HOW WILDLEAKS WORKS AND HOW TO USE IT
3 SIMPLE STEPS:
To use WildLeaks and to submit information is very simple and quick.
Before you click on the orange Submission Button on our homepage, please instal the Tor Browser. It is possibile to send confidential information to WildLeaks using a normal browser, however we do not recommend it, especially if you are sending information from a country that do not protect whistleblowers.
ANONYMOUS AND SECURE
You will first need to install the Tor browser (click here to easily download it), and then use the Tor browser to connect to WildLeaks and make a submission.
After you downloaded the Tor browser, you can click the orange button on our homepage or copy and paste into the Tor browser the WildLeaks Tor Hidden Service Address: http://n7kt2meojoykkp6udjxzofctxextpmp2zo533hzzdwdhv43p4r3ef3ad.onion/#/
The Tor browser allows you to obscure your traceable IP address, when you browse the Internet, when you download or upload files, or when you use a web email account (e.g., Hotmail or Gmail etc.).
By using the Tor browser, your connection is not only secure but also anonymous, leaving no traces behind.
Please note that when you leak or share sensitive information there are always some risks involved. Your anonymity may be threatened. Read about those risks and our tips here.
Highly experienced and responsible professionals, investigative reporters, and former law enforcement officers evaluate documents and tips provided to WildLeaks. In order to assess the information and decide what to do, WildLeaks uses intelligence methodologies, a vast network of contacts and the latest technologies.
After you access our secure servers, you will be taken to a simple page where you will be asked to describe the information and circumstances that you want to report, attach files such as pictures, videos or documents, and finally submit the everything to WildLeaks.
After the submission you will be given a unique receipt number. Please store the receipt number in a safe place. This number is very important because it will allow you to connect to us again, in a secure and anonymous way, should you need to:
- Add more information about your original submission
- Send us a message
- Interact with us in an anonymous way
AFTER YOUR SUBMISSION, PLEASE FOLLOW UP WITH US, IF YOU CAN, USING THE RECEIPT NUMBER. WE MIGHT NEED TO ASK YOU FOR ADDITIONAL INFORMATION OR GIVE YOU FEEDBACK.
Other Options for Submitting Information Securely & Anonymously
For whistleblowers that are unable to utilize the WildLeaks platform, WildLeaks offers alternative methods to submit reports as confidentially as possible. These include the following:
1. Set up an anonymous encrypted email service using ProtonMail.ch and then send us an email to: firstname.lastname@example.org
2. Use Threema, a versatile app for your smartphones that encrypts all your communications end-to-end including messages, group chats, files and even status messages.
A phone number or email address is NOT required to use Threema, a unique feature that allows the Threema user to be completely anonymous. After the app has been installed, in order to connect to WildLeaks anonymously just send your Threema ID to email@example.com, and a WildLeaks representative will get back to you from the organization’s Threema account.