THE CROWD SOURCED NETWORK THAT MOTIVATES ENTERPRISES INTO TAKING RESPONSABILITY

 

ANONYMOUS COMMUNICATIONS


- WE KEEP NO ACTIVITY LOGS


- EMAILS ARE REMOVED FROM THE SERVER AS THEY ARRIVE


This being said, this does not mean that our hosting provider or someone intercepting trafic cannot deduce elements that you may wish to have remain confidential.


.


Here are TWO (2) golden rules to help protect your confidentiality:


RULE 1:  Install the latest TOR package and use TOR for all activities.


You can download the TOR software (which includes an anonymous browser) from HERE.



RULE 2: Create a GMAIL or other web based mail account from your TOR browser to use STRICKLY for communicating with us.  Ensure nothing you provide during the account creation process can be linked back to you.


When writing us, it is best to not include any media files, just plain text.  If you know how to remove identifying information from digital files that is ok, but if you are uncertain it is best to avoid it.  