The next would be the deal with of our protected web site in which you can anonymously add your files to WikiLeaks editors. It is possible to only access this submissions technique by Tor. (See our Tor tab For more info.) We also suggest you to definitely read our strategies for resources in advance of publishing.
Specifically, hard drives retain data after formatting which can be seen to your electronic forensics team and flash media (USB sticks, memory cards and SSD drives) retain info even after a safe erasure. Should you utilised flash media to retail outlet delicate facts, it is important to destroy the media.
"Tradecraft DO's and DON'Ts" consists of CIA guidelines on how its malware ought to be written to avoid fingerprints implicating the "CIA, US government, or its witting husband or wife providers" in "forensic critique".
知乎,让每一次点击都充满意义 —�?欢迎来到知乎,发现问题背后的世界。
WikiLeaks publishes documents of political or historic relevance which can be censored or in any other case suppressed. We specialise in strategic global publishing and enormous archives.
When you've got a really big submission, or perhaps a submission with a complex format, or are a large-possibility supply, remember to Make contact with us. In our encounter it is always probable to find a customized Answer for even the most seemingly here difficult conditions.
より詳しくは「運営者情報と無料プリント教材「おうち学習キッズ」について」を見て下さい。
知乎,让每一次点击都充满意义 —�?欢迎来到知乎,发现问题背后的世界。
If You need to use Tor, but must contact WikiLeaks for other good reasons use our secured webchat offered at
In the event you do that and therefore are a substantial-chance supply it is best to be certain there isn't any traces of your clean up-up, since such traces themselves may attract suspicion.
If the pc you will be uploading from could subsequently be audited within an investigation, think about using a computer that is not very easily tied for you. Technological consumers may also use Tails that will help make sure you don't leave any documents of your respective submission on the computer.
あいうえお表(ひらがな表):シンプル文字のみ(やいゆえよ・わいうえを版)段ごとに色付き
If you're a superior-threat resource and the pc you well prepared your submission on, or uploaded it from, could subsequently be audited within an investigation, we propose that you simply format and get rid of the computer hard disk drive and some other storage media you used.
Supply code posted In this particular sequence is made up of computer software made to run on servers managed with the CIA. Like WikiLeaks' before Vault7 sequence, the fabric revealed by WikiLeaks won't have 0-times or related security vulnerabilities which might be repurposed by Other individuals.