Contact Us

Contact Us Securely

If you have something sensitive you’d like to share with us, here are some ways you can get in touch. There are two types of security you can choose from, and options depending on what type of material you want to share.

Confidential

When you don’t want others to know what you’re sending

Words

Encrypted email / Mobile messaging / Phone / Post


 

Encrypted Email

Send messages and attachments using an email account with PGP encryption. No one should be able to read your emails except you and the person you’re sending it to.

– Your emails will be protected by encryption keys and passwords. Others would need both to access your email. – Emails are easy to use for communication and can be as long as you need.
– You need some technical skill to set up PGP, and you will need to keep track of your password and keys.

Instructions:

Find the use of a computer that isn’t being monitored. Set up a new email account that you will use only for talking with us, and do not link it in any way to you.

  • Install a program that will encrypt emails for you. Try Mailvelope to encrypt messages from your browser. Other applications for encrypting text are Gpg4win for Windows and GPGSuite for Mac.
  • Encrypt your message using your key and the key of the person you’re writing to.
  • To make sure the email you’re sending will not reveal your IP address, use the Tor network to send your emails with.
  • Email us a copy of your public key so we can reply to you. Remember to log out after sending the message and delete the history from your browser to stay extra safe.

 


 

Mobile Messaging

A secure app is a handy way to chat confidentially. They’re easy to use and quick for communication. However, they are less secure than other options – if you’d prefer to stay strictly anonymous and safe, it might be best not to use them.

– Secure apps will encrypt your messages so only the receiver will be able to read them.
– Phone messaging will disclose the phone’s identity and location.
– If someone gets your phone and unlocks it, they can probably read all undeleted messages.
– Best for short communication – long messages and big attachments don’t work so well.

Instructions:

  • Perhaps you’d prefer to use a different phone than your regular one for this, so it will not be traced to you so easily.
  • Install an app like Signal, or Threema.
  • Many apps have a feature that will delete your messages after a set time, which might be worth using.
  • Contact us on our Signal account by adding us to your phone contacts and message us: (number).

 


 

Phone

Phone is not very secure, but it could be a useful way to start a conversation and discuss secure messaging options.

– Easily hackable and can reveal your identity and location.
– You can’t be 100% certain that the person you’re talking to is who they say they are.

Instructions:

  • Before you call, be clear what it is you want to share with us. Think about whether you want to call from a phone that’s associated with you, or if you want to buy a new phone and use a pay-as-you-go sim card.
  • Think about where you buy it and how you pay for it.

Our number:

 


 

Post

Old fashioned, but may still be what you’re looking for.

– It’s relatively easy to be able to stay anonymous, if you take the right steps.
– A reliable way to send objects without meeting in person.
– If you’re not being followed, it’s pretty unlikely your post will get intercepted.
– It’s slow and post can get lost.
– Post may be hijacked or scanned.

Instructions:

  • Make sure the packaging you’re using, or the stuff you’re sending, won’t give away who you are or your location. Also, make sure the package or envelope is unremarkable.
  • Go to a post office that’s not close to where you live, or your local post office.
  • Mail is scanned for dangerous objects, so don’t include anything that might cause an issue.
  • You might want to make copies of what you send, in case it goes missing.

Our address is:

Electronic Documents

Encrypted email / Mobile messaging


 

Encrypted Email

Send messages and attachments using an email account with PGP encryption. No one should be able to read your emails except you and the person you’re sending it to.

– Your emails will be protected by encryption keys and passwords. Others would need both to access your email. – Emails are easy to use for communication and can be as long as you need.
– You need some technical skill to set up PGP, and you will need to keep track of your password and keys.

Instructions:

Find the use of a computer that isn’t being monitored. Set up a new email account that you will use only for talking with us, and do not link it in any way to you.

  • Install a program that will encrypt emails for you. Try Mailvelope to encrypt messages from your browser. Other applications for encrypting text are Gpg4win for Windows and GPGSuite for Mac.
  • Encrypt your message using your key and the key of the person you’re writing to.
  • To make sure the email you’re sending will not reveal your IP address, use the Tor network to send your emails with.
  • Email us a copy of your public key so we can reply to you. Remember to log out after sending the message and delete the history from your browser to stay extra safe.

 


 

Mobile Messaging

A secure app is a handy way to chat confidentially. They’re easy to use and quick for communication. However, they are less secure than other options – if you’d prefer to stay strictly anonymous and safe, it might be best not to use them.

– Secure apps will encrypt your messages so only the receiver will be able to read them.
– Phone messaging will disclose the phone’s identity and location.
– If someone gets your phone and unlocks it, they can probably read all undeleted messages.
– Best for short communication – long messages and big attachments don’t work so well.

