None of the communication tools we suggest are entirely foolproof. Each has its own set of advantages and risks. If you’re unsure about the best method for getting in touch with us and/or leaking information, we recommend contacting us through the encrypted messaging app Signal, which is explained in more detail below. In this initial conversation, give a broad outline of your situation and we can provide guidance regarding the best way to move forward. If you prefer to stay anonymous, you do not need to mention your name.
You can send us text messages to this mobile phone number: +48692804017, using the smartphone app called Signal, available for iOS and Android. It is very easy to use as it works like most of messaging apps, but offers better security and anonymity.
Another advantage of using Signal is that we can communicate back with you, just like we would do, using normal short text messages (SMS). You cannot attach pdf or text documents with Signal, but you can send us photos/pictures of confidential documents.
Also, if you want to send us confidential documents but are unclear how to do it, use Signal to ask us and we will text you back, providing guidance.
One thing to keep in mind is that when you contact us via Signal, we will know your phone number (just as if you would send us an ordinary SMS). We will not reveal your phone number to anybody, but if your anonymity is extremely important, please use the methods below to communicate with us instead of Signal.
If you need maximum security and anonymity, create an anonymous email and send us encrypted emails. How to do this? There are a number of steps, outlined in detail in next sections.
When willing to get in touch with us via e-mail, just send one to firstname.lastname@example.org. We monitor this account on a regular basis and will get in touch with you if we are interested in pursuing your tip. Remember though that standard email can be traced and hacked, and it can be discoverable in lawsuits. For information about more secure email options, see “By encrypted email” below.
Another way of contacting us is via an email account registered under a fake name. Gmail, Yahoo, and Outlook are all sufficient for this purpose. If you go through this route, though, you may want to register that account on either your own personal computer (less safe), or on a terminal at a public library or Internet café (more safe). In any case, registering or even logging in to the account on your work computer or on any other network where you’re being actively monitored, means that the account could be tracked back to you.
For more secure smartphone communication with us, the encrypted messaging app Signal currently is the best bet. To get in touch with us using Signal, send us a message at +48692804017.
It’s old school, but mailing documents can be a largely undetectable way of getting information to us. The key is not putting your name or any return address on the packaging. Also, don’t put any sensitive personal information inside the packaging. In addition, don’t mail the documents from your home, work or a location near those locations. Sidewalk post boxes are preferable to post offices, which often have video cameras.
Our mailing address:
ul.Narbutta 20 lok.33/34
To reach a specific reporter or editor, put this person’s name on the outside of the packaging.
BY ENCRYPTED E-MAIL
For more secure email, first set up a Tor browser.
You can use ProtonMail — a fully encrypted email service based in Switzerland. If you can set up a Gmail account, you can get ProtonMail working. It’s as simple as any other open mailing service. The best part is that it fully encrypts all messages going from one ProtonMail account to another automatically. ProtonMail also has a special version of its site set up to operate over Tor.
Our ProtonMail account: email@example.com.
You can also use PGP (Pretty Good Privacy), a method of encrypting data to protect contents from surveillance while it is being transmitted over the Internet. To do so, you’ll need to download and familiarize yourself with free software that generates a pair of PGP “keys” – one private, one public – and hooks into the email program of your choice. We recommend Mailvelope, a cross-platform browser extension that augments Gmail’s browser interface.
