diff --git a/servers/anonsensitive/1.png b/servers/anonsensitive/1.png new file mode 100644 index 0000000..fcf0964 Binary files /dev/null and b/servers/anonsensitive/1.png differ diff --git a/servers/anonsensitive/6.png b/servers/anonsensitive/6.png new file mode 100644 index 0000000..6ade600 Binary files /dev/null and b/servers/anonsensitive/6.png differ diff --git a/servers/anonsensitive/index.html b/servers/anonsensitive/index.html index 4c8ce36..7f4a857 100644 --- a/servers/anonsensitive/index.html +++ b/servers/anonsensitive/index.html @@ -19,13 +19,6 @@ - - - -
@@ -75,10 +68,13 @@Let’s say Charlie is running a popular online platform with total free speech. To avoid being held liable for the content published on it, he makes sure to always be anonymous and private by using only open-source software and connecting to the site only through Tor and VPN.
-One day Charlie posts a link to a scientific paper from his anonymous “Founder” account on the platform. His followers see an uncanny similarity in the language used by the paper’s authors with the founder’s anonymous account. The government uses its key disclosure legislation to issue search warrants for the authors’ hard drives.
+Let’s say Charlie is a whistleblower leaking information about widespread corruption via a popular online forum. To stay anonymous, he makes sure to connect to the site only through Tor and VPN, and uses a burner email address to sign up.
+In the foreword to his first leak, he uses one of his favorite personal phrases. To his misfortune, his real-name X account is the only one to ever publicly use that phrase before.
+ +The government connects the dots and uses its key disclosure legislation to issue a search warrant for the X user’s hard drives.
+ +Thankfully, Charlie needn’t worry: he has set up VeraCrypt’s deniable encryption to separate his personal life from his leaks. He gives the authorities the key to the main volume; they find nothing related to the leaks. The leaker’s use of that particular phrase is deemed a mere coincidence.
-Thankfully, Charlie needn’t worry: he has set up VeraCrypt’s deniable encryption to divide his personal and scientific life from the website he’s running. He gives the authorities the key to the main volume; there are no further questions.