Instructions:

  • Perhaps you’d prefer to use a different phone than your regular one for this, so it will not be traced to you so easily.
  • Install an app like Signal, or Threema.
  • Many apps have a feature that will delete your messages after a set time, which might be worth using.
  • Contact us on our Signal account by adding us to your phone contacts and message us: (number).
Physical Material

Post


 

Post

Old fashioned, but may still be what you’re looking for.

– It’s relatively easy to be able to stay anonymous, if you take the right steps.
– A reliable way to send objects without meeting in person.
– If you’re not being followed, it’s pretty unlikely your post will get intercepted.
– It’s slow and post can get lost.
– Post may be hijacked or scanned.

Instructions:

  • Make sure the packaging you’re using, or the stuff you’re sending, won’t give away who you are or your location. Also, make sure the package or envelope is unremarkable.
  • Go to a post office that’s not close to where you live, or your local post office.
  • Mail is scanned for dangerous objects, so don’t include anything that might cause an issue.
  • You might want to make copies of what you send, in case it goes missing.

Our address is:

Anonymous

When you want to hide your identity, as well as what you send us

Words

Encrypted email / Post


 

Encrypted Email

Send messages and attachments using an email account with PGP encryption. No one should be able to read your emails except you and the person you’re sending it to.

– Your emails will be protected by encryption keys and passwords. Others would need both to access your email. – Emails are easy to use for communication and can be as long as you need.
– You need some technical skill to set up PGP, and you will need to keep track of your password and keys.

Instructions:

Find the use of a computer that isn’t being monitored. Set up a new email account that you will use only for talking with us, and do not link it in any way to you.

  • Install a program that will encrypt emails for you. Try Mailvelope to encrypt messages from your browser. Other applications for encrypting text are Gpg4win for Windows and GPGSuite for Mac.
  • Encrypt your message using your key and the key of the person you’re writing to.
  • To make sure the email you’re sending will not reveal your IP address, use the Tor network to send your emails with.
  • Email us a copy of your public key so we can reply to you. Remember to log out after sending the message and delete the history from your browser to stay extra safe.

 


 

Post

Old fashioned, but may still be what you’re looking for.

– It’s relatively easy to be able to stay anonymous, if you take the right steps.
– A reliable way to send objects without meeting in person.
– If you’re not being followed, it’s pretty unlikely your post will get intercepted.
– It’s slow and post can get lost.
– Post may be hijacked or scanned.

Instructions:

  • Make sure the packaging you’re using, or the stuff you’re sending, won’t give away who you are or your location. Also, make sure the package or envelope is unremarkable.
  • Go to a post office that’s not close to where you live, or your local post office.
  • Mail is scanned for dangerous objects, so don’t include anything that might cause an issue.
  • You might want to make copies of what you send, in case it goes missing.

Our address is:

Electronic Documents

Encrypted email


 

Encrypted Email

Send messages and attachments using an email account with PGP encryption. No one should be able to read your emails except you and the person you’re sending it to.

– Your emails will be protected by encryption keys and passwords. Others would need both to access your email. – Emails are easy to use for communication and can be as long as you need.
– You need some technical skill to set up PGP, and you will need to keep track of your password and keys.

Instructions:

Find the use of a computer that isn’t being monitored. Set up a new email account that you will use only for talking with us, and do not link it in any way to you.

  • Install a program that will encrypt emails for you. Try Mailvelope to encrypt messages from your browser. Other applications for encrypting text are Gpg4win for Windows and GPGSuite for Mac.
  • Encrypt your message using your key and the key of the person you’re writing to.
  • To make sure the email you’re sending will not reveal your IP address, use the Tor network to send your emails with.
  • Email us a copy of your public key so we can reply to you. Remember to log out after sending the message and delete the history from your browser to stay extra safe.
Physical Material

Post


 

Post

Old fashioned, but may still be what you’re looking for.

– It’s relatively easy to be able to stay anonymous, if you take the right steps.
– A reliable way to send objects without meeting in person.
– If you’re not being followed, it’s pretty unlikely your post will get intercepted.
– It’s slow and post can get lost.
– Post may be hijacked or scanned.

Instructions:

  • Make sure the packaging you’re using, or the stuff you’re sending, won’t give away who you are or your location. Also, make sure the package or envelope is unremarkable.
  • Go to a post office that’s not close to where you live, or your local post office.
  • Mail is scanned for dangerous objects, so don’t include anything that might cause an issue.
  • You might want to make copies of what you send, in case it goes missing.

Our address is: