Become a Source

If you have valuable information and would like to make an application please follow the guide below. Please keep in mind: no communication system, piece of software or security protocol is completely secure. However, there are are a number of steps that can reduce potential risk and help protect your confidentiality and anonymity.

You know your situation best, so we ask that you take the appropriate steps to protect yourself.

Before moving ahead

Please ensure that the information you share is of interest to our organization. When sharing information, please make sure that you are as specific as possible and provide clear verifiable evidence and/or documentation. We may take additional steps to review and authenticate your sample.

Please do not send feedback, corrections, pitches or commercial offers through this channel.

Proceed with caution

Think about the sensitivity of the information you’re sharing, and who might be willing to investigate the source; what are their capabilities, resources (e.g., attention, legal, financial, or technical), and motivations to investigate.

Act accordingly.


Making contact

Please note, this protocol is only valid for establishing initial contact. Following review and authentication – we may discuss establishing appropriate channels for further communication.

  1. Clean Device

    1. Do not use your personal, home, or work device

    2. Ensure the device is malware-free

    3. For technical users, boot checksum-verified live-OS on brand-new SSD/USB

  2. Public Network

    1. Connect from a public network you do not regularly visit without your personal devices.

    2. Consider varying locations over time.

  3. Use a Trusted VPN

    1. Use a no-logs VPN that accepts anonymous payment

    2. Choose servers not in adversarial jurisdictions.

    3. When possible, enable additional features such as a “kill switch to cut internet access if VPN fails.

  4. Use Tor Enabled Services (recommended)

    1. Only access Tor related projects or services after VPN connection is active.

    2. Do not mix Tor and clear-net activity on the same session or device.

  5. Manually Encrypt Messages: (optional)

    1. Generate PGP key-pairs offline

    2. Practice good key management.

    3. Consider session-specific key-pairs.

  6. Isolated Email

    1. Use a secure temporary email with servers in a friendly jurisdiction

    2. Please note that email is not secure medium; assume all metadata (sender/recipient, time, subject line) is exposed.

    3. Only access via Tor and VPN (Steps 3-4)

    4. Consider encrypting messages manually using PGP (step 5)

    5. Check the spam folder for replies.

Contact Email: 00S14@proton[.]me

Public Key:

-----BEGIN PGP PUBLIC KEY BLOCK-----

mDMEaFODCRYJKwYBBAHaRw8BAQdA2wJI5qWGv0EH4lJy/7KbTrEN7Q2siwfduq+4
aTtwr1O0H0dpZnRlZCBQYW5kYSA8MDBTMTRAcHJvdG9uLmNvbT6IcgQTFggAGgQL
CQgHAhUIAhYBAhkBBYJoU4MJAp4BApsDAAoJEDOK9F8f2oMi2M0BAPrkol/TKuuY
ae7aRP9hPPiIdqnFIMBw5NnX+wBCyn50AP9HwUfx0vB0M/ZA4tgneceou6DbDd9J
5ycXZYGXqL2KCLg4BGhTgwkSCisGAQQBl1UBBQEBB0BJsGFVordcFlo1/mLzXYLm
lBsz0NtcxEUGtwhhsS3jBgMBCAeIYQQYFggACQWCaFODCQKbDAAKCRAzivRfH9qD
IqlwAQCW4/p7we8u3zkDxktwByvwnDb1XtgHY1CtI9GPSnWJ7wD+JgxkVFfF0k+i
WHgftMFGQLIvsIYrADM0lzCxqwNuOw8=
=9+Za
-----END PGP PUBLIC KEY BLOCK----- 

We appreciate you taking the time to contact us and we will review messages on a regular basis, the evaluation process for each message may take some time, depending on the information provided and your security situation S14 may choose not to respond.

We look forward to hearing from you.