How ShofarLeaks protects the source
Day: Wednesday November 14, 2012
External Links


Download Files



 Download Video  

This video describes the technology used to protect the source of a leak and how leaks are distributed to multiple autonomous servers.  This is of vital concern for those who might otherwise be subject to retaliation from physical harm, prison or death.

The ShofarLeaks project is on hold.

ShofarNexus™ ● ShofarNexus.comShofarNexus.Shofar

What is Internet surveillance and how to avoid it

Monday January 28, 2012

ShofarDomain™ Introduction

Wednesday October 3, 2012

How ShofarLeaks protects the source

Wednesday November 14, 2012

ShofarLeaks status and related projects

Wednesday January 1, 2013

ShofarDomain™ Immutable Sites

Saturday January 25, 2013

Taking ShofarDomain Live

Thursday February 27, 2013

Protecting the who, what, where and when of your communications

Saturday June 8, 2013

Cryptograms in ShofarPortfolio’s Matryoshka Communications

Sunday June 23, 2013

There is nothing you can do about it!

Sunday January 24, 2015

Hide your Metadata

Saturday January 30, 2015

Sometimes a first try at a given model doesn’t work. You either give up or try again. It is time to try again, but remember our past.

The concepts in the videos remain the goal with refinements in the technology.