zimbabwe) but also those done by corporations (Shell, Pfizer). How much more dirt do you want? :)

  3. @ anonymous : Not disclosing the source is the first and foremost foundations of fourth estate. I ask what good is it if I disclose my source to you.

    You would dig into my past, go through my garbage, find a broken condom and arrest me. So even if the documents I provide are authentic, it is not credible because I broke a condom.

    Shame on me.Right monsieur?


Post a Comment

As far as possible, please refrain from posting Anonymous comments. I would really love to know who is interested in my blog! Also check out the FAQs section for the comment policy followed on this site.

Popular posts from this blog

Pi Hole - Ad blocking (Turbocharged!)

The entire internet is now made up of ads. To easily navigate it and find the information you are looking for, most people use ad blocking software. It improves page loading times and also uses less data (sometimes by up to 10 times!)
Google Chrome is the de facto browser of choice for most people. Google's main business is advertising. So you can see how ad-blocking software collides with Google's business objectives. When Chrome was trying to be popular, it started allowing plugins like AdBlock Plus etc. Then slowly it started partnering with them for "Acceptable Ads Program" for a lot of money. Now after cementing its position as the most popular browser, Google is now coming down hard on ad blocking software. It is turning off a Chrome API (webRequest API) which most ad blocking plug-ins use to block ads.
Enter Pi Hole. This is an amazing use of Raspberry Pi which blocks ads before they enter your network. It keeps a blacklist of most popular ad serving domains …

Centralized Configuration for .NET Core using Azure Cosmos DB and Narad

We are living in a micro services world. All these services are generally hosted in Docker container which are ephemeral. Moreover these service need to start themselves up, talk to each other, etc. All this needs configuration and there are many commercially available configuration providers like Spring Cloud Config Server, Consul etc. These are excellent tools which provide a lot more functionality than just storing configuration data. However all these have a weakness - they have a single point of failure - their storage mechanism be it a file system, database etc. There are ways to work around those but if you want a really simple place to store configuration values and at the same time make it highly available, with guaranteed global availability and millisecond reads, what can be a better tool than Azure Cosmos DB!
So I set forth on this journey for ASP.NET Core projects to talk to Cosmos DB to retrieve their configuration data. For inspiration I looked at Steeltoe Configuratio…

IoT on Google Cloud Platform

Google wants people to use its Cloud Platform for connecting and managing IoT devices through IoT Core and use other GCP components like BigQuery to analyze data produced by those devices. While these products are fantastic, they also have some real world challenges.
IoT Core provides a managed service for connecting IoT devices. It talks with both HTTP and MQTT protocols and features one-click integration with Cloud PubSub easing most of the infrastructure tasks. However there are some limitations:
You cannot use any random MQTT topic to send/receive messages as you would expect on a custom MQTT bridge. There are special topic formats to send messages and also to receive commands.IoT Core uses Public-Private Key cryptography to secure devices. All IoT devices must first authenticate using the Public Key in a JWT token and then start sending and receiving messages. While these may seem like reasonable restrictions, one has to keep in mind that hardware vendors are still stuck in the 9…