WikiLeaks has a strong structure, which makes it safe for them to come forward and post the documents. So, to protect its sources Assange explains the structure of WikiLeaks in his books, When Google Met WikiLeaks, that “On the technical front, our first prototype was engineered for a very adverse situation where publishing would be extremely difficult and our only effective defense would be anonymity, where sourcing would be difficult (as it still currently is for the national security sector), and where internally we had a very small and completely trusted team” (69). WikiLeaks follows a strict prototype of anonymity which is safe and secure for the
WikiLeaks has a strong structure, which makes it safe for them to come forward and post the documents. So, to protect its sources Assange explains the structure of WikiLeaks in his books, When Google Met WikiLeaks, that “On the technical front, our first prototype was engineered for a very adverse situation where publishing would be extremely difficult and our only effective defense would be anonymity, where sourcing would be difficult (as it still currently is for the national security sector), and where internally we had a very small and completely trusted team” (69). WikiLeaks follows a strict prototype of anonymity which is safe and secure for the