Sources submitting documents or messages to SecureDrop, and the journalists viewing this correspondence, must connect to the respective Source or Document Interface using the Tor network, free software that makes users' internet activity much more difficult to trace. The easiest and most secure way to use Tor is to download the Tor Browser Bundle from https://www.torproject.org/. This bundle installs the Tor browser, as well as an application that is used to connect to the Tor network.
The Tor Browser can be used to access Tor hidden service URLs, which have domain names that end in ".onion". Media organizations will provide links to the .onion URLs of their SecureDrop pages, and each journalist that uses SecureDrop connects to the service with his or her own personal .onion URL.
Open the Tor Browser and navigate to the .onion hidden service URL provided by the media organization whose SecureDrop page you would like to visit. The page should look similar to the screenshot below. If this is the first time you're using the Tor browser, it's likely that you have Javascript enabled. If you do, you will see the red warning below which will explainin that this is a security risk. If you don't have Javascript enabled, you can skip the next step.
Click the 'click here' link on the Javascript warning and a message will pop up telling you how to disable Javascript. Once you follow the instructions, refresh the page.
The page should now look similar to the screenshot below. If this is the first time you are using SecureDrop, click the "Submit Documents" button.
You should now see a screen that shows the unique code name that SecureDrop has generated for you. In the example screenshot below the codename is bough fisk jed sold essen nail 1 prissy
, but yours will be different. It is extremely important that you both remember this code and keep it secret. Memorize the code or write it down and keep it in a safe place, but do not save it on your computer. After submitting documents, you will need to provide this code to log back in and check for responses.
SecureDrop allows you to choose the length of your code name, in case you want to create a longer code name for extra security. Once you have generated a code name and put it somewhere safe, click Continue.
You will next be brought to the submission interface, where you may upload a document, enter a message to send to journalists, or both. You can only submit one document at a time, so you may want to combine several files into a zip archive if necessary. When your submission is ready, click Submit.
After clicking Submit, a confirmation page should appear, showing that your message and/or documents have been sent successfully. On this page you can make another submission or view responses to your previous messages.
If you have already submitted a document and would like to check for responses, click the "Check for a Response" button on the media organizations' SecureDrop homepage.
The next page will ask for your secret code name; enter it and click Continue.
If a journalist wishes to reply to you, they will flag your message on their end and you will see the following message below. They can't reply to you until you've seen this message for security reasons. This will only happen the first time a journalist replies and with subsequent replies you will skip this step.
Click refresh or log in again. If a journalist has responded, his or her message will appear on the next page. This page also allows you to upload another document or send another message to the journalist. Be sure to delete any messages here before navigating away.
After you delete the message from the journalist, make sure you see the below message.
Repeat to continue communicating with the journalist.
Each journalist has their own authenticated Tor hidden service URL. The journalist needs to use the Tor Browser that has been configured for their use only.
Start by opening Tor Browser and loading the .onion URL to access the document interface of the App Server
. If any sources have uploaded documents or sent you message, they will be listed on the homepage by a code name. Note: The code name the journalists see is different than the code name that sources see.
Click on the code name to see the page specifically for that source. You will see all of the messages that they have written and documents that they have uploaded. Documents and messages are encrypted to the application's PGP public key. In order to read the messages or look at the documents you will need to transfer them to the Secure Viewing Station
. But first, if you'd like to reply to the source, click the 'flag this source for reply' button.
After clicking the 'flag this source for reply button,' you'll see this confirmation page. Click through to get back to the page that displays that souce's documents and replies.
Note: You will not be able to reply until after the source logs in again and sees that you would like to talk to him or her. So you may have to sit and wait.
But after the source sees that you'd like to reply, a GPG key pair will automatically be generated and you can log back in and send a reply back.
Once your reply has been submitted, you will see this confirmation page.
Rinse and repeat.
The first step is downloading the documents. Click on a document or message name to save it. In order to protect you from malware, Tor Browser pops up a notice that looks like this every time you try to download a file that can't be opened in Tor Browser itself:
Go ahead and click Launch application
anyway, and save the document to a USB stick.
Boot up the Secure Viewing Station
to Tails and mount the persistent volume. Once you have logged in, plug in the USB stick that you copied encrypted documents to it.
Copy these documents to the Persistent folder before decrypting them. This an important step. Otherwise you might accidentally decrypt the documents on the USB stick, and they could be recoverable in the future.
To decrypt documents, double-click on them. It will prompt you for the application PGP key passphrase to decrypt the document.
When you decrypt the file it will have the same filename, but without the .gpg at the end.
You can double-click on the decrypted document to open it in it's default application.
If you the default application doesn't work, you can right-click on the document and choose "Open with Other Application..." to try opening the document with OpenOffice Writer, or Document Viewer. You can right-click on a file and choose "Rename..." to rename a document and give it a file extension.
As long as you're using the latest version of Tails, you should be able to open any document that gets submitted to you without the risk of malicious documents compromising the Viewing Station
. However, if they do compromise it, Tails is designed so that the next time you reboot the malware will be gone.
Tails comes with lots of applications that will help you securely work with documents, including an office suite, graphics tools, desktop publishing tools, audio tools, and printing and scanning tools. For more information, visit Work on sensitive documents on the Tails website.
Tails also comes with the Metadata Anonymization Toolkit (MAT) that is used to help strip metadata from a variety of types of files, including png, jpg, OpenOffice/LibreOffice documents, Microsoft Office documents, pdf, tar, tar.bz2, tar.gz, zip, mp3, mp2, mp1, mpa, ogg, and flac. You can open MAT by click Applications in the top left corner, Accessories, Metadata Anonymisation Toolkit.
We recommend that you do as much work as you can inside of Tails before copying these documents back to your Journalist Workstation
, including stripping metadata with MAT.
When you no longer need documents you can right-click on them and choose Wipe to delete them.
Before you move documents back to the USB stick to copy them to your workstation you should encrypt them to your personal PGP public key that you imported when setting up the Secure Viewing Station
to begin with.
Right-click on the document you want to encrypt and choose "Encrypt..."
Then choose the public keys of the journalist you want to encrypt the documents to and click OK.
When you are done you will have another document with the same filename but ending in .pgp that is encrypted to the PGP keys you selected. You can copy the encrypted documents to the USB stick to transfer them to your workstation.
Plug the USB stick into your workstation computer and copy the encrypted documents to it. Decrypt them with gnupg
.
Write articles and blog posts, edit video and audio, and publish. Expose crimes and corruption, and change the world.