How ShofarLeaks protects the source
External Links
This video describes the technology used to protect the source of a leak and how leaks are distributed to multiple autonomous servers. This is of vital concern for those who might otherwise be subject to retaliation from physical harm, prison or death.
The ShofarLeaks project is on hold.
Sat, Jan 28, 2012
What is Internet surveillance and how to avoid it
Wed, Oct 10, 2012
Domain names are rented by policy and FUD
Wed, Oct 17, 2012
The decline of the aura of “.com”
Wed, Oct 24, 2012
Gold versus fiat currency applied to domain names
Tue, Oct 30, 2012
ICANN’s corruption can be cured by the free market
Mon, Nov 12, 2012
UN taking control of the Internet
Fri, Nov 23, 2012
Death, Taxes, Perpetual Domain Fees
Tue, Nov 27, 2012
Domain price regulation versus the free market
Wed, Nov 28, 2012
“Excess funds” should be a red flag about ICANN
Fri, Nov 30, 2012
Big bucks no longer a stability requirement for TLDs
Tue, Dec 4, 2012
An Open Letter to the Alternative Roots
Tue, Dec 11, 2012
Is WCIT suggesting states regulate alternative roots?
Sat, Dec 22, 2012
Second Amendment for Domain Names