On Mon, Oct 12, 2015, at 12:32 PM, Travis Biehn wrote: > You can start by re-posting the leaked traffic logs... (Editorial > discretion is frowned upon amongst the idealists.) > > Maybe set up an onion, host on i2p, freenet (hehehe), ethereum, the > blockchain, torrents. Spread it far and wide, set up a PKI, set up a > WOT, keep it all offline. > > If you're a real masochist you'll host the docs on some crazy > 'website' with no indirection protecting you from legal/illegal/TLA > action. Keep the info off the dark web, off the deep web and in the > search indexes. > > Warrant canary (which won't work), encryption (you won't be safe) and > signatures (secrets will be stolen.) > > If you think you can survive as well as JYA, Deb & fare better than > Assange, go for it. Be prepared. > > It doesn't pay very well. You'd have to be crazy to do this.
Or you can be like TheCthulhu and run your own data centre with good lawyers. Alfie -- Alfie John [email protected]
