Create Anonymous WikiLeaks Mirror On Your Android Device

Advertisement

With the recent spur in WikiLeaks’ activities, many of the world’s governments have been disturbed and subsequent measures against them are being taken. As of now, WikiLeaks.com has been shut down for most locations. Irrespective of the legality of what WikiLeaks did, the internet does not treat censorship with mercy, and hence several mirrors have already surfaced for the website. Although governments all across the globe are actively shutting down these public mirrors, information cannot be curbed, and so with this article we show a way to create an anonymous WikiLeaks mirror on your Android device.

Disclaimer: Please note that this guide is for testing and educational purposes only. AddictiveTips does not hold any affiliation, implicit or explicit, with WikiLeaks.com. We cannot be held liable for any damage that you incur by following this process. Use this guide at your own risk.

Requirements:

  • A rooted Android device, preferable a spare one that you can leave connected to a WiFi network and power socket
  • Firewall – necessary for anonymity. We recommend using DroidWall.
  • A Tor client – Orbot. You can grab it here.
  • An HTTP server. For this, our recommendation is PAW Server, but you can use anything that you like.
  • An archive copy of WikiLeaks. For this, an internet search is your only option, as public mirrors are constantly being shut down.

Setting Up:

1. Just it case you don’t have root for your device, you can use the wonderful tool z4root, which works with most Android devices (up to Froyo only). However, we don’t recommend this as a permanent solution, because z4root rooted devices lose the superuser permissions after a reboot.

z4root

2. Now fire up Droidwall to enable the firewall. You will get the option to allow individual processes through the firewall – make sure you let go as few as possible. For starters, enable only Orbot on WiFi and keep everything else disabled. If you are not doing this on a spare phone and want to use the device normally as well, just add those apps which are necessary for the phone to function.

As a tip, maximum anonymity can be attained by keeping only Orbot on WiFi and remaining stuff on packet data.

wall

3. Now, set up the PAW Server. Start it up with minimum options and no personal information that can help identify you. Place your downloaded WikiLeaks mirror archive in the public folder of your PAW Server. For this, you need to copy the archive files to the following location in your device:

/sdcard/paw/html

paw1

Remember, you MUST NOT allow firewall access to your web server (in Droidwall).

4. Now comes the last part – setting up Orbot. Run the Orbot application and start the service. Wait for it to finish the handshake process and connect to the Tor network, and allow Orbot to be used with it.

orbot

Press the menu button to access settings, and select to Torify all apps, and enable relaying and hidden services as shown in the screenshot below.

relay

Point Orbot’s ‘Hidden Service Port’ to the open port on the PAW Server, which should be port 80.

ports

6. Finally, fire everything up. Again press menu key in Orbot to find the .Onion name of the hidden service, and ensure in a Tor-enabled browser (like Firefox) that it works.

.onion

That’s it – your Android device is now set up as an anonymous WikiLeaks mirror. To let people know that this server exists, we’d recommend creating an anonymous Twitter account and tweet your .Onion address with the hash tags #wikileaks, #tor and #mirror. Another useful hash tag could be #ImWikiLeaks, which has become quite popular these days.

There can be even more ways to support WikiLeaks – only limited by your own creativity. All in all, just ensure that your anonymity remains in tact and you should be good to go.

[via I ate DeWayne!]

Advertisement
  • DeWayne Lehman

    I don’t mind a blurb summary, and I’m glad you linked back to my original article. But you pretty much just lifted the entire post including my photos with some rewriting. That’s tacky. But thanks for reminding my to add “Stolen from I8-D.com” watermarks to my photos. Some people just have no manners.

    • Aatif

      I don’t mind criticism, but I am not definitely not keen on taking a blame-game either. Your article was quite elaborate, all credit to you for that, but let me say that in the publishing world, rewrite WITH credit to actual source is called ‘third-party reporting’ and not ‘lack of manners’. Furthermore, if you’d care to actually check before accusing, not ONE of these images is taken from your website – I did use the same positioning for my screenshots, but I took all of them on my own device (care to compare the status/notification bars in both?)

