WikiLeaks Submission Platform

WikiLeaks Submission Platform

Wednesday 6 January 2016 > français

WikiLeaks accepts classified, censored or otherwise restricted material of political, diplomatic or ethical significance. WikiLeaks does not accept rumor, opinion or other kinds of first hand reporting or material that is already publicly available.

All staff who deal with sources are accredited journalists.

All submissions establish a journalist-source relationship. Online submissions are routed via Sweden and Belgium which have first rate journalist-source shield laws. In Sweden, not only does the law provide protection against any official inquiry into journalists’ sources, but it allows a source whose identity has been revealed without permission to initiate criminal prosecutions against an unfaithful journalist who has breached his or her promise of confidentiality.

WikiLeaks records no source identifying information and there are a number of submission mechanisms available to deal with even the most sensitive national security information.

WikiLeaks has a history breaking major stories in every major media outlet and robustly protecting sources and press freedoms. No source has ever been exposed and no material has ever been censored. Since formation in early 2007, WikiLeaks has been victorious over every legal (and illegal) attack, including those from the Pentagon, the Chinese Public Security Bureau, the Former president of Kenya, the Premier of Bermuda, Scientology, the Catholic & Mormon Church, the largest Swiss private bank, and Russian companies. WikiLeaks has released more classified intelligence documents than the rest of the world press combined.

Tor, or The Onion Router, is a cryptographic technique

First implemented by US Navy research to permit intelligence agents to use the Internet without being traced, by encrypting and routing communications through many different Internet servers. Subsequently, Tor has been developed by the US university MIT and by the California Internet rights watchdog the Electronic Frontier Foundation and subsequently incorporated into WikiLeaks.

Using our anonymous access package you can prevent Internet spies knowing that your computer has connected to Wikileaks.

Without Tor, when you access a WikiLeaks site the usual way, e.g via wikileaks.org all your data is encrypted, but internet spies maybe able note how long your computer spent talking to WikiLeaks servers.

WikiLeaks Tor uses fully encrypted end-to-end anonymous connections. Accidental misconfiguration is impossible and at no stage does your communication leave the encrypted network. The cost of this anonymity is speed, with page loads taking on average 15 seconds but sometimes as many as 60. File uploads to our servers tend to happen at 5 to 30 kilobytes per second.


Anonymous Shop

One-of-a-Kind Products. Unique designs on trendy gear you simply can’t get anywhere else. Powered by Pros. Spreadshirt prints and ships your order fast and on-demand.

NordVPN, shield your browsing from hackers and surveillance.

Protect all your devices.

2-Year Plan | Discount -72%
Anonymous Shop

One-of-a-Kind Products. Unique designs on trendy gear you simply can’t get anywhere else. Powered by Pros. Spreadshirt prints and ships your order fast and on-demand.

NordVPN, shield your browsing from hackers and surveillance.

Protect all your devices.

2-Year Plan | Discount -72%
Jailed Turkish novelist Asli Erdogan

Jailed Turkish novelist Asli Erdogan

Dear friends, colleagues, journalists and members of the press, I am writing this letter to you from Bakirkoy Prison, the day after (...)


My story about Anonymous, LulzSec and AntiSec

My story about Anonymous, LulzSec and AntiSec

On the 6th of March 2012 I got a knock on my door, when I looked out the window I saw a distressed activist friend of mine known as joepie91 (...)


The Circle Of HOPE - A Hacker's Dozen

The Circle Of HOPE - A Hacker’s Dozen

Hacking Extradition: Fighting the Long Arm of U.S. Law (July 20th-22nd New York City). Speakers: Nathan Fuller, Grace North, Lauri Love, Barrett (...)


The "Snowden Treaty" - Protection of Whistleblowers

The "Snowden Treaty" - Protection of Whistleblowers

You can protect whistleblowers and stop mass surveillance. The ’Snowden Treaty’ - A new International Treaty on the Right to Privacy, Protection (...)


Paris, we love you

Paris, we love you

France embodies everything religious zealots everywhere hate. Enjoyment of life here on earth in a myriad little ways: A fragrant cup of (...)


Vault 7 - CIA Hacking Tools Revealed

Vault 7 - CIA Hacking Tools Revealed

WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever (...)


WikiLeaks

Submit documents to WikiLeaks

WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed.


/e/ Foundation
eFoundation is a non-profit organization leading the development of Open Source mobile operating systems that respect users’ data privacy.

Tor Browser
Tor Browser
Tor protects your privacy

NordVPN
Protect all your devices.
2-Year Plan | Discount -72%