How ShofarLeaks protects the source
Day: Wednesday November 14, 2012
 

YouTube

Download Files

MP4

WebM

 Download Video  

This video describes the technology used to protect the source of a leak and how leaks are distributed to multiple autonomous servers.  This is of vital concern for those who might otherwise be subject to retaliation from physical harm, prison or death.

The ShofarLeaks project is on hold.

ShofarNexus™ ● ShofarNexus.comShofarNexus.Shofar

What is Internet surveillance and how to avoid it

Saturday January 28, 2012

ShofarDomain™ Introduction

Wednesday October 3, 2012

How ShofarLeaks protects the source

Wednesday November 14, 2012

ShofarLeaks status and related projects

Tuesday January 1, 2013

ShofarDomain™ Immutable Sites

Friday January 25, 2013

Taking ShofarDomain Live

Wednesday February 27, 2013

Protecting the who, what, where and when of your communications

Saturday June 8, 2013

Cryptograms in ShofarPortfolio’s Matryoshka Communications

Sunday June 23, 2013

There is nothing you can do about it!

Saturday January 24, 2015

Hide your Metadata

Friday January 30, 2015

Sometimes a first try at a given model doesn’t work. You either give up or try again. It is time to try again, but remember our past.

The concepts in the videos remain the goal with refinements in the technology.