"I want to publish information privately"

In 2021, a whistleblower named Frances Haugen leaked internal documents from Facebook, revealing how the company knowingly allowed misinformation and assisted in state-sponsored censorship. Known as the Facebook Files, this leak was notable in how successful it was in preventing retaliation before Haugen publicly identified herself. While not confirmed, she most likely shared documents with the Wall Street Journal through SecureDrop.

Her case is not unique. Whether you are a whistleblower, an investigative journalist, or an amateur blogger, the ability to publish safely is essential to a transparent society.

Why Publish Anonymously?

In some countries, simply speaking out can result in criminal charges or loss-of-life. Even in relatively “free” societies, publishing critical information can attract legal threats, online harassment, or unwanted media attention. For example, this hobbyist security researcher was sued for documenting a ransomware attack on his own blog!

Anonymity enables freedom of speech by separating your voice from your identity. It helps protect you from retaliation while keeping the focus on the message.

Best Practices

1. Use a Pseudonym

A pseudonym empowers you to maintain a consistent identity while separating your real-world persona from your published work. Choose a name (or Username) that has not been linked to you and use it exclusively for anonymous publishing.

Register new accounts and email addresses from devices and internet connections not associated with your identity. Avoid using the same writing style, login behavior, or online habits that could de-anonymize you. Remember that a pseudonym is only as strong as your ability to keep it separate.

In some cases, like in large newsrooms, you may need a public identity to establish credibility. If that is the case, shift your focus toward secure communication with confidential sources and protecting your operational security. Consider setting up a secure tipline instance for your organization.

2. Find a Platform

Where and how you publish matters. Here are a few options:

Create your Blog

Depending on your situation, you may be deciding between creating a website or using a third party platform like Substack or Medium. If you go with the former, Ghost is an excellent open-source alternative to Substack. You can also create your own website through services like Wix or SquareSpace if your threat model allows it.

You can also consider running a Tor hidden service for an informal blog. This gives you control over hosting and minimizes reliance on third-party platforms.

Use Alternative Social Media

Social networks can help you connect with a potential audience and gather feedback. Instead of X or Facebook, a decentralized and federated alternative like Mastodon can resist censorship from government actors.

Seek External Publishers

Many media outlets accept tips through a tipline, a system designed to receive anonymous submissions via Tor. This can be safer than publishing independently if you are sharing sensitive documents or exposing wrongdoing.

3. Compartmentalization

Compartmentalization involves isolating your publishing work from everything else. Whether you’re using a pseudonym or your real name, never mix your activities. Instead of using a personal laptop, purchase a dedicated laptop for your publishing work. When you decide to publish your final draft or upload your documents, do not log in from home or work networks. Instead, use an anonymous network like Tor over public wifi.

Furthermore, you should also install a anonymity or security-focused operatin system. When doing sensitive activities, boot from Tails OS, an amnesiac Linux distribution that leaves no trace. For high-security daily usage, Qubes OS lets you compartmentalize your personal and work tasks in isolated virtual machines called qubes. If one of these virtual machines becomes compromised, you can always dispose of them.

Do not reuse passwords, emails, or browsing habits across different identities. Each project or pseudonym should exist in its own bubble. Compartmentalization ensures that you can safely publish your work without endangering your safety.

Last edited by @jonah 2025-05-08T00:32:49Z

6 Likes

I will discuss some potential changes here instead of making an outright edit to get a consensus:

(1) I suggest the title to be changed to “I want to publish information anonymously” in order to be consistent with what PG has explicitly defined as anonymous and private. It seems that the guide is about ensuring no one knows who published the information rather than controlling who your audience is. The Getting Started wiki also already titles this guide as “I need to safely publish information anonymously”.

(2) I think preventing stylometry should be its own section. Its currently briefly mentioned here:

… but I think it’s important enough to branch off. It’s been used by the FBI before to track down the Unabomber, for example. If we are including high threat models that involve the necessary use of Tails or Qubes, stylometry would fall under that. This is especially important for people who have already published on the internet before (or anywhere else, really) under (a) their real identity or (b) a pseudonymous identity created under less strict conditions, making it more vulnerable to revealing.

This section would ideally (a) briefly explain what stylometry is, (b) explain the consequences for failing to prevent stylometry (e.g., having your real identity revealed or leaving breadcrumbs that allows people build stylometrics profile of you), and (c) list some tools that can help prevent stylometry.

(3) From how I interpret the way the pseudonym section is written, it seems to initially be about publishing information you already have and how to do so anonymously via pseudonyms. But then it transitions to being about publishing information from other people and how to gain credibility to garner trust from said people as a newsroom:

The section should be reworked so that the two scenarios are established clearly and distinctly from each other. The first scenario is about being the source while also being the publisher. But the second scenario is only about being the publisher it seems.

Or maybe “gaining credibility” should rather be its own section?

1 Like

This is getting much more important with the rise of LLMs and their capabilities. See this article below

which is discussed on this forum below

1 Like