This video describes the technology used to protect the source of a leak and how leaks are distributed to multiple autonomous servers. This is of vital concern for those who might otherwise be subject to retaliation from physical harm, prison or death.