this post was submitted on 23 Jan 2026
141 points (98.6% liked)
PC Gaming
13264 readers
1078 users here now
For PC gaming news and discussion. PCGamingWiki
Rules:
- Be Respectful.
- No Spam or Porn.
- No Advertising.
- No Memes.
- No Tech Support.
- No questions about buying/building computers.
- No game suggestions, friend requests, surveys, or begging.
- No Let's Plays, streams, highlight reels/montages, random videos or shorts.
- No off-topic posts/comments, within reason.
- Use the original source, no clickbait titles, no duplicates. (Submissions should be from the original source if possible, unless from paywalled or non-english sources. If the title is clickbait or lacks context you may lightly edit the title.)
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
This seems like a good idea, but a related question I've been wondering about is, what is the best way to anonymously run a software project facing this type of threat model, when you also want that software to be accessible to people? Does anyone know about any tips or resources for this? Is there some kind of darknet github? How do you do social media or collect donations/payment? Also, are there any good examples of projects that did this right?
I'm not an expert, but I2P and Tor should allow people to host things anonymously.
Monero can be used as an anonymous payment method.