http://ciisqbg45nggykdl6rjdrq3wc64csga4vkphu66qsi65mypeitqedoad.onion/faq
So if you require more anonymity than that, pay with cryptocurrencies, use a disposable email service , and practice decent OPSEC. 10. What if law enforcement bypasses you and goes directly to the data center and asks them to start logging? It is possible that a data center we use might start logging packets (either at the data center itself, the data center's ISP, or that ISP's ISP, etc.).