WildLeaks has implemented a secure platform in order to allow our sources to stay anonymous and to submit sensitive information in the most secure way possible, always encrypted, in respect to data transmission and management.
You have two submission options, Confidential or Anonymous.
If you think that there is no risk that your actions will be traced by an external entity, you can choose to submit a tip without installing the Tor Browser. In that case your submission will be considered ‘Confidential’. The connection to WildLeaks will be completed via HTTPS, which secures data as it travels between you and our servers. You can use any browser (Chrome, Safari, Explorer, etc.).
We will not be able to know who you are or where you reside, but your submission could be traced back to you and your IP address by governmental agencies, employers, or other interested parties.
If you have concerns about your traceability and you choose to submit your information in total anonymity, you will be using a submission system that is entirely based on the use of Tor technology, which is already integrated into our platform. Thus, as a whistleblower, you must first download and install the Tor Browser. It is very easy and similar to using a normal browser:
- Download the Tor Browser Bundle from one of the links below.
- Execute the file you downloaded to extract the Tor Browser into a folder on your computer (or pendrive).
- Then simply open the folder and click on “Start Tor Browser.”
- To make an anonymous submission to WildLeaks, copy and paste into the Tor Browser the WildLeaks’ Tor Hidden Service Address: http://ppdz5djzpo3w5k2z.onion
> Windows version – www.torproject.org/download/download-easy.html.en#windows
> Linux version – www.torproject.org/download/download-easy.html.en#linux
> Mac version – www.torproject.org/download/download-easy.html.en#mac
The Tor Browser Bundle lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained.
Tor technology protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. It prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access internet sites that are blocked.
You can find more information about Tor at this link: https://www.torproject.org/projects/torbrowser.html.en