3. Request Confidentiality: If you would like us to consider treating your submission as confidential before providing any materials, please make this request through this online submission form. Please note that until we mutually decide to enter into a confidential relationship, any information you send to us (including contact information) can be used for any purpose, as outlined in point 1 above, and described more fully below in the Limitations section). If we enter into a confidential relationship, Dow Jones will take all available measures to protect your identity while remaining in compliance with all applicable laws.
2.3 Protection for you
Wikileaks does not record any source-identifying information and there are a number of mechanisms in place to protect even the most sensitive submitted documents from being sourced. We do not keep any logs. We can not comply with requests for information on sources because we simply do not have the information to begin with. Similarly we can not see your real identity in any anonymised chat sessions with us. Our only knowledge of you as a source is if you provide a coded name to us. A lot of careful thought by world experts in security technologies has gone into the design of these systems to provide the maximum protection to you. Wikileaks has never revealed a source.
You agree that by accessing this site, you are bound by this Agreement ("Agreement")".
You agree not to use SafeHouse for any unlawful purpose. We reserve the right to restrict your use of SafeHouse if, in our opinion, your use may violate laws, regulations or rulings, infringe upon another person's rights, or violate the terms of this Agreement.
« Older Calculus Rhapsody... | The Sharing Economy... Newer »
This thread has been archived and is closed to new comments
Buy a Shirt