Become a Source
If you have valuable information and would like to make an application please follow the guide below. Please keep in mind: no communication system, piece of software or security protocol is completely secure. However, there are are a number of steps that can reduce potential risk and help protect your confidentiality and anonymity.
You know your situation best, so we ask that you take the appropriate steps to protect yourself.
Before moving ahead
Please ensure that the information you share is of interest to our organization. When sharing information, please make sure that you are as specific as possible and provide clear verifiable evidence and/or documentation. We may take additional steps to review and authenticate your sample.
Please do not send feedback, corrections, pitches or commercial offers through this channel.
Proceed with caution
Think about the sensitivity of the information you’re sharing, and who might be willing to investigate the source; what are their capabilities, resources (e.g., attention, legal, financial, or technical), and motivations to investigate.
Act accordingly.
Making contact
Please note, this protocol is only valid for establishing initial contact. Following review and authentication – we may discuss establishing appropriate channels for further communication.
Clean Device
Do not use your personal, home, or work device
Ensure the device is malware-free
For technical users, boot checksum-verified live-OS on brand-new SSD/USB
Public Network
Connect from a public network you do not regularly visit without your personal devices.
Consider varying locations over time.
Use a Trusted VPN
Use a no-logs VPN that accepts anonymous payment
Choose servers not in adversarial jurisdictions.
When possible, enable additional features such as a “kill switch” to cut internet access if VPN fails.
Use Tor Enabled Services (recommended)
Only access Tor related projects or services after VPN connection is active.
Do not mix Tor and clear-net activity on the same session or device.
Manually Encrypt Messages: (optional)
Generate PGP key-pairs offline
Practice good key management.
Consider session-specific key-pairs.
Isolated Email
Use a secure temporary email with servers in a friendly jurisdiction
Please note that email is not secure medium; assume all metadata (sender/recipient, time, subject line) is exposed.
Only access via Tor and VPN (Steps 3-4)
Consider encrypting messages manually using PGP (step 5)
Check the spam folder for replies.
Contact Email: 00S14@proton[.]me
Public Key:
-----BEGIN PGP PUBLIC KEY BLOCK-----
mDMEaFODCRYJKwYBBAHaRw8BAQdA2wJI5qWGv0EH4lJy/7KbTrEN7Q2siwfduq+4
aTtwr1O0H0dpZnRlZCBQYW5kYSA8MDBTMTRAcHJvdG9uLmNvbT6IcgQTFggAGgQL
CQgHAhUIAhYBAhkBBYJoU4MJAp4BApsDAAoJEDOK9F8f2oMi2M0BAPrkol/TKuuY
ae7aRP9hPPiIdqnFIMBw5NnX+wBCyn50AP9HwUfx0vB0M/ZA4tgneceou6DbDd9J
5ycXZYGXqL2KCLg4BGhTgwkSCisGAQQBl1UBBQEBB0BJsGFVordcFlo1/mLzXYLm
lBsz0NtcxEUGtwhhsS3jBgMBCAeIYQQYFggACQWCaFODCQKbDAAKCRAzivRfH9qD
IqlwAQCW4/p7we8u3zkDxktwByvwnDb1XtgHY1CtI9GPSnWJ7wD+JgxkVFfF0k+i
WHgftMFGQLIvsIYrADM0lzCxqwNuOw8=
=9+Za
-----END PGP PUBLIC KEY BLOCK-----
We appreciate you taking the time to contact us and we will review messages on a regular basis, the evaluation process for each message may take some time, depending on the information provided and your security situation S14 may choose not to respond.
We look forward to hearing from you.