TOR, nym, i2p, etc could help but the metadata behind the comms patterns can make the server identifiable.

They wouldn't help in this case as it was a seizure incidental to something else the admin was doing. I guess isolating to a data center with unique payment info?

The core issue is that the server knows the content.

Reply to this note

Please Login to reply.

Discussion

No replies yet.