Contact Digital Prison

Secure Communication Channels for Surveillance Awareness

In an age of unprecedented digital surveillance, secure communication is not just important—it's essential. Whether you're a researcher, journalist, whistleblower, or concerned citizen, we provide multiple channels for safe and anonymous contact.

⚠️ Security Notice: Use encrypted channels when sharing sensitive information about surveillance activities or personal experiences.

24/7
Monitoring Response
256-bit
Encryption Standard
Anonymous
Communication
Global
Network Coverage

Secure Contact Form

Your communications are protected with end-to-end encryption. Share sensitive information about surveillance activities safely.

Send Secure Message

Encrypted

All form data is encrypted before transmission and stored securely.

Use a secure email service like ProtonMail or Tutanota for maximum privacy

Minimum 10 characters 0 characters

Privacy & Security Notice

This form uses 256-bit SSL encryption. We never share personal information and maintain strict confidentiality protocols for whistleblowers and sensitive reports.

Response Time

General Inquiries 24-48 hours
Media Requests 12-24 hours
Security Concerns 2-6 hours
Urgent Whistleblower Immediate

Security Guidelines

Use secure networks (avoid public Wi-Fi)
Consider using Tor browser for anonymity
Use encrypted email services (ProtonMail, etc.)
Avoid including identifying information if anonymity is crucial

Emergency Protocols

For urgent security threats or whistleblower situations requiring immediate attention:

• Use "Urgent Security Matter" category above

• Include "URGENT" in subject line

• Consider using alternative encrypted channels below

Alternative Encrypted Channels

For maximum security and anonymity, consider these additional communication methods. Each offers different levels of protection and use cases.

Signal

End-to-End Encrypted Messaging

The gold standard for secure messaging, trusted by journalists, activists, and privacy advocates worldwide for sensitive communications.

Signal Protocol encryption (industry standard)
Disappearing messages (auto-delete)
No metadata collection or storage

How to Connect via Signal:

1.
Download Signal from the official website
2. Set up Signal with your phone number
3. Send initial contact request via our secure form
4. We'll provide our Signal contact details securely

Signal Contact Process:

For security reasons, our Signal contact information is provided only after initial verification through our secure contact form above.

Request Signal Contact:

Use our secure contact form and mention "Signal contact request" in your message. We'll respond with our Signal details within 12-24 hours.

Security Best Practices:

  • • Enable disappearing messages for sensitive conversations
  • • Verify safety numbers before sharing sensitive information
  • • Use a dedicated device/number for high-security communications
  • • Never screenshot or forward sensitive Signal messages

Response Times:

General inquiries: 12-24 hours
Urgent security matters: 2-6 hours
Whistleblower communications: Priority response

ProtonMail

Encrypted Email Communication

Swiss-based encrypted email service offering zero-access encryption, perfect for secure surveillance research communications.

Zero-access encryption (end-to-end)
Swiss privacy laws protection
No IP logging or metadata storage

Secure Email Addresses:

General Inquiries:

[email protected]

Research & Media:

[email protected]

Whistleblower Tips:

[email protected]

PGP Encryption Available:

For maximum security, request our PGP public keys for additional encryption layer.

PGP keys provided upon request

How to Contact via ProtonMail:

  • • Use any of the addresses above based on your inquiry type
  • • Subject line should clearly indicate the nature of your message
  • • For sensitive information, request PGP keys first
  • • Response time: 12-48 hours depending on priority

Tor Browser Access

Anonymous Web Browsing

Access our website anonymously through the Tor network for complete privacy and IP protection.

Complete IP anonymization
Multi-layer traffic encryption
Bypass censorship and monitoring

How to Access via Tor:

1.
Download Tor Browser from the official site
2. Install and launch Tor Browser
3. Visit our regular website URL in Tor Browser
4. Your traffic will be automatically anonymized

Current Access Method:

Access digitalprison.com through Tor Browser for anonymous browsing. We're working on setting up a dedicated .onion mirror for enhanced security.

.onion Mirror: Coming Soon

Security Tips:

  • • Never download files or enable JavaScript in Tor
  • • Don't log into personal accounts while using Tor
  • • Always use HTTPS websites (like ours)
  • • Consider using Tails OS for maximum security

Session

Onion Routing Messenger

Decentralized messenger using onion routing for maximum anonymity.

No phone number required
Onion routing network
Metadata-resistant

Session ID:

05a7f2d9e8c4b1a6...

Full ID shared upon verification

Element

Matrix Protocol Chat

Decentralized, encrypted communication using the Matrix protocol.

Federated network
End-to-end encryption
Open source protocol

Matrix Room:

#digitalprison:matrix.org

Public room for general discussion

SecureDrop

Anonymous Document Sharing

The industry standard for secure, anonymous document sharing used by major news organizations worldwide.

No user identification required
Tor-only access for anonymity
End-to-end document encryption

Setting Up SecureDrop:

Digital Prison is currently setting up our SecureDrop instance. For immediate secure document sharing, please use:

Alternative for Immediate Use:

For urgent document sharing, consider using our encrypted contact form above or ProtonMail with PGP encryption.

Security Level Comparison

Method Anonymity Encryption Metadata Protection Best For
Contact Form
General inquiries
Signal
Real-time chat
Session + Tor
Maximum anonymity
SecureDrop
Whistleblowing

Critical Security Reminder

Your safety is paramount. If you're reporting surveillance activities or sharing sensitive information, always assume your regular communications may be monitored. Use the highest security methods available to you.

⚠️ Never use for sensitive content:

  • • Regular email or SMS
  • • Social media direct messages
  • • Unencrypted messaging apps
  • • Phone calls on regular networks

✅ Recommended for high security:

  • • Tor + Session/Element combination
  • • SecureDrop for documents
  • • Signal with disappearing messages
  • • ProtonMail with PGP encryption