Share a Confidential Tip
Do you have information, documents, or a story that needs to see the light of day? Help us uncover what's hidden. Your anonymity and security are our highest priority.
Our Pledge to Sources
Truth Sider is built on the pursuit of truth. We understand that this often requires courage from individuals who are willing to share sensitive information. We are deeply committed to protecting our sources. We will defend your anonymity and handle your information with the utmost care and security. Our commitment to you is the cornerstone of our work.
What Makes a Good Tip?
While we welcome all information, the most useful tips are specific and supported by evidence. Consider the following:
- Evidence is Key: Is there documentation, data, photos, videos, or other materials to support your claim? Evidence is crucial for verification.
- Be Specific: Include names, dates, locations, and a clear description of the events. The more detail, the better.
- Explain the Importance: Why does this story matter? What is the impact on the public, an organization, or individuals?
How to Contact Us Securely
Choose the method that best suits your security needs. Never use a work computer or network to send sensitive information.
Standard Email
LOWER SECURITYFor general story ideas or tips that do not require high security. Please be aware that standard email is not end-to-end encrypted and can be monitored by third parties.
Email: truthsider@gmail.com
Encrypted Email (PGP)
HIGHER SECURITYFor sensitive information, we strongly recommend using an encrypted email service like ProtonMail or Tutanota, or by using PGP encryption with your own email client. This provides end-to-end encryption, meaning only we can read your message.
Our Encrypted Email: pgp@truthsider.blog
You can import our PGP public key to encrypt your message. Download our key here or copy the block below:
What Happens Next?
After you send a tip, our process is as follows:
- Review: A small, dedicated team will review your submission. We do not acknowledge receipt of all tips to protect source anonymity.
- Vetting & Verification: If the tip is credible and falls within our scope, we will begin the rigorous process of verification using independent sources and methods.
- Investigation: This can be a lengthy process. We will only contact you if it is safe to do so and if you have provided a secure method of contact.
- Publication is Not Guaranteed: We only publish stories that meet our high standards of verification and public interest.