Yep, the various security concerns are also part of why @BD himself distributed it that way, and not already hosted

.
Speaking of, since I don't remember if @BD mentioned it here, I personally used
this shiny Python DNS 'server' to handle the 'a' pointer, with the following config:
Code:
A ^a.$ 192.168.0.25
That obviously implies setting up the WiFi connection the 'advanced' way on the Kindle to set a custom DNS server (here, 192.168.0.25, which happened to be the local IP of my desktop at the time, which was also serving the directory over HTTP through Python [
sudo python -m SimpleHTTPServer 80]).
NOTE: I don't remember which domains OTAs are pushed through, but that could also be a roundabout way to blackhole them.