We specialise in strategic global publishing and large archives | Tor is an encrypted anonymising network that makes it harder to intercept internet communications, or see where communications are coming from or going to |
---|---|
See our for more information | If you used flash media to store sensitive data, it is important to destroy the media |
.
3If you do this and are a high-risk source you should make sure there are no traces of the clean-up, since such traces themselves may draw suspicion | In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media USB sticks, memory cards and SSD drives retain data even after a secure erasure |
---|---|
Tails If you are at high risk and you have the capacity to do so, you can also access the submission system through a secure operating system called | Submit documents to WikiLeaks WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed |
You can only access this submissions system through Tor.
19