Postscrypt — Whistleblower / journalist
The story cannot dependon you being online.
A dead-man’s switch that does not require trusting a platform with plaintext: compose, encrypt, and authorize release to the people you name.
The fear
If you disappear, evidence and instructions never reach the right hands—or they leak to the wrong ones.
The continuity
Operational continuity: encrypted, recipient-defined, check-in gated—reducing single-point failure.
Install Postscrypt
Security contactMiddle of funnel
Evidence-grade hygiene
Technical overview, warrant canary, and security pages are the trust spine for ads and influencer deep-dives.
Operational security appendix themes: device compromise, coercion, metadata minimization.
Transparency log and incident history—even when empty: “none to date.”
Export and verify paths so contacts can reason about the system, not slogans.
Same vault. Different stakes.