http://vessal3bwmcpf77x7qx4wjtlyyyf3g5h7hasbueieevcxpab7jhmqwyd.onion/faq
As for mitigating identity attacks, the list is non-exhaustive, but as for the most pressing attacks, we have detailed what we are able (while maintaining an appropriate level of discretion) for your review below: When purchasing labels, we blend in with the crowd, as to not raise any suspicions. We use a variety of unassuming relay locations, always changing and in constant circulation. We complete the final leg of the transportation, continuing to maximize protection of your identity...