Postscrypt — Whistleblower / journalist

The story cannot dependon you being online.

A dead-man’s switch that does not require trusting a platform with plaintext: compose, encrypt, and authorize release to the people you name.

The fear

If you disappear, evidence and instructions never reach the right hands—or they leak to the wrong ones.

The continuity

Operational continuity: encrypted, recipient-defined, check-in gated—reducing single-point failure.

Install Postscrypt

Security contact

Middle of funnel

Evidence-grade hygiene

Technical overview, warrant canary, and security pages are the trust spine for ads and influencer deep-dives.

  1. Operational security appendix themes: device compromise, coercion, metadata minimization.

  2. Transparency log and incident history—even when empty: “none to date.”

  3. Export and verify paths so contacts can reason about the system, not slogans.

Same vault. Different stakes.