How To Leak To ProPublica


David Sleight/ProPublica

Our job is to hold people and institutions accountable. And it requires evidence. Documents are a crucial part of that. We are always on the lookout for them — especially, now, for those regarding the incoming administration.

Have you seen something that troubles you or that you think should be a story? Do you have a tip about something we should be investigating? Do you have documents or other materials that we should see? We want to hear from you.

Here are a few ways to contact us or send us documents and other materials, safely, securely and anonymously as possible.

Email

Here is our staff list, which links to each of our bios and email addresses. Of course, email is convenient, but if your information is sensitive, there are better options.

Encrypted Email

Some of our staff use PGP (aka “GPG”) encrypted email. PGP takes a bit of time to set up but allows you to send us messages that cannot be read without using a PGP program and the correct decryption key; your message body is hidden from email providers, hackers, and other parties that may get access to your email.

You can read more about email encryption and PGP here, and learn how to set it up on Windows or on a Mac.

One important caveat: PGP only protects the message body of your email. Metadata — information about who you are communicating with and when — is not protected and can be seen by anyone with access to your e-mail. (Like a mailed envelope, this unprotected information is used by email providers to make sure your message gets sent to the right place.) If your identity is sensitive, consider using a new, anonymous email address in combination with PGP, or try one of our other options.

The Low-Tech, But Secure Option: Postal Mail

Postal mail is an excellent, easy way to reach ProPublica securely. U.S. postal mail without a return address is one of the most secure ways to communicate — authorities would need a warrant to intercept and open it in transit.

Don’t use your company or agency mailroom to send something to us. Mail your package or envelope from an unfamiliar sidewalk box instead of going to a post office. You can mail us paper materials or digital files on, for example, a thumb drive. Our mailing address is:

ProPublica
155 Avenue of the Americas
13th Floor
New York, NY 10013–1507

If you can identify a reporter you want to reach, it’s worth noting that on the outside or inside of your package or envelope. You can also simply address it to ProPublica.

Super Hi-Tech — Time-Consuming But Max Security: SecureDrop

ProPublica uses a system called SecureDrop so you can share information and files with us with maximum security — far more than is possible with conventional email or other electronic means. Used properly, SecureDrop allows you to correspond with us in a way that shields your identity even from us.

Our SecureDrop server is only accessible using Tor, a special browser that masks information about your internet connection and the computer you are using. Although you need to download special software to connect to ProPublica’s SecureDrop server, it can be as easy to use as a normal web browser.

Here’s how to contact us using SecureDrop:

  • Visit TorProject.org and follow the directions to download and install Tor.
  • Launch the Tor Browser.
  • In the Tor Browser, copy and paste the following into its address bar: http://pubdrop4dw6rk3aq.onion/
  • Follow the instructions on that website to send us files and messages.
  • When you use the site, you will get a code name, which is your login for SecureDrop. You can come back and log in with this code name to submit more information; you can also log in from time to time to see if we have sent a response to you.

When using SecureDrop, we will not record your IP address or information about your browser, computer or operating system.

If you seek maximum confidentiality, do not submit material using the network at your home or work. If you can, use public Wi-Fi, such as at a coffee shop. You can also boot your computer from a USB key containing TAILS, a secure operating system which does not leave any trace of your TAILS activity on the computer you are using; TAILS also comes with a copy of the Tor Browser. (More information on TAILS can be found here.)

Tor is designed to hide your IP address and seeks to make it very difficult for anybody to determine who is sending the files. However, be on your guard and know who might be watching you. We want you to be safe and to understand the risks you face before you send us anything. And if you’re using Tor, you can also read ProPublica more anonymously by using our “onion site” version.



Source link

Loading...

You might also like More from author

Comments