Submit evidence securely
If you have evidence, testimony, or supporting material about wrongdoing, you can submit it here. No account required. No email. No tracking.
Why this exists
Rogue Machine built this portal for people who have something real to say, but good reason to be careful about how they say it. Too many systems that ask for testimony are built around convenience for the publisher, not safety for the source.
This intake was designed around a simple principle: collect less, expose less, and protect sources through architecture — not promises. We are here to surface evidence and testimony that would otherwise stay buried, and to do it in a way that respects the reality sources live in.
Before you begin
- Take your time. Clear, specific information helps more than a huge data dump. Be factual. Be dated. Be honest about what you know directly versus what you suspect.
- Save your receipt. You will get a handle and a secret. That is your only key to check back later. We cannot recover it for you. There is no password reset. There is no support desk.
- If anonymity matters, use Tor on a personal device you trust. Do not use a work device, school device, or monitored network if you can avoid it. This portal works without JavaScript.
What is Tor, and how do I use it?
Tor is free software that routes your internet connection through multiple servers, making it extremely difficult to trace your activity back to you.
You can download Tor Browser here. Tor Browser is available for Windows, Mac, Linux, and Android.
You don't need to install anything special — just download Tor Browser and use it to visit this page.
How it works
- Start a secure draft Choose how you want to submit (anonymous, pseudonymous, or attributed) and what kind of material you're sending. That's all we ask up front.
- Add your narrative and files Write what happened. Upload supporting documents, images, or media. You can save your draft as you go. Files go into quarantine first — they're treated as untrusted on arrival.
- Save your receipt and finalize When you're ready, finalize your submission and save the credentials shown on screen. Write them down and store them offline.
- Check back later Return to the mailbox page and enter your handle and secret to see where your submission is in the process.
Start your submission
Using Tor? Keep the same Tor circuit for the full submission flow so the session cookie stays aligned.
How we protect you
We collect less
- No account required
- No email required
- No IP address kept as part of your submission record
- No browser fingerprinting
- No user-agent logging for profiling
- No referrer tracking
- No JavaScript required
The less we collect, the less there is to expose later.
We protect what you send
- Files are quarantined on arrival and treated as untrusted
- Metadata is stripped — safer review copies are created before anyone sees them
- Original uploads are sealed for evidentiary integrity
- Handling is recorded in a tamper-evident audit trail
- Protected material requires 2-of-2 key custody — no single person can access it alone
What this does not protect against
We want to be honest about the limits. No system can make you completely anonymous.
- If you submit from a monitored device or network, we cannot hide that connection
- If your files or writing identify you on their own, metadata stripping won't change that
- If your device is already compromised, portal-side protections cannot fully protect you
- Tor improves anonymity, but no tool can guarantee perfect protection against every adversary
This portal is built to reduce exposure, not to make reality disappear.
How it works technically
No account, low-identification workflow
The system does not rely on account creation, email verification, third-party CAPTCHA providers, ad-tech trackers, or browser fingerprinting. The reply path is handled through an anonymous receipt: a handle and a secret. The server stores a verifier for that receipt, not a recoverable copy of the secret. That is why the secret cannot be reset or retrieved later.
Intake pipeline
Submissions move through staged handling:
- Quarantine — uploaded files are isolated and checked as untrusted input
- Sanitization — safer review copies are created with metadata and risky embedded content stripped
- Moderation — human triage determines whether material is in scope and safe to route onward
- Editorial review — deeper review, corroboration, and possible investigative use
Raw originals are sealed for evidentiary integrity and are not the default review surface.
Privacy and traffic-analysis protections
- No IP retention in the submission record
- No user-agent tracking for identity correlation
- No referrer logging as part of intake
- Tor-compatible access
- No JavaScript requirement
- Mailbox checks designed with normalized timing so response time does not reveal whether a mailbox exists
Integrity and access control
The system maintains a tamper-evident audit trail using HMAC-chained records so unauthorized changes become detectable. Protected access uses split custody: two authorized custodians must both participate. A solo editor key can be used for tightly limited single-record access when necessary.
File handling
Standard browser multipart upload works without JavaScript. Files are accepted into quarantine-first handling. Accepted formats: PDF, JPEG, PNG, GIF, WebP, and plain text. Active-content-heavy formats are likely to be rejected. Max 5 attachments per submission, 10 MB per file.