http://7fa6xlti73nrpxl6cykao4wp7g3bg4624ghrtdomlvkeivvwclv2iyad.onion/anonbib/cache/rewebber.html
Second, to achieve very rapid
implementation and deployment, we have weakened the threat model somewhat;
protection against network attacks is deemed a lower priority (and much
harder problem) than immediate deployment with protection against political,
legal, and social attacks.