The Transparency Files Epstein Files Investigations
The Transparency Files — document collage with redacted government files

Contact

Secure channels for sending materials


If you have not already read our guide for whistleblowers, do so first. Protecting your identity comes before contacting us.

Two channels are available. Use the one that matches your threat level.


ProtonMail — Encrypted email

Good

Best for: Sending documents, detailed written accounts, initial contact, ongoing correspondence.

Address: transparencyfiles@proton.me

How to use it:

  1. Create a new ProtonMail account at proton.me — use Tor Browser, do not use your real name
  2. Do not link it to any existing email address or phone number
  3. Compose your message and attach stripped files
  4. ProtonMail-to-ProtonMail messages are end-to-end encrypted automatically
  5. For extra security, encrypt your attachments with our PGP public key before sending

PGP Public Key:

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=ANf9
-----END PGP PUBLIC KEY BLOCK-----

Fingerprint: 143B F191 BFC5 292D 28B7 228B B2C8 7FD7 34C5 0A2E

Limitations: ProtonMail requires an account (even anonymous). Email metadata (sender address, timestamps, subject lines) is visible to ProtonMail’s servers. Use generic subject lines.


OnionShare — Maximum security for large drops

Best

Best for: Large file collections, maximum anonymity, situations where even email metadata is too risky.

How it works: OnionShare creates a temporary .onion address (only accessible via Tor) that lets you upload files directly to our machine. No accounts, no metadata, no intermediary servers.

How to use it:

  1. Contact us first via ProtonMail to arrange a transfer window — the .onion address is not active 24/7
  2. We will reply with a one-time .onion receive address
  3. Download and install Tor Browser from torproject.org
  4. Open Tor Browser and paste the .onion address we gave you
  5. Select your files and click upload — they transfer directly to us over Tor
  6. Once the transfer completes, close the browser. The address expires after use.

Limitations: Requires Tor Browser. Large uploads over Tor can be slow. The .onion address is generated fresh for each transfer — contact us by email first.


What Happens After You Send

  • We verify the materials independently against the existing corpus of 1.38 million EFTA documents
  • We do not publish anything that could identify you without your explicit written consent
  • We do not share materials with law enforcement, other journalists, or anyone else without your approval
  • If the materials warrant publication, we will contact you (through the same secure channel) before publishing
  • You can withdraw consent at any time before publication

This page does not use tracking, cookies, or analytics beyond privacy-respecting page view counts. Your visit here is not logged or associated with any identity.