One of the easiest ways to contact us is by email, but it is worth thinking how to protect yourself. You might choose to set up a new email address not in your name, but it is worth bearing in mind that if you are using a public or work computer, there may be a record of information sent and received.
If you would like to send confidential material, one of the best ways is using PGP to encrypt the email.
List of PGP keys
三级成人视频 - firstname.lastname@example.org
Katherine Rushton - email@example.com
Sophie Barnes - firstname.lastname@example.org
三级成人视频Daniel Foggo - email@example.com
Using encrypted email can be very convenient as messages can be sent from an existing mailbox. However, sending encrypted emails only protects the contents of the message, it doesn’t provided anonymity as the original email address is displayed - unless you create a new email for this purpose.
三级成人视频PGP encryption is a tried and tested standard for protecting email and can be set up easily. Messages can only be encrypted where the recipient has a known “public key”. You can find a list of public keys for Telegraph staff here:
三级成人视频If using web mail, Mailvelope () can ease the process of setting up keys and sending messages.
三级成人视频Easy to use
三级成人视频Can be used with a wide number of recipients
Even if you set up a new email address, it is unlikely to be anonymous.
三级成人视频Unless the email is encrypted, the contents are potentially visible to others.
三级成人视频Messages where anonymity is less important than encrypting the contents of messages
T三级成人视频he main number for the investigations team is 020 7931 3354. However, if you want to discuss sensitive information, you may not want to use your home, office or mobile phone.
Consider where you are making the call from, will there be a trace? It might be worth buying a pay-as-you-go phone and thinking carefully about when and where you make the call - can you be overheard?
Doesn’t always provide full security
三级成人视频Can’t send large documents
Difficult to provide anonymity
Arguably, the most secure way to provide anonymous, confidential material is by post. Our address is - Investigations, Telegraph, 111 Buckingham Palace Road, London, SW1W 0DT.
三级成人视频However, before you pop something in the mail, consider where you are posting it from, is it likely to leave a trace?
Easy for printed documentation
One way communication. It is hard for the journalist to ask follow up questions. We would almost certainly want to speak to you.
T三级成人视频elegraph SecureDrop address
SecureDrop is a system designed to be accessed over the dark web to allow sources to anonymously and safely send information to journalists.
三级成人视频It is only possible to access the system using Tor. When you upload files or send us messages using SecureDrop, those messages are encrypted and only members of the Investigations team are able to retrieve and decrypt them. Responses can be posted and are visible only to the original poster.
SecureDrop was developed and is maintained by the Freedom of the Press Foundation and is the de facto standard for secure, anonymous communications with investigative journalists.
We recommend using Tails, a secure, anonymising operating system that boots from a USB stick and provides access to to the dark web using Tor.
Anonymous over Tor with no email addresses associated with messages
三级成人视频All messages and files are automatically encrypted once they are uploaded to the system
Easy to use once using Tor
三级成人视频Standard system for anonymously and securely sending files to journalists
Using Tor is marginally more difficult than using encrypted email
Responses need to be checked for
三级成人视频Most companies monitor for Tor traffic, so it is likely that your employer would notice your activity.
Files and messages where anonymity is essential
三级成人视频To use Secure Drop, you will need a Tor browser
Accessing the SecureDrop system requires using a Tor browser, which is a special web browser that anonymises and encrypts access to the web. The Telegraph’s SecureDrop system operates as a hidden service on the dark web.
三级成人视频It is possible to use Tor from any operating system, by downloading the bundle from here:
However, to use Tor to its full anonymising potential, you should consider using Tails, a secure operating system that boots your laptop or desktop into a secure environment, separate from your day-to-day system. It is available here:
Some organisations block and monitor Tor traffic, so be wary of using Tor or Tails in your workplace
三级成人视频Some laptops, Chromebooks in particular, won’t allow Tails to boot
Using Tor as an app on your laptop or desktop will leave traces, so consider the security of your device if you are not using Tails.
The Telegraph, together with the international news organizations Die Zeit, Mediapart, The Intercept and WikiTribune, welcomes information from whistle-blowers within the technology industry.
This sector has enhanced and transformed our lives. Big data wields extraordinary influence, holding some of our most personal secrets, sometimes working hand in hand with intelligence agencies or other private corporations, and generating ever-greater sway over the democratic process.
Do you have information about a tech firm doing something wrong or mishandling data? If you believe in good faith the public is being harmed, exploited or misled, we want to hear from you, whether the data in question is being used for social media, marketing, healthcare, law enforcement, machine learning/AI, or any other field. Whistle-blowers may be able to shed light on commonly misunderstood or questioned practices, for example, why companies have chosen specific product updates and their effect on consumers.
To find out more, go to http://sostyley.com/bigdatacall/