A Tool To Track Trump’s Tampering With Public Information


With the inauguration of the reckless, narcissistic, thin-skinned, lying, authoritarian Donald Trump around the corner, reasonable people everywhere are asking “what should we do?” Here’s what law professor and political theorist Paul Gowder (Iowa) did: he created a tool for anyone to use that monitors public data and sends alerts and documentation of its change. He calls it “minitrue.”

Gowder describes the tool in a post at Medium. Here’s the idea:

Suppose Donald Trump goes full 1984 and tampers with government data. For example, modifying climate data to conceal evidence of human generated climate change. That’s bad. Wouldn’t you like to catch him? minitrue can help.

minitrue will take a list of URLS that you give it. Then it will go to those URLs, save their contents to disk, and tweet out a (sha256) hash of the contents.

Then suppose Trump (or some evil corporation, or whomever’s data you want to monitor) changes it. The next time minitrue runs (you should set it to run every day), it’ll see that the hash has changed, and it will tweet out the fact of the change.

Because you posted the original hash on Twitter, and Twitter maintains a record of dates posted and doesn’t allow editing, you can reasonably well prove that the file existed in its original form on the date you originally posted it. Take that evidence, plus the two files, and go wild —media, lawsuits, whatever your little citizen-of-a-goddamn-democracy-no-matter-what-Donald-Trump-thinks heart desires.

Academics may be in a particularly good position to identify important data worth keeping an eye on.

minitrue is a work-in-progress, and Gowder welcomes feedback on it. You can read more about it here.

It’s a Python script and can be downloaded here. As Gowder says in the “Read Me” file for the tool, “right now you kind of need to be pretty skilled to run it.” Future plans involve making a version of a tool that’s usable by people who aren’t especially well-versed at programming. Gowder writes:

In rough order of priority, here is what needs to happen next:

  1. Setup scripts, or even GUI interface (!??!) and a frozen distributable executable (also proper oauth for twitter), to allow non-technical people to set up.
  2. Windows compatibility (if it doesn’t already exist. I don’t even know.).
  3. Some attempts to conceal web traffic coming from minitrue. (This could mean anything from user-agent switching, to randomizing request times, to adding noise requests to unmonitored documents, to tor or other ip concealment, to all of the above.)
  4. Additional date verification methods beyond just posting to Twitter (especially blockchain-ey things).
  5. If this gets popular enough to be worthwhile, funding for a hosted platform to set up and run monitors (preferably offshore, like in Switzerland) with a web interface.

Pull requests are greatly appreciated for these priorities or for anything else that might make this more secure or effective.

There is one comment

Your email address will not be published. Required fields are marked *

  
Please enter an e-mail address