julian assange wikileaks

Julian Assange has become a famous figure in the worlds of journalism and hacking.

He’s the son of anti-war activists and was a founding member of the ethical hacking group the International Subversives in his teens. So maybe it was inevitable he would go on to become editor in chief of an organization like WikiLeaks.

Besides leaking classified military documents related to the Iraq and Afghanistan wars, WikiLeaks has released documents from intelligence contractors that develop surveillance and hacking projects used by governments to spy on their citizens.

Staying out of reach

Assange didn’t become well known until 2010, when U.S. soldier Chelsea Manning used WikiLeaks to leak the largest set of classified documents ever released to the public.

But he helped found WikiLeaks four years before, in 2006. And as early as 1999, Assange set up leaks.org and publicized an NSA patent for voice-data harvesting technology.

After setting up WikiLeaks, Assange is said to have lived a nomadic lifestyle during which he traveled all over Asia, Africa and Europe. By staying mobile, he made WikiLeaks harder to track down.

How WikiLeaks keeps sources anonymous

WikiLeaks uses “high-end security technologies” to keep its sources anonymous and beat censorship. They include:

  • Encrypted electronic drop boxes that allow sources to submit information anonymously
  • Submission from neutral locations like net cafes and wireless hotspots, so sources can’t be traced even if WikiLeaks is infiltrated by an external agency
  • Cover domains that get past government blocks on websites that include the WikiLeaks name and defend against denial of service (DoS) attacks
  • Hosting on multiple servers owned by hosting companies that support WikiLeaks
  • Use of Tor and PGP anonymity software


Many people see Julian Assange as a heroic figure, who has defended the freedom of the press and the public’s right to know the truth at great personal cost. In 2010, Time magazine readers voted him Person of the Year. In his home country of Australia, Assange was awarded the Sydney Peace Foundation Gold Medal for Peace with Justice.

Live from the embassy

At the moment Julian Assange is holed up in the Ecuadorian Embassy in London, to avoid extradition to the United States on what he contends to be false charges.

But he continues to make public appearances and to run WikiLeaks from the embassy. Whatever you might think of him, Assange is certainly a man who knows how to keep his internet connection secure.

Public Wi-Fi networks are known for their poor security. Other users can hijack your browsing sessions and see what you’re doing, or the Wi-Fi provider itself might snoop on your activities.

As a business traveler, you should definitely consider using a VPN to encrypt your internet traffic and keep out spies. Especially in foreign lands and when using networks you can’t really trust.

Expensive data roaming charges

Once you’ve finally reached your destination, you could use your mobile network’s data roaming service to connect to the internet—and probably pay through the nose for it. You could also rely on your hotel’s Wi-Fi, but you probably won’t be there that often.

A cheap and convenient way to stay online abroad is to get a local pre-paid SIM card. In many countries, these SIMs are easy to buy. In Europe, you can often get 1GB of mobile data for less than $20. Prices and services obviously vary quite a bit between countries.

Keeping confidential files secure

Whatever type of connection you manage to find on your business travels, you really need to keep it secure. It’s not just Wi-Fi that’s vulnerable to snooping—3G and 4G have their security holes too.

Use a VPN on your phone, tablet and computer. Hopefully your company has its own VPN. But if not, choose one that’s fast, uses the latest 256-bit encryption had provides apps for your computer and your phone. It’s the only way to know your confidential documents stay that way.

Click here to read more biographies on the unsung heroes of the internet

Click here to go back to ExpressVPN’s internet privacy guides

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>