Whistle blowers: The Intercept is for you

How to Contact The Intercept Anonymously


If this is your first time using The Intercept’s SecureDrop server, read this page carefully first.

For more detailed operational security advice, read the How to Leak to The Intercept blog post.

For “An Online Privacy Guide for Journalists”,  read about it here.  https://www.vpnmentor.com/blog/online-privacy-journalists/

The Intercept is serious about protecting our sources. With our SecureDrop server, you can share messages and files with our journalists in a way that should help you remain secure and anonymous, even from us. Messages and files that you send to us will be encrypted.

How to Use The Intercept’s SecureDrop Server

Everything you do on the Internet leaves trails. Before following these instructions, go to a public wifi network, such as at a coffee shop that you don’t normally frequent, and follow them from there. Or connect to a VPN.

  • Download and install the Tor Browser Bundle from https://www.torproject.org/.
  • Open the Tor Browser and copy and paste this into the address bar: https://y6xjgkgwj47us5ca.onion/
  • Follow the instructions to send us information. You will be given a codename that you can use to log back in and check for responses in the future.

Don’t access our SecureDrop server from your home or office. If you wish to ensure maximum privacy, use the Tails operating system instead of the Tor Browser.


SecureDrop is an open source whistleblower submission systems, originally programmed by the late Aaron Swartz, that is maintained by the Freedom of the Press Foundation.

Privacy Information

Our SecureDrop servers are under the physical control of The Intercept‘s staff. When you interact with our SecureDrop servers, we don’t log any information about your IP address, web browser, or operating system, nor do we deliver persistent cookies to your browser. When you use Tor to connect to our SecureDrop server, your connection is encrypted. Using the Tor network helps mask your activity from anyone that is monitoring your Internet connection, and it helps mask your identity from anyone monitoring our Internet connection.

When you send messages or upload files to this server, these messages and files are stored encrypted. Journalists at The Intercept store the encryption keys on air-gapped computers that never connect to the Internet. Even if our SecureDrop server got hacked or the physical hardware got confiscated, the messages and files you have submitted previously should still be shielded from the attacker.

However, no system is 100% secure, so we cannot absolutely guarantee your security. SecureDrop is regularly audited by independent security experts, but like all software, it could have security bugs that could be exploited by attackers.

If the computer you are using to submit documents is already compromised, any activities, including communications through SecureDrop, could be compromised as well.

Ultimately, you use the service at your own risk.

1 comment to Whistle blowers: The Intercept is for you

  • perachtis

    The program suite mentioned above: Tails, can be installed on a flash drive, and used to boot a computer, and run a variety of included applications such as a browser, an email client, encryption apps, and other tools; all of which can be used in an anonymous manner, hiding your personal information behind a Tor internet client framework. Even if there were a “man-in-the-middle” between the computer you use and your intended recipient there is a very low probability your activity data could be successfully intercepted, or eavesdropped on, especially in real time.

    The URL link for the Tails download is: https://tails.boum.org/

    We recommend that you use a public hotspot to download the application.

Leave a Reply

You can use these HTML tags

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>




This site uses Akismet to reduce spam. Learn how your comment data is processed.