ABOUT LEAKS

About leaks

About leaks

Blog Article

A group of paperwork that open up a corrupt multi-billion greenback war by Western and Chinese companies get uranium together with other mining legal rights while in the Central African Republic (Automobile) and escape purchasing the...

By giving your information, you agree to our Terms of Use and our Privacy Policy. We use vendors that might also system your facts to help provide our solutions.

A classified US navy video depicting the indiscriminate slaying of in excess of a dozen persons during the Iraqi suburb of latest Baghdad — together with two Reuters information team. 05 April 2010

, informing company staffers that “all communications outdoors the company” would want to be permitted by best officers — threatening “disciplinary action” versus any who did not comply.

If you do that and therefore are a higher-chance resource it is best to be certain there isn't any traces of your clean up-up, considering that such traces them selves may well attract suspicion.

In case you are a higher-hazard source, keep away from saying anything at all or executing everything following publishing which could market suspicion. Specifically, you should attempt to keep on with your usual regimen and conduct.

If the computer that you are uploading from could subsequently be audited within an investigation, think about using a computer that is not very easily tied to you. Specialized consumers could also use Tails to aid make sure you don't leave any records of one's submission on the pc.

Still, the weather of dread and rage that Trump and Musk have imposed all through the federal government has established mass confusion and an data clampdown that’s remaining several staffers at midnight about what their Work opportunities even are any more. 

It’s not however obvious whether or not the database is managed or owned straight by Mars Hydro and LG-LED Options, or whether this was operate via a third party contractor.

By way of example, leaks a musical album is leaked if it has been built available to the general public on the web in advance of its Formal launch day.

If You may use Tor, but should Call WikiLeaks for other reasons use our secured webchat accessible at

The hacker who got the leak also obtained the source code for Grand Theft Vehicle V, and introduced he will be marketing both equally. Shortly just after, he introduced the GTA VI supply code was now not for sale, but was even now selling the GTA V resource code. This has become considered a kind of blackmail.

In case you have an extremely large submission, or simply a submission with a posh structure, or really are a high-threat resource, be sure to contact us. Inside our experience it is often attainable to find a tailor made Remedy for even one of the most seemingly complicated predicaments.

If a lawful action is introduced from you because of your submission, you will discover organisations which could enable you to. The Courage Basis is a world organisation dedicated to the security of journalistic resources. You will find extra details at .

Report this page