Need to contact us securely?

1. IPI’s encrypted submission system uses Tor anonymity software to protect your identity and location as well as the content you send us.

2. For additional protection when sending us information, we recommend you to use Tor Browser and a public Wi-Fi network and to review the guidelines below.

SECURE CONTACT

GUIDELINES FOR A SECURE SUBMISSION

IPI’s secure contact form protects your identity, location and content when using Tor Browser, which hides your IP address. To quickly access IPI’s secure contact form in Tor Browser, copy and paste the following URL: http://ihds74mnwv3rhx2j.onion

Our secure contact form can still be used with a standard browser. In that case, the content of your message to us will remain encrypted, but third parties may be able to see your location and IP address.

For this reason, we strongly recommend to use the secure contact form via Tor Browser.

Guidelines on using Tor Browser:

1. Tor helps you to hide your identity while using the Internet, but if you reveal personal information while using Tor you can be identified even if your IP address (your identity on the Internet) is hidden.

1.1. An example of this vulnerability would be accessing your personal email account while using Tor, as someone could associate the anonymous IP address to your account when sending information.

1.2. To avoid cross identification, it is important that you use an alternative identity while using Tor.

1.2.1 For example, consider creating an anonymous email account to be used only over Tor.

1.2.2 Never reveal personal information that could identify you when using Tor.

2. Tor is a safe tool if used correctly. However, it is not perfect. To avoid problems it is important to update the browser when prompted. The update will be announced in the browser once it is opened, informing you if your version is obsolete.

In general, you must be aware of the fact that while using a computer and the Internet to exchange information, most of your actions leave traces (computer logs) that could lead anyone to identify where and who you are. For this reason you must consider risk mitigation strategies and adopt very specific precautions to avoid leaving technological traces about what you are doing.

Remember that you may leave tracks while:

  • Researching the information to be submitted

  • Acquiring the information to be submitted

  • Reading this web page

  • Submitting the information to us

  • Exchanging data with receivers of your submission

By using Tor Browser, a piece of anonymous web browsing software designed to keep your identity protected while using the Internet, you can eliminate most of these risks.

However, to protect yourself still further, consider the following steps:

  • Don’t submit information from the personal computer provided to you by your employer (consider using a spare one)

  • Be aware of surveillance systems (cameras or other) in the place where you send us information; Do not use your mobile phone.

  • Seek to use a public Wi-Fi connection.

  • If you use a fee-based public Internet connection to submit confidential information, don’t use your credit or debit card to pay the fee; pay in cash.

Especially if you are considering sending us confidential information (“leaks”) that we may eventually make public in some form, keep in mind the following:

  • If you want to remain anonymous, before contacting us, don’t reveal to anyone your intention to do so.

  • If you want to remain anonymous after sending us information, don’t tell anyone what you have done.

  • Do people other than yourself have access to the information you are going to submit?

  • Are you really willing and ready to cope with (possibly intense) criticism and scrutiny?

To improve your digital security overall you should read the Security-in-a-Box project, which explains most of the risks and related countermeasures.