http://er3n3jnvoyj2t37yngvzr35b6f4ch5mgzl3i6qlkvyhzmaxo62nlqmqd.onion
For security, Sigsum ’ s transparency has been designed to resist a powerful
attacker that controls: The signer ’ s secret key and distribution infrastructure The public log, including its hosting infrastructure and secret key A threshold of so called witnesses that call out if a log fails Why not give Sigsum a try?