Report Securely | On the Line

Sending information is easy and safe

~

SHIELD WHAT YOU REPORT

Use this option to...
… report a digital attack against a journalist and don’t want to remain anonymous. Some one will know that you have reported something, but no one will know what you have submitted.

REPORT AN ATTACK

~

SHIELD WHAT YOU REPORT

PROTECT YOUR IDENTITY

Use this option to...
… report a digital attack on a journalist if you need to remain anonymous. Both the information you submit and the fact that you did so will be kept confidential.
Report securely and anonymously in two easy steps:
1. Download the TOR BROWSER
Tor is an Internet browser similar to Internet Explorer, Safari, Firefox or Google Chrome that journalists and NGOs can use without revealing their identity. The program is ready to use and is designed for beginners and experts.

Downloading the Tor Browser shouldn’t take more than a few minutes. Please, visit their site for a quick, three-step installation guide.

Download Tor Browser

 

2. Copy and paste the following address into the Tor Browser

ihds74mnwv3rhx2j.onion

or go to www.ontheline.media (our reporting platform) and click on the “Report a threat” button: This will take you to a secure platform where you will be reporting a threat anonymously.

SEND US A MESSAGE

Use this option...
… if you don’t require confidentiality, or if you want to talk about On</the>Line or how we can help, send us a short message.

5 + 8 =

We can help

z

Amplify your voice

The information received through On</the>Line will be verified, analysed and published by the International Press Institute (IPI), a global network of editors, media executives and leading journalist that has been working to safeguard press freedom for 65 years.

Digital emergency response

On</the>Line works together with Digital Defenders Partnership (DDP) to provide a network digital emergency response to support those online journalists who have been the victim of technical attacks or threats to their safety, who need an extra layer of security or who need to circumvent censorship.

Advocate for change

Advocate for change: Ultimately, the information collected under this platform will be used to support IPI’s global advocacy efforts to promote online journalists’ safety and progressive regulatory frameworks that ensure freedom of expression online.

See more about IPI’s Press Freedom missions

Guidelines for a secure submission

Don't be scared to report!

The aim of this guide is not to scare you, but to make you aware about the possible risks related to leaking confidential information. When exposing digital threats and online abuse, you are doing the right thing. However, you could suffer from retaliation by others involved. By understanding the risks you can take effective and precise actions to protect yourself. If this is done correctly, then you can protect your identity and address any problems. Before sending information, consider the following points:

– Do you have a strong political or activist background?

– Are you a public figure?

– Do you have reasons to believe that you are being personally and/or physically surveilled?

– Do you have reasons to believe that your computer may be compromised?

Please remember that these risks are potential risks. Being aware of them only increases your security. Take them into account and evaluate which security measures you should take to protect yourself.

Suggested: If you replied “yes” to one of the questions above and are submitting leaked confidential information, consider using a computer that is not yours and a network connection that you do not normally use.

In the following sections we will detail some of the social and technological risks involved, as well as suggestions for how to avoid them.

Security recommendations while using Tor Browser

1. Tor helps you to hide your identity while using the Internet, but if you reveal personal information while using Tor you can be identified even if your IP address (your identity on the Internet) is hidden.

1.1. An example of this vulnerability would be to access your personal email account while using Tor, as someone could associate the anonymous IP address to your account when sending information.

1.2. To avoid cross identification, it is important that you use an alternative identity while using Tor:

1.2.1 For example, by creating an anonymous email account to be used only over Tor.

1.2.2 Never reveal personal information that could identify you when using Tor.

2. Tor is a safe tool if used correctly. However, it is not perfect. To avoid problems it is important to update the browser when it asks you to. The update will be announced in the browser once it is opened, informing you if your version is obsolete.

Social risks & protections

Risks:

Before submitting any information you should consider what will happen “after” the information has been sent and when the news about the facts related to the info you submitted reaches public media attention.

Ask yourself the following questions to understand your real risk context:

– Do people other than yourself have access to the information you are going to submit?

– Are you really willing and ready to cope with criticism?

Protections:

In light of what was mentioned above, from a social protection perspective you should consider taking the following set of actions:

– If you want to remain anonymous, before you make a submission, don’t tell your intention to anyone;

– If you want to remain anonymous, after you make a submission, don’t tell anyone what you have done;

– Be aware of surveillance systems (cameras or other) in the place where you acquire and submit the information; Do not use your mobile phone.

  • If you use a public Internet connection to submit confidential information, don’t use your credit or debit card in the establishment; pay with cash.
Technological risks & protections

Risks:

You must be aware of the fact that while using a computer and the Internet to exchange information, most of your actions leave traces (computer logs) that could lead anyone to identify where and who you are.

For this reason you must consider risk mitigation strategies and adopt very specific precautions to avoid leaving technological traces about what you are doing.

Remember that you may leave tracks while:

– Researching the information to be submitted

– Acquiring the information to be submitted

– Reading this web page

– Submitting the information to us

– Exchanging data with receivers of your submission

Protections:

By following the procedures and tips below, you should be safe enough to send information without major risks:

– Submit information using the Tor Browser, a piece of anonymous web browsing software designed to keep your identity protected while using the Internet. It is easy to install and use, and it requires no previous knowledge or experience

– Don’t submit information from the personal computer provided to you by your employer (consider using a spare one)

– Save the submission’s receipt in a secure location and, if necessary, destroy this information after you have ended your communications with the journalists

– Consider converting all the data that you are sending into standard PDF format

To improve your digital security overall you should read the Security-in-a-Box project, which explains most of the risks and related countermeasures.