Wikileaks clearly linked to Russian hacker-- new analysis
https://patribotics.wordpress.com/2017/03/14/wikileaks-hands-keys-to-putins-russian-hacker-readers-leakers-tracked/
Exclusive analysis by Laurelai Bailey, published by Patribotics this week confirmed that Julian Assange and Wikileaks obtained two new servers in Russia just one week before the hacked Podesta emails were released. Laurelai reported that the ultimate registrant of the servers was one Peter Chayanov, of Russia, a known cyber-criminal and hacker. Julian Assange has been identified by the US intelligence community as a front for Russian distribution and deniability of Russian government-sponsored hacking. Today, however, as a result of our reporting on the dox by Op Ferguson, that link is far clearer.
The internet is tightly controlled in Russia. Cyber criminals have to answer to Putin. Mr. Chayanov is the head of a firm called Hostkey, which hosts mail spammers and other malware and hacking tools, despite offering web space to Wikileaks. Wikileaks chose to use a Russian hacker to host their site and they knew that he was connected to Vladimir Putin and operated with the blessing of Putins government. Putin and Assange are thus already linked.
Bottom line:
* Wikileaks has handed Chayanov access to everything stored on its site and servers
* The Russian hacker and spammer can monitor traffic
* He can tell who is reading anything on the Wikileaks site anywhere in the world
* The Russian hacker has access to all documents that have been sent to Wikileaks
* He can probably bust the anonymity of any computer or user who thought they were anonymously donating to Wikileaks
* It is not reasonable to suggest that this hacker is other than linked with Russias GRU if he has it, they have it
* Through Julian Assange and his website, it appears that the Russian hacker and his government can track any readers of the Wikileaks site and any donors of material to it, thus allowing Russia to blackmail anyone who sent secrets to Wikileaks as a whistleblower.
https://pmatep5f7b.execute-api.us-east-1.amazonaws.com/ProdStage