he knows this because SR claims to have fully server side encryption of addresses and essentially the only way to do this is to store everything on a mounted encrypted drive What this means is that SR server securely encrypts addresses only when the power to their server is cut or the drive is unmounted , because the keys must be stored in RAM so data can be dynamically decrypted/encrypted What this means is that if the attacker locates the server while it is still running, or wait for it to start running again, they can get the keys by cold booting the RAM into a forensics laptop It also means that if the server is rooted the attacker gains full access to encryption keys It also means that DPR can decrypt whatever he wants if you use GPG none of these issues are present. SR could be using chasis intrusion detection technology and have the RAM secured with encapsulation material, that would make the physical attack harder but not impossible, but I doubt he is doing this because it would mean he almost certainly would have shipped the server to a colocation facility after configuring it himself