Data Submission
We are always open to accept data by any party. We take no measures to attempt to identify our sources, and do not discuss our source of data even between members of the collective. Where appropriate and with well clarified authorization from the source, we do provide credit for the source of the information if we can be confident this will not harm the objectives of the collective or lead to the identification of people at risk.
Do not contact us about potential or in-progress data breaches, as it puts you at risk and makes it difficult or impossible to determine any potential public interest while also legally preventing us from publishing any resulting leak.
To make contact about a submission:
- Contact us anonymously using our GlobaLeaks instance at http://r4t6s3vzob6eidp7wg2c3smjitzusvdx2tsrt4sajwznch3dpcsvgtyd.onion/
- Email us at [email protected] using the PGP key at the bottom of this page.
Once contact has been established, communications may be moved to another secure platform, such as Cwtch.
Submission Guidelines
- Be honest with yourself and with us about your level of OPSEC - it's the best way we can help. If you don't know, ask. See Tools of the Trade below for more.
- Bullshit never helps. If you can't tell the truth about something, don't say anything. Impressive stories are pointless. False trails are harder to pull off and less helpful than you'd think - not to mention easily unethical, depending on the circumstances.
- It's better to be safe than clever. Cleverness is unique, like a signature. Silence is ubiquitous. Jokes and references can be as identifying as a name. Persona aliases can be as revealing as true names.
- Don't talk about it, even "in private." If you do, assume that whatever you say might leak and know that it could be read in a courtroom.
- Don't save logs. If you must save records for legal defense reasons, give your only copies to your lawyer for that explicit purpose. Don't destroy evidence - just don't have evidence to preserve or destroy.
- Don't keep a copy of whatever you leaked, or anything else you don't need anymore. Even PGP and other encryption keys can be incriminating.
- No, you almost definitely don't need to be able to prove it was you.
- Be patient.
- Assume your adversaries are smarter than you are.
- Seriously, don't save logs.
- When in doubt, talk to a lawyer.
Tools of the Trade
- Tor Browser - Anonymous web browsing
- OnionShare - Anonymous one-off file sharing
- Cwtch - A decentralized, anonymous and encrypted chat service
- Pidgin & OTR - Live IRC/XMPP chat with Off the Record encryption [EFF Guide]
- Tails - An anonymous, non-persistent Operating System
- Riseup - A privacy-friendly email and VPN provider
- EFF Surveillance Self-Defense Guides - A fantastic collection of guides to resist surveillance
Browsers and Plug-ins
- Disconnect - A plug-in to block malicious internet tracking, ads, and other web content
- Privacy Badger - A browser extension that automatically learns to block invisible trackers
- Tor Browser - Anonymous web browsing
- uBlock Origin - A wide-spectrum content blocker with CPU and memory efficiency as a primary feature
Communication
- Cwtch - A decentralized, anonymous and encrypted chat service
- DKIM Verifier - A Thunderbird plug-in which verifies the DKIM Signature of emails
- Pidgin & OTR - Live IRC/XMPP chat with Off the Record encryption [EFF Guide]
- Riseup - A privacy-friendly email and VPN provider
- Signal - A secure text messaging service, recommended for daily use
- Thunderbird - An open-source email client
Encryption and Passwords
- KeePass - An open-source, encrypted password manager with ports for many operating systems
- OpenPGP - The most widely used email encryption standard
- VeraCrypt - Free open source disk encryption software
Guides and Resources
- Big Ass Data Broker Opt-Out List - A list of data brokers that may be making your home address and other personal details publicly available
- Consumer Reports Security Planner - A guide to tools to improve online safety
- EFF Surveillance Self-Defense Guides - A fantastic collection of guides to resist surveillance
- The Intercept Surveillance Self-Defense Checklist - Steps journalists, activists, and everyone else can take to improve their security
Handling Data
- 7zip - A versatile tool for compressing and extracting data for Windows
- Dangerzone - Convert potentially dangerous PDFs, office documents, or images to safe PDFs
- ImportExportTools NG - A free Thunderbird extension for importing and exporting MBOX and EML emails
- Keka - A versatile tool for compressing and extracting data for MacOS
- pst-utils - Free linux tools to read and convert Microsoft Outlook PST files
- Qubes OS - A reasonably secure operating system
- Web Translate - A free Thunderbird extension for translating emails
Torrents
- Deluge - A free, versatile, cross-platform torrent client
- Seedboxes - Rentable, high-bandwidth servers for uploading and downloading files
- Transmission - A free, simple and stable cross-platform torrent client
Tips
Use seedboxes as sandboxes
Seedboxes not only offer a way to more quickly and discretely download data, some also offer remote desktop access (or SSH access and the opportunity to install your own remote desktop client). This allows users to access the data directly on the seedbox, without having to open it on a local machine, both cutting down on the time required to access it, and reducing the risk.
SecureDrop
In late 2020, the Institute of Quantitative Social Science at Harvard University appointed DDoSecrets member Milo Trujillo as a graduate student affiliate. The IQSS operate the first SecureDrop at a United States academic institution. We can now recommend their secure dropbox to our sources. DDoSecrets researchers are collaborating with IQSS social scientists to create public good using available data.
Request Access
Some of our data sets must first be requested before we can provide access. To request access, email [email protected] or open a ticket and:
- Explain why access to the material is needed and what you intend to do with it.
- Include enough information to verify your credentials or purpose.
- If you intend to reproduce any data, explain how it will be reproduced and who it will be shared with.
Our replies to Hotmail, Outlook, MSN and other Microsoft-based email addresses often bounce. Using other email services is recommended.
Your request will probably be rejected if:
- You don't provide a way to verify your request or identity. Official email addresses are best.
- You're just curious.
- You're a hacktivist that wants to exploit the data.
- You're a researcher without a clear journalist or academic project.
- You offer only generic information.
- You email the wrong address or multiple addresses.
Due to limited time, we are unable to respond to rejected requests.
Contact Methods
Direct addresses can be found for some members on the Team page.
Instructions to request access to data can be found above.
Replies to Hotmail, Outlook, MSN and other Microsoft-based email addresses often bounce. Please don't use Hotmail or Outlook email addresses to contact us as we will not be able to respond.
For general contact and inquiries (PGP key below):
For press matters:
For sources making contact (PGP key below):
If you need to contact us via an alternative method, it is recommended that you use a temporary email address to get in touch with us and setup alternative channels.
PGP Keys
If you want to encrypt your communications to [email protected], you can use the following PGP key.
-----BEGIN PGP PUBLIC KEY BLOCK-----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=Iqjz
-----END PGP PUBLIC KEY BLOCK-----
If you want to encrypt your communications to [email protected], you can use the following PGP key.
-----BEGIN PGP PUBLIC KEY BLOCK-----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=C9oS
-----END PGP PUBLIC KEY BLOCK-----