WildLeaks has implemented a very secure Tor-based online platform in order to allow our sources to stay anonymous and to submit ‘sensitive’ information in the most secure way possible, always encrypted, in respect to data transmission and management.
After you click on the big red button on our homepage, you have two submission options, Confidential or Anonymous.
If you think that there are no risks that you will be traced by an external entity, you can choose to submit information without installing the Tor Browser or any particular software other than your usual Browser (Chrome, Explorer, Firefox, etc.). In that case, your submission will be considered ‘Confidential’. The connection to WildLeaks will be completed automatically through the software Tor2Web, via HTTPS, which secures data as it travels between you and our servers.
We will not be able to know who you are or where you reside, but your submission could be traced back to you and your IP address by governmental agencies, employers or other interested parties.
If you choose to submit your information in complete anonymity, you will be using a submission system that is entirely based on the use of Tor technology, which is already integrated into our platform using the software provided by our partners GlobaLeaks.
Tor technology allows people to navigate the Internet anonymously. It is made up of a chain of proxies that work to hide the users’ original IP address (your Internet identity). It is considered the best technology for digital anonymity available to Internet users and academics. IT security experts constantly revise the software to ensure anonymity.
In order to remain anonymous and untraceable, we recommend that instead of your usual Browser (Internet Explorer, Chrome, Firefox, etc.) you use the Tor Browser (click here for more information and for an easy download of the Tor Browser Bundle).
IMPORTANT: After you download and open the Tor Browser, if you want to submit information and tips to WildLeaks, click on the big orange button on our homepage or copy and paste the following WildLeaks’ Tor Hidden Service Address into the Tor Browser: http://ppdz5djzpo3w5k2z.onion
Whether or not anonymity is important to you, Tor can also be useful as a secure means of promoting Internet freedom, and circumventing censorship and electronic restrictions so that you may access or publish blogs and news reports anonymously.
Tor guarantees that no personal traces remain in WildLeaks systems.
GlobaLeaks is an open source project developed by the Hermes Center for Transparency and Digital Rights and aimed at creating a global, anonymous, censorship-resistant, secure, and easy to use whistleblower platforms . GlobaLeaks is designed with flexibility in mind, with maximum privacy and security standards.
Tor2web is the software behind the Tor2web Network, a globally distributed network of proxies aimed at creating a bridge between the Internet and Tor Hidden Services. When the user connects to the Internet or WildLeaks using Tor2Web, the software alerts that it is possible to not have 100% anonymity. If you want to access the Internet or WildLeaks in complete anonymity and untraceability, you need to download the Tor Browser Bundle and use the Tor Browser. The Tor2web project was originally developed by Aaron Swartz and further developed by the Hermes Center as part of the Project GlobaLeaks.