The Right to Justice

Send us information

Do you have documents or a story that is missing here? Would you like to share them with the project? We offer several ways to contact our editorial staff and provide materials. No communication system is completely safe, but these tools can help protect your anonymity. Below we provide a small guide, but please read the instructions of the selected application.

WhatsApp

WhatsApp – is a free instant messaging app owned by Facebook that provides full end-to-end message encryption. MoreClose
Only the sender and the recipient can see messages, photos, videos, as well as voice messages, documents and calls. Although you can restrict some account information shared by Facebook, WhatsApp still keeps records of phone numbers involved in the exchange, and user metadata, including timestamps for messages.
Add us: +44 7784790426 Instructions Download Security

Signal

Signal – is a free open source messaging application offers end-to-end encryption for sending messages, photos, videos and calls. MoreClose
Signal stores only your phone number when you first registered with the service and when you were last active. No metadata associated with communications is preserved. The application also allows messages to self-destruct by removing them from the recipient and sender’s phone (after they have been seen) after a certain amount of time.
Add us: +44 7784790426 Instructions Download Security

ProtonMail

ProtonMail – is a email service. It is equipped with end-to-end message encryption. Neither Proton Technologies nor the government can decode them if they want, as the encryption keys are only available to users. MoreClose
For encryption, the company uses open technologies AES, RSA and OpenPGP. ProtonMail servers are located outside the jurisdiction of the United States and the European Union – in Switzerland.
Send us a message: [email protected] Instructions Email Details

SecureDrop

SecureDrop is an encrypted system for sending data and documents, uses Tor’s anonymity software to protect your identity, location and information that you send. We do not request or require any identifiable information, nor do we track or record information related to the message. We strongly recommend not to send data while on a public Wi-Fi network, and also make sure before sending that the computer that you are using does not contain malicious programs. If the computer is compromised, communication using SecureDrop can also be compromised.
How to use SecureDrop
  • Download and install the Tor browser with https://www.torproject.org . The Tor browser allows you to access our SecureDrop page, which acts as a hidden Tor service.
  • Open the Tor browser and wait for the page that indicates that the connection is established, then copy and paste the address line: ouradderss.onion
  • Follow the instructions to send us information. Users will be given a code name that can be used to log in and check responses from the editorial office.
  • For additional security, consider using the Tails operating system instead of the Tor Browser.
Confidentiality
SecureDrop servers are under physical control of the edition. The information you send us is stored on our SecureDrop servers in an encrypted format. Before distributing your message among the editors, we will decrypt your message on a computer that has never been connected to the Internet, and remove any related metadata. After cleaning the metadata and possible information about the source, we will provide the message and the documents to the editorial office. We will not know the source of information provided through SecureDrop: but if your name or other identifiers are included in the message body itself, they can not be edited by us. If this is of concern, we recommend that you do not include the identification information in your message. If you want to log in to check the editorial responses, we recommend that you delete each message as soon as it is read. On our side, we also delete these messages. SecureDrop is regularly checked by independent security experts. Like all software, it can contain security vulnerabilities that you can use. Ultimately, you use the service at your own peril and risk.