Here’s a video that also provides a useful tutorial.
The firstname.lastname@example.org address is configured to accept messages encrypted with PGP. The public encryption key for that email address is below and on the MIT public key server. To contact a reporter or editor directly, use the PGP keys on the individual profiles linked from our staff page.
Here’s our PGP key:
-----BEGIN PGP PUBLIC KEY BLOCK----- mQINBFnOcjABEACYhhb7FgQj2HiuoEl6vJSAJPxGjFGTou+bGygVRNAjro3FidEg NAQkQSPjKMhSq5mTt/RX44ctWsQN+6h9PM3w3w3YeTOpm953MhAwo8RIs7CHQGU9 tZ541DC5awJezyCM4MdyYy8nuHWMhX+43qmkTDVulhf7PRfF61inj/LGgRH13SiN 9PNCM/z5wcwxODQP0VWxV0x0RCugiQg8/zpGKgH/p7CIkWhMg73IgvI38++wZscW KF5fAQEZXScEvDiJEGvPurWh1Tw5hIlwBegfdmx6eOG+vK0N6bAB4m2iP7tkS5Ln CRuxlHGlrBxD6k0vBcQR/Km8/SG9UXRtDn3N/hEsi893rVu8QrRXhx/Gi7EthoGl JxtdAdCZVdUvTs7qtkpLBMd0LO3Pbnee1GPCNxTO0RI4LkK7yV8YBO+pBUNg2o7j 6Gm0RJIKdhcrinaNjodMYo5k9lfb5UiRYZNgxqhgtHMp5w8CDo8LL6rGeqdY7wh6 tH20PudkLSkaMDKNTYbAYCHIqinhNErkfF72+JW9dZwh/3PQzjFQovMoqecKNaWy fIKT4xR69a7yS5AF4BR0FG37MqoiQbwCqs5jGkqjJ/XFCksDsJ1CT85U3bD4yxax cGD/wmc+aoPF36Zg1qJSv9jlZ9BGLH0WuSCm9mpflTi9dcMT0xxW+W3e7wARAQAB tB1WU3F1YXJlIDx2c3F1YXJlQHZzcXVhcmUub3JnPokCVAQTAQoAPhYhBIsTLwX4 DA2XOruP+spSzz+wHQNMBQJZznIwAhsjBQkJZgGABQsJCAcDBRUKCQgLBRYCAwEA Ah4BAheAAAoJEMpSzz+wHQNMZsoP/jVgjMITQa0GkiHdmYxaoyCOUmkWjH4ijiRx iWeK+B+Wc4yzH+IC2HF6mcb5NCpbgkpqt+GgRgWmEJ1g/h1G8jP+AYG7fm2hQk2p noIOLvgVqu/Dhcaa7lfc8DhpXPiJ1trenXpZI+EmaIzMSYtVW6+lZu7PuJE7AJ9g ELlapxRl23YpH18YSZTVCTiIuA7xQtS9TVYdrctfhb4piDPteoHkIL/2VTpxQ753 8wAYBzGVYDkifbqyDq2DGoQQUQMYl9jj0BSqIp16Gu/5kxePueTZCWVzmFhIrqCi MBWHiCHcxb0laVdbr4ZXdYPXsv2q0L0ki9gHx563ugSHpIt47G2ShV7VfBFX1qcO OjEeW0igvphlmjEhJB40c2Lszf8a2Yz+4iEC8cRnnbu4PVn7bzYW5cxWh/GzmJw9 OnfwBaTgQg61w2l4OI/NilRGs8ZdpeRlIMtCTARR7/rXHkCPxd426JQAv5UiSZFY ONY71HqOrD+A7koNHJVooZM44VtD0qQv5Q+bAuoKcMhRpklJyjRKU/wDHjfMqX40 Q5hYFI/xcYXYkWqS9IV0KOoEFrNFC9zVvhFLGElaMdGLjpUPB/JvpwAXSTJ83/TR snpUDl9zChNuglv8Voa4hANMSyuL2KFmFIQE6dlIBh6VYtpN4CgmTEsXOz13rY7r 4XsnF1ZtuQINBFnOcjABEACxvTXc4FB+W7FSgFbo6vz7614dfFHoJfUlhu/hGoyy sB2CkV7wGpCPyXR89NiEebwlxn63EiWRW1WcpOGaatybNEx8Z53iQyqw0j0y5zWE P3CWbd3ccqkYRfie2zhHf9f7Pd/GWEaUMuj8dJhYv8AVY3EZaWAuxGjqUA4z8d66 kg/vTKEbyc391Lhpken5R5lpGCkd+8+PrarQcI0UsQbIT7bwuaQxbZWpPwW1mIYd AF23A45Cz7hADj4swOtT0FQ3HX2Xx1WohkxonTbgU3TKgpevwECMXeQPzE0BHqir YED55lHYG0lVS4/lbW8fgH1acdNoM/gRdNU3hinO7oK7VvtYD/scow8zohGKm206 pdtp6SWPLyIEniGtjDkMsM4KL6dIBaHEe7YGAcu4kN6feTmyPfhSdN0fbiDJ5TGz 4Uzka7pBUvDErM7grJ6su5jDaMXGpeJmOS0RkaohR91QBShMnXqpHrR3FwWC4jX6 rqKKyTXmxTCPGdhOJ18NE8KX/LMXNUF9uOUZm7F0ORqCkcVajr40/iVzLHb2q+OG 2YDb+8CuaNMZp33cUihrGQoUwZjPbQ5g8gOo1UpYNCRcEWg4M7CrUsRfuFGHecw5 CT4++Yy5IReqs2/szyyl46xKazOn91X+Kf+YjvsDDm9suQlz26E3n3ZkcxvgoXhG uQARAQABiQI8BBgBCgAmFiEEixMvBfgMDZc6u4/6ylLPP7AdA0wFAlnOcjACGwwF CQlmAYAACgkQylLPP7AdA0ynkw/+IXzWe9rPgrDegxBTXe9LLbvIAWkSOmr/rhaU kWTd2K8W3PvdLzKgxjJ941VlGkS7+Kos6AuapND9e/e40KMhcNs/pMsLu3WIa9YT 7vKYpmza4biMeAdkAb12N7tkBeiVTQKzywCh4ybT5HRoN6nPv3y78+LwQ3gUF/Ty Dz3leRxM0ql2RHpnbv7hUIxWbdLg+tewYtvG7xciZ/i917dLfpTQDMwkWytYcQAw 6fn3mN4DkFOAvvrs6+4uJS3N9VYMHKxeAymG+fUuVDqK2RBJTDtuiUpeHJOa6yNw 8VvcYyu2IR7aRqDyzS8kvXLeq8V5+k3wd4mxel4IVkcfQjnJ500zMo4Nr5rQgFGC fCK6LwaCuMRdjYEgmauBdvEe/VzBqwkWlmrAEPxeEQh/OI1igE+lptPjI0oOCPLw kESrK+NIGlNqaze8spvQXZ0f/hYt57WXfh0kE9O/g3d+gvhfqho2kQvRJL3YFw/1 J+qC8NH7j+GRO8flTdE0TJvKZzNf/mkIGp4zcFeQPu2cuw/+hMUbG8l5JG090999 +aU4FlipXnF6BRXxWQ3Hp7vhY5ClmDAYMvhG4t/6N9FRItRl1V/hn7yaYtsICQul faXlP3HT29lzerYfvRYa//69Q9VxsHdRhp7dv9iHy9RISlNZ0yYzI1NzgbljQt3e FZRVunU= =hPGM -----END PGP PUBLIC KEY BLOCK-----
PHOTOS AND DOCUMENTS
If you want to anonymously send us photographs or documents, it’s wise to consider an additional set of precautions.
Metadata: Before sending documents, you can completely remove any identifying information from the actual electronic file. Known as metadata, this information often indicates who took or created a photo or document, the software used to create or edit it, the date and time of its creation, even GPS coordinates—any of which could be used to identify you.
If you’re a little lost or need us to clarify anything above, you can email us at email@example.com.