Why cryptome sold web logs to their paying customers?

Alfie John alfiej at fastmail.fm
Sun Oct 11 18:53:53 PDT 2015


On Mon, Oct 12, 2015, at 12:32 PM, Travis Biehn wrote:
> You can start by re-posting the leaked traffic logs... (Editorial
> discretion is frowned upon amongst the idealists.)
>
> Maybe set up an onion, host on i2p, freenet (hehehe), ethereum, the
> blockchain, torrents. Spread it far and wide, set up a PKI, set up a
> WOT, keep it all offline.
>
> If you're a real masochist you'll host the docs on some crazy
> 'website' with no indirection protecting you from legal/illegal/TLA
> action. Keep the info off the dark web, off the deep web and in the
> search indexes.
>
> Warrant canary (which won't work), encryption (you won't be safe) and
> signatures (secrets will be stolen.)
>
> If you think you can survive as well as JYA, Deb & fare better than
> Assange, go for it. Be prepared.
>
> It doesn't pay very well. You'd have to be crazy to do this.

Or you can be like TheCthulhu and run your own data centre with
good lawyers.

Alfie

-- 
  Alfie John
  alfiej at fastmail.fm



More information about the cypherpunks mailing list