HOW WILDLEAKS WORKS AND HOW TO USE IT
3 SIMPLE STEPS:
To use WildLeaks and to submit information is very simple and quick.
After you click on the orange Submission Button on our homepage, you are taken to a very secure platform where you can submit information and files. You have two possible submission options, Confidential or Anonymous.
With the Confidential option you do NOT have to install the Tor Browser Bundle, you can use your usual browser (Chrome, Safari, Explorer, Firefox, etc.). The connection to WildLeaks will be automatically completed via HTTPS, which encrypts and secures data as it travels between you and our secure servers. Most web browsers use an encrypted protocol called Secure Sockets Layer (SSL) to access secure webpages. These pages use the prefix HTTPS. The “s” stands for secure.
Please be aware that with the Confidential option, the transmission of the information is secured and encrypted but entities like employeers or governmental agencies, may still be able to understand where you are and to see that you are uploading documents.
If you want or need total anonymity we recommend that you install the Tor Browser Bundle and then connect to and submit information to WidlLeaks, as described below.
With the Anonymous option you will first need to install the Tor Browser Bundle (click here to easily download it), and then use the Tor Browser to connect to WildLeaks and make a submission.
After you downloaded the Tor Browser, you can click the orange button on our homepage or copy and paste into the browser the WildLeaks Tor Hidden Service Address: http://ppdz5djzpo3w5k2z.onion
The Tor Browser allows you to obscure your traceable IP address, when you browse the Internet, when you download or upload files, or when you use a web email account (e.g., Hotmail or Gmail etc.).
By using the Tor Browser, your connection is not only secure but also anonymous, leaving no traces behind.
Please note that when you leak or share sensitive information there are always some risks involved. Your anonymity may be threatened. Read about those risks and our tips here.
Highly experienced and responsible professionals, investigative reporters, and former law enforcement officers evaluate documents and tips provided to WildLeaks. In order to assess the information and decide what to do, WildLeaks uses intelligence methodologies, a vast network of contacts and the latest technologies.
After you access our secure servers, you will be taken to a simple page where you will be asked to describe the information and circumstances that you want to report, attach files such as pictures, videos or documents, and finally submit the everything to WildLeaks.
After the submission you will be given a unique receipt number. Please store the receipt number in a safe place. This number is very important because it will allow you to connect to us again, in a secure and anonymous way, should you need to:
- Add more information about your original submission
- Send us a message
- Interact with us in an anonymous way
AFTER YOUR SUBMISSION, PLEASE FOLLOW UP WITH US, IF YOU CAN, USING THE RECEIPT NUMBER. WE MIGHT NEED TO ASK YOU FOR ADDITIONAL INFORMATION OR GIVE YOU FEEDBACK.