http://77q2gqbqwqmdd4fqng6hywqhhb2qaf7mmeovkuh4yvccyypttsivgnqd.onion
Before devising a solution, it is important that the user define his threat model. Who are his adversaries, and how might they operate? At the outset, we will rule out mobile technology, which is notoriously insecure.