| http://www.w3.org/ns/prov#value | - We nonetheless also urge them to secure their Internet connection by using a VPN or an anonymization tool such as TOR, I2P or Psiphon. (Read the ???Digital Survival Kit.???) The confidentiality of our submission method is based on three principles ??? encryption of the files submitted from the moment they are sent to the moment they are opened, the fact that no record is kept of the connexion data
|