Why Nostr? What is Njump?
2023-07-27 12:46:12
in reply to

rcarback on Nostr: TOR, nym, i2p, etc could help but the metadata behind the comms patterns can make the ...

TOR, nym, i2p, etc could help but the metadata behind the comms patterns can make the server identifiable.

They wouldn't help in this case as it was a seizure incidental to something else the admin was doing. I guess isolating to a data center with unique payment info?

The core issue is that the server knows the content.
Author Public Key
npub1cac5f9tvz8k8wvnyjpnfm46m022vr0tdu554de0zrfk35qunq72s5lmnv7