      Thanks for your comment anyway!

    • It was funny to see you accuse Aatif for ‘lifting’ your entire post including your photos. I just took a look at your article and it’s obvious to anyone but a blind man that they were taken using two different devices and even running two different versions of the server.

  • John Williams

    Wikileaks is a totally irresponsible project that wsa not only baed on stolen material, it put many people’s lives at stake. Shame on all of you involved with this for propogating the stupidity.

  • Jeremy

    Im all for free speech, however, this isn’t censorship. Would you try to stop someone from publicizing your bank records or health records? Yea me too. They are publicizing information that is not theirs to publish.

    You got a good site, but I just don’t agree with you here.

  • JT

    shame. why would you even want to post something like this? the release of those docs and helping keeping them online isn’t helping any cause.

  • In this case, it isn’t about someone’s personal records. It is about exposing the tactics a nation is using against other nations for its own cause, and how it is trying to put the veil of ‘war against terrorism’ on its ‘war of terrorism’. These documents expose how there was no evidence available that would justify the actions of the United States government and armed forces.
    WikiLeaks itself might not be retrieving that information using fair means but then who are we kidding? Does the United States government even know the meaning of what ‘fair’ is? Some history lessons might help you guys. 🙂
    As far as putting lives of people in danger is concerned, there is no harm in putting the lives of those people in danger who were directly responsible for all the terrorism caused by United States against several other nations without the presence of any solid evidence against them. Such people deserve to be exposed and should pay the price for the harm they have caused.

    • Jeremy

      Really? I bet those people whose lives that information puts in danger take it really personal. Don’t lecture me about history or fairness, there are two sides to that coin. America doesn’t gas their own people or behead people in the name of God. In fact, the only people in combat zones who are playing by any rules at all are the American forces. Unfortunately for everyone around the world, when those 21 murderers hijacked planes and killed thousands of people they opened the door for America to wage war on terrorism, whether it is justified or not.

      Ultimately, I don’t promote stealing and putting anyone’s life in danger, therefore, I felt compelled to state my opinion.

      • jason

        its funny how jeremy thinks wiki-leaks is doing something wrong. exposing the govermt wrong doing is bad jeremy? well thats a shame how are u suppose to no what the government does then, the goveenmt tells you they do this when they really do the opposite. and btw jeremy no one was lecturing you 🙂

  • Shawn

    thanks for putting lives at risk and generally being jack-asses. You just lost me as a reader. I am a soldier and if by doing this you put even one American or other nations soldier fighting against terrorism at risk it’s on your heads. Have a nice life!

  • RetMarut

    The TOR System is since about 10 days controlled by CIA Headquarter with busbyberkeley (149.9.0.60). Jedesmal, wenn ich ein TOR Netzwerk aufbaue, sieht man diesen Server immer als Knotenpunkt im Netz. Die zugehörigen geografischen Koordinaten zeigen direkt auf das CIA-Hauptquartier. Ein großes Geheimnis scheint das nicht zu sein, sonst hätte man sich ja besser versteckt.

  • Alex Andersson

    If someone handed me thousands of classified documents containing the actions and opinions of government and, after I took the decision to publish them, lives were placed in danger as a direct result of those actions and opinions… then how does that make me responsible?

    Once again, this is nothing more than a ‘shoot the messenger’ reaction based on nothing but pure arrogance and ignorance. Exposure or not, it still doesn’t change the fact that the lives and freedoms of billions of people are at risk because of such actions and opinions.

  • Inshallah

    Wikileaks pushed the Tunesian revolt over the edge, which inflamed Egypt and that one infected Bahrain, Lybia and now Syria. 2 dictators gone, 4+ morre to come, but some of you blind fools still think President Obama actually means Human Rights when he speaks of “Human Rights”. Fools!

  • Inshallah

    .. and Anonymous, Telecomix and the Pirate Parties also helped a bit. Its a known fact published by Reuters. You can go back now and live in your dream reality, called The Matrix. http://piraten.in/9mu