Secure Anonymous Submission
Your identity protected. Your submission encrypted. Your courage honored. We CANNOT identify you, even if we wanted to.
100% Anonymous by Design
When using our Tor submission portal, we CANNOT identify you:
- No IP address collection (routed through Tor network)
- No cookies, no tracking, no analytics
- Server hosted in Iceland (strongest privacy laws in the world)
- End-to-end encryption
- We never ask for your name, email, or phone number
Even under legal subpoena, we have no information to provide about your identity.
If using Email or Telegram:
- Do not use your real name in messages or as your account name
- Create a new anonymous account specifically for submitting tips
- Cleanse all documents before sending—remove metadata, author names, and any embedded contact information
- Avoid identifying details in your writing style or specific knowledge that only you would have
Email and Telegram offer encryption but may expose metadata. For maximum anonymity, use our Tor secure submission portal.
How to Submit Anonymously
Disclaimer: Submitting a report does not create an attorney–client relationship. This platform does not provide legal advice or legal representation. If you need legal counsel, please consult a licensed Nevada attorney.
Step 1: Download Tor Browser
Tor Browser routes your internet connection through multiple encrypted relays, making it impossible to trace your identity or location.
Download Instructions:
- Go to https://www.torproject.org/download/
- Download Tor Browser for your operating system (Windows, Mac, or Linux)
- Install and launch Tor Browser
- Wait for the "Connected to Tor Network" confirmation message
Important: Only download Tor from the official site (torproject.org). Do not use fake Tor sites.
What is Tor? Tor (The Onion Router) is free software used by journalists, activists, and whistleblowers worldwide to protect their anonymity. It's developed by the Tor Project, a nonprofit organization.
Step 2: Access Our Secure Submission Form
Once Tor Browser is running, use it to access our hidden service (.onion address). This address only works in Tor Browser - it will not work in Chrome, Firefox, or Safari.
Our Tor Hidden Service Address:
How to access:
- Copy the .onion address above
- Open Tor Browser
- Paste the address into the Tor Browser address bar
- Press Enter
Why .onion addresses are secure:
- Traffic never leaves the Tor network (no exit nodes)
- End-to-end encrypted between your browser and our server
- Cannot be traced back to your computer
- Server location hidden (hosted in Iceland)
Step 3: Submit Your Information
Once you access our .onion address, you'll see a simple submission form. You can submit:
- Text information: Describe what you witnessed (who, what, when, where, why)
- File uploads: Documents, photos, videos, audio recordings, emails, spreadsheets
- Both: Text + file attachments
What to include in your submission:
- Specific details: Dates, times, names, locations
- Evidence: Documents, photos, recordings that support your claims
- Context: Why this is illegal, wasteful, or dangerous
- Impact: Who is harmed? How much taxpayer money is wasted?
Before you submit:
- Remove metadata from photos: Right-click > Properties > Details > "Remove Properties and Personal Information"
- Don't include your name or identifying details unless you want to (we recommend staying anonymous)
- Use common file formats: PDF, JPG, PNG, MP3, MP4, DOCX, XLSX
Step 4: What Happens Next?
After you submit, here's what we do:
- We review your submission: Our team verifies the information and gathers additional evidence
- We investigate: We may cross-reference public records, FOIA requests, or other sources
- We publish: If verified, we publish findings publicly on our website
- We forward to authorities: We share findings with law enforcement, Attorney General, or media
- We protect your identity: We never reveal our sources, even under legal pressure
Your safety is our priority:
If you submitted anonymously via Tor, there is no way for us or anyone else to identify you. Even if government agencies subpoena our records, we have no IP addresses, no cookies, no tracking data - nothing that could lead back to you.
How long does it take?
Investigation and verification can take days to months, depending on complexity. We prioritize cases involving active harm, large-scale fraud, or imminent danger to public safety.
Alternative Submission Methods
If you're unable to use Tor, you have other options (though they're less secure).
Secure Drop
Our encrypted Tor submission portal provides the highest level of anonymity. No IP logging, no tracking, no metadata stored.
Send tips directly to [email protected]. Use a secure email provider (ex. Proton Mail) for added protection and privacy.
Telegram
Message us at @NVWhistleblowersBot. End-to-end encrypted messaging for quick, secure tips.
Warning: Regular email, social media DMs, and phone calls are NOT secure. They can be intercepted, subpoenaed, or traced back to you. Use Tor for maximum protection.
Your Courage Protects Nevada
Every major corruption scandal in history started with one person who decided to speak up. That person could be you. Your anonymity is protected by technology, math, and international law. The corrupt can't touch you if they can't find you.
When you submit via Tor, you are untraceable, unidentifiable, and unstoppable.
Ready to Protect Nevada?
Download Tor Browser and submit your information securely.
Download Tor Browser