Ki-Ki

Web foundations for SMEs

Advocacy, campaign, and public interest sites, built to stay up

If you are running a peer led advocacy project, a grassroots campaign, a survivor support network, a reform effort, or any other public interest platform, your site needs to be stable, resilient, and technically clean.

I help with the platform, not the message. Neutral infrastructure only. You control what you publish, I make sure the site stays online when attention hits. I am based in the North East and work UK wide. If you are in the region and want local context or hands on support, there is a dedicated North East track below.

Neutral infrastructure Cloudflare hardening Lawful fingerprinting Evidence grade logs High attention ready

Public interest specialisms

The same technical stack, tuned for different kinds of high risk work.

North East England public interest website support

Ki-Ki works UK wide. These pages exist because public interest work is often local first, and people search locally when they need help fast.

If you are in the North East and building an advocacy site, watchdog project, campaign page, or whistleblower safe platform, you get the same stack as everyone else plus optional local context, faster on site collaboration when needed, and a regional understanding of how attention lands here.

What local clients usually need

  • Advocacy and campaign website builds with resilient static architecture
  • Cloudflare firewall and bot mitigation tuned for regional attention
  • Lawful fingerprinting so repeat institutional attention becomes visible
  • Evidence grade logs for complaints, internal reviews, or regulator use

Outside the region, the offer is identical. The difference here is simply local availability.

Who this fits

You do not need a large team or a formal organisation to need serious infrastructure.

  • Peer led advocates

    Groups built around lived experience, mutual support, or survivor led community work.

  • Grassroots campaigns

    Local or national movements, reform efforts, and issue focused organising.

  • Public interest projects

    Sites focused on accountability, scrutiny, or documenting systemic failure.

  • Independent voices

    Citizen journalists, watchdog blogs, whistleblowers, and small teams publishing uncomfortable truths.

If your work is lawful, serious, and likely to attract attention, it belongs here.

What I cover for high attention projects

  • Resilient static sites

    Fast, predictable builds that do not depend on bloated plugins or fragile admin panels. Good for projects that need clarity and uptime.

    See Secure static sites.

  • Cloudflare protection

    Firewall rules, rate limits, bot mitigation, Workers, and clean routing, tuned for the kind of traffic public interest sites attract.

    See Bot mitigation for public interest sites.

  • Evidence grade logging

    Edge level traffic logging, challenge events, and timelines you can take to trustees, regulators, platforms, or supporters.

    See Evidence grade logging.

  • Monitoring aware fingerprinting

    For projects likely to face quiet institutional or adversarial attention, I set up lawful fingerprinting on your own domain so repeat devices and patterns are visible.

    See Fingerprinting and Edge Tracker.

  • Email and domain sanity

    SPF, DKIM, DMARC, DNS records and deliverability, so your comms do not disappear into spam at the worst moment.

  • Secure contact routes

    If you handle sensitive tips or lived experience accounts, I can set up secure PGP based contact so people can reach you safely.

    See Secure PGP contact.

  • Governance reality checks

    Quick fixes to privacy notices, retention, consent handling, and SAR processes, so your policies match how you actually operate.

  • Neutral onboarding copy

    If your service includes limited SEO or baseline site copy, it stays neutral, factual, and only goes live after written approval from both of us.

Why neutral infrastructure matters

High attention sites are magnets for hostility, takedown attempts, and random nonsense.

Neutral infrastructure keeps roles clean. I handle the technical foundations and keep the platform solid. You handle your message, your publishing decisions, and your legal advice.

What you get out of it

  • A site that stays up when attention hits.
  • Protection tailored to hostile patterns.
  • Logs that tell a clear story if you need to show what happened.
  • A technical partner who does not try to steer your politics.

We assume you will be watched

Public interest work attracts attention from institutions, contractors, competitors, and invested individuals. Sometimes it is open. Often it is quiet.

I build for that reality. Your platform is set up to anticipate monitoring, pressure, and low effort nonsense, and to stay stable while it happens.

The aim is not guesswork. It is evidence you can stand behind.

What that looks like in practice

  • Edge level fingerprinting that assigns stable device, visitor, and session IDs on your own domain.
  • ASN and network enrichment so you can separate residential noise from institutional access.
  • Repeat actor and evasion pattern tracking, so new IPs do not wipe the trail.
  • Clean exports and screenshots that can sit in an internal review, complaint response, or safeguarding record.

Full detail, examples, and the legal position are here: Fingerprinting and Edge Tracker.

Everything here stays lawful and defensive. We only fingerprint devices that connect to your own site, for security and evidence purposes. It identifies recurring devices and behaviour, not real world people by name.

I do not help anyone break the law. I help underdogs even the playing field against larger adversaries, with infrastructure and receipts that hold up when challenged.

Proof in practice

Below are redacted examples of Edge Tracker in real-world use. They show normal device logging, repeat actor detection, council network access, international education networks, and a case involving the National Pharmacy Association.

What these examples demonstrate:

  • standard device and session fingerprinting on public interest pages
  • repeat visits from institutional networks, even when IPs rotate
  • some organisation devices reducing fingerprint visibility as routine security practice
  • a specific case where the National Pharmacy Association stated in writing that it did not monitor a site, while access from its own ASN was logged

Many organisations deliberately limit how much their devices can be tracked online. They may block cookies, rotate IPs, or use hardened builds that reduce fingerprint visibility. This is often policy driven security rather than malice. Edge Tracker treats that as background behaviour.

The National Pharmacy Association example is different only because there is a clear written denial. The logged access itself is not a claim of wrongdoing. It is a factual contradiction, visible at ASN level.

Full context for the National Pharmacy Association case is documented here: National Pharmacy Association monitoring case study .

Redacted Edge Tracker fingerprint showing visitor, device, and session identifiers
Basic Edge Tracker device and session fingerprint, redacted for privacy. Shows stable visitor and session IDs on a public interest page.
Redacted Edge Tracker alert showing a council network request with reduced fingerprint visibility
Request from a UK council ASN where fingerprint visibility was reduced, a common sign of hardened browsing or strict policy settings. Redacted example.
Redacted Edge Tracker log showing a repeat device fingerprint from a Durham council network
Repeat device fingerprint tied to a Durham council ASN returning to the same content over time. Redacted example.
Redacted Edge Tracker log showing a device fingerprint linked to a US education network
Device fingerprint linked to a US education ASN. Shows how institutional networks are surfaced cleanly. Redacted example.
Redacted Edge Tracker log showing Apple device class and network context
Apple device class and network context surfaced in a repeat access pattern. Redacted example.
Redacted standard fingerprint output used for repeat actor analysis
Standard fingerprint output used for repeat actor analysis, showing stable identifiers without relying on IP addresses.
Redacted Edge Tracker alert showing access from the National Pharmacy Association network to an NPA related article
Redacted Edge Tracker alert showing access from ASN 197320, registered to National Pharmacy Association Ltd, to an NPA related article. Included as a factual example of institutional access where a written denial of monitoring existed.

If you want a deeper explanation of how this works and why it stays lawful, read Fingerprinting and Edge Tracker.

Examples of the kind of work I do

If you want to see how I approach public interest issues, evidence, and difficult systems, my own advocacy work lives here:

thereasonableadjustment.co.uk

That site is not a portfolio for clients, it is my own public work. It shows how I think, how I document, and how I keep things defensible.

Boundaries, clearly stated

These limits protect you and protect me. They are not negotiable after the fact.

  • Ki-Ki provides technical services only. I do not act as a publisher, editor, investigator, or legal adviser.
  • I do not draft, upload, or assist with allegations about identifiable individuals, naming and shaming pieces, or reputational campaigns. If you publish that kind of material, it is your decision and your responsibility.
  • Any limited onboarding copy or basic SEO posts I prepare are neutral, agreed in advance, and published only after your written approval.
  • You must not imply that Ki-Ki endorses your campaign, your allegations, or your views.
  • If a project crosses into unlawful or high risk territory, I will refuse or terminate the work.

The full position is set out in the Neutral infrastructure policy. Your use of this site is also governed by the Terms of use and Privacy policy.

Questions people usually ask

Do you write, approve, or upload allegation content?

No. Ki-Ki is infrastructure only. I do not draft, edit, approve, or publish allegations about identifiable people. You control your own content and you are responsible for it.

What does neutral infrastructure mean?

It means I keep your platform stable, secure, and defensible, without taking a role in your message, targets, or legal strategy.

How does fingerprinting help campaigners?

It lets you identify repeat devices and behaviour on your own domain, even when IPs change. That gives you patterns and evidence rather than guesswork.

Is fingerprinting lawful?

Yes, when it is defensive, limited to your own site, and disclosed properly. I set it up that way and align it with your policies.

Can you help us handle sensitive tips securely?

Yes. I can set up a PGP based secure contact route so sources can reach you safely. Details are on Secure PGP contact.

What if we expect institutional monitoring?

That is normal for public interest work. I build with that expectation, and give you lawful tracking and logs to document repeat actors.

Do you only work in the North East?

No. Ki-Ki works UK wide. The North East pages exist for local search and for clients who want optional local context or in person support. The technical offer is the same everywhere.

How it works

1. Quick intake

You outline your project, what you need technically, and what level of attention you expect. I confirm scope and boundaries up front.

2. Build and harden

I set up the site, Cloudflare, email basics, fingerprinting if needed, and logging. You supply and publish your own campaign content.

3. Handover and cover

You get a clear system map, action notes, and the option of a light retainer if you want ongoing protection.

Start the conversation

Tell me what you are building, what worries you, and what level of attention you expect. I will tell you plainly whether I am the right fit.

No mailing lists. NDA available. If your project involves allegations about individuals, get legal advice before publishing anything.