Get Involved

You want to join our mission? Here are some ideas to get on board.

Become a Member Organization

We’ll train you how to safely use of an online whistleblowing platform. You can also propose awardees and appoint jury members.

Consider donating

This project depends on donations to keep going. Decide if you want to support the overall project or one whistleblower in particular.

Are you a whistleblower?

If you want to blow the whistle yourself, consider your options wisely. Learn more on how to stay safe.

Are you a whistleblower?

If you want to blow the whistle yourself, consider your options wisely.
Learn more on how to stay safe.

Exposing wrongdoing is always associated with personal risks. Therefore, many whistleblowers decide to submit information anonymously. No form of communication can fully guarantee security. However, you can increase the likelihood of remaining anonymous by taking appropriate technical precautions and by behaving accordingly.

Continue

Everyone leaves numerous traces when using end devices and can be spied on using cookies, tracking tools, spyware, state trojans, data retention and spy chips. This makes it easier for authorities and employers to find out who the whistleblower is and what confidential information has been passed on. A visit to our website or that of other whistleblowers (media etc.) may be sufficient to raise suspicions.

The use of personal (business or private) end devices should therefore be avoided when whistleblowing. Instead, use different and changing public libraries and internet cafés for research, the submission of reports and further communication in connection with whistleblowing. Never access sites or services (email, social media, customer accounts, etc.) from there that are personally connected to you. Make sure that the respective location (especially the screen) is not visible from security cameras and is not in the immediate vicinity of one of your frequent places of residence (home, workplace, sports club, etc.).

Below you will find an overview of the technical solutions you can use to make it particularly difficult to track you. Most of these are open source solutions. Not only are they free of charge, they are also maintained by a large community, meaning that potential vulnerabilities are usually discovered early on and permanently rectified.

Continue with encryption techniques and software

Tor browser

Encrypted data carriers (pen drive, external hard disk)

You should not store sensitive documents and files on your business or private devices, but download them directly to an encrypted external drive (e.g. pen drive). The safest way to do this is to buy a new pen drive from a retailer, pay cash for it and only use it in connection with whistleblowing.

Removal of metadata

Tails – the complete package for whistleblowers

Electronic messages can be spied on and read relatively easily, as we know thanks to one of the best-known whistleblowers, Edward Snowden. This can be made considerably more difficult by using encryption techniques. Messages can only be read or understood if the recipient has a special “key”. This type of encryption is standard with some email and messenger services, while others can be set up with reasonable effort. This does not entail any significant restrictions in terms of ease of use. We explain more about this in the following sections.

Continue with protected communication

Emails

The encryption software GnuPG (open source) or PGP is a free and cross-platform software for encrypting emails. The only requirement is that the other person also uses PGP and that you know their “public” key. Before sending the email, encrypt the email with the recipient’s public key and send your public key as an attachment. The recipient then uses their “private” key to decrypt your email and their “public” key if they are also to reply to you in encrypted form. You should never pass on your private key.

Messenger services (Signal, Threema)

Most popular messenger services now advertise the ability to send encrypted messages (“end-to-end encryption”) so that they can only be read by the communication partner. However, security experts have doubts about the validity of this assurance for messenger services such as WhatsApp.

Whistleblower portals and electronic anonymous mailboxes

Contact points for whistleblowers in the media, public authorities and companies are increasingly relying on whistleblower portals or special electronic mailboxes to receive reports. Some of these whistleblower portals have a so-called feedback channel. When you submit a report, you receive a code or password with which you can log into a mailbox set up especially for you. You can continue to communicate anonymously with the addressee via this mailbox after submitting the report. This enables the addressee to keep you up to date on the status of the matter and to ask you for additional information if necessary.

Post

The postal service is considered comparatively secure. If you want to remain anonymous, do not enter your real sender details and do not hand in the post near your home, work or other places you visit frequently. You can avoid leaving fingerprints by wearing cotton or latex gloves.

Telephone

If you do not know the addressee, initial contact by telephone is often easier. Some contact points for whistleblowers take this into account and offer telephone contact options.

Telephone calls can be traced via the number, even if they are not monitored. If possible, use a prepaid SIM card that was not purchased by you or a person connected to you. Since 2017, ID must be presented when purchasing prepaid SIM cards in Germany. It is best to call from a landline that is not registered in your name and cannot be traced back to you by third parties.

If possible, refrain from giving your name in the telephone call and only provide the most necessary information. If necessary, you can arrange a personal meeting with the person you are calling or another way of providing detailed information.

Crypto cell phones offer a high level of protection, but only if the other person uses the same device. This usually does not justify the high purchase price

Behavior after submitting the report

Only a small group of people usually have access to particularly sensitive or confidential information. Even if you submit your report anonymously, it is therefore easy to identify you as a whistleblower if you draw attention to yourself with conspicuous behavior. Therefore, do not change your behavior after submitting the report.

It is understandable if you feel the need to talk to someone about your report. Even well-meaning people can, whether intentionally or unintentionally, jeopardize the protection of your anonymity, especially if they are put under pressure. Inform as few people as possible and make sure that they have a legal right to refuse to testify (e.g. lawyers, journalists).