i think so. same place Jawa report is on
Okay, when I first started posting on this thread, I didn't realize that you were residing physically in "Communist" China.
Now I don't know how DHCP client addresses are learned in China, but in the USA, it would go something like this: Depending on the urgency of the situation, the FBI [or whomever] would go to a judge to get a warrant to be served on your website's service provider, and then they would go to your website's service provider to demand to learn the IP address of the person who was posting the comments to your website, and then they would look up that IP address in some big table which they keep, from which they would get a pretty good idea who your client-side ISP was [Comcast, Time Warner Cable, Verizon, Bell South, whomever], and then, again, depending on the urgency of the situation, they'd go to a judge, and get a second warrant, and take that warrant to your client-side ISP, and demand to see their DHCP log records, so as to discover who was using your IP address when your comments were posted. [If it were an extremely urgent situation, involving "National Security", then they might skip the stuff with the warrants.]
Now it strikes me that that scenario would play out much more fluidly in a place like Communist China, particularly if [as is rumored] they control all the routers at the Chinese/International border.
Again, I don't know whether it's true that the Communists control all the routers [there might be some sneaky ways to get out of China without using Communist routers], but I think that, for the sake of safety, you have to assume that they do control all the routers.
That, in turn, would mean that they wouldn't even need to break into your website server [in Germany? or the Netherlands?] - they would only need to flag their routers for specific HTTP traffic heading for your server [things like HTTP "PUT" & "POST" packets], and then they'd have your IP address.
At that point, they probably have a pretty good idea where all the client DHCP addresses are, and, unlike the American FBI, they wouldn't have to worry about getting a warrant to learn who you are - they'd just head on over to your client-side ISP and demand the DHCP records.
Now the thing in your favor here is that filtering traffic looking for a specific types of packet heading for a specific destination [such as you "PUT"-ing or "POST"-ing things to your website] places a tremendous strain on their routers, so as long as you are a Little Fish in a Big Pond, the authorities won't bother adding you to the list of people they are searching for on their routers.
But as soon as you anger enough people, then you'll get bumped up to the list of most-wanted outlaws on the router filters, and eventually they will catch you.
So I guess your options are two:
1) Get some sort of proxy or "anonymizer" server outside of Communist China from which you would connect to the rest of the world [including your "White Devil Red Angel" website], or
2) Remain small enough so that you don't start showing up on their radar.
Finally, if you do get a proxy or "anonymizer", it is imperative that it be ENCRYPTED - an unencrypted connection is essentially worthless.
Also, in Communist China it would be imperative that you use a proxy or "anonymizer" which is unknown to them - if you use a well-known proxy or "anonymizer", then that might very well bump you up onto the list of most-wanted outlaws even more quickly than the strategy of lying low and being content with remaining a small fish in a big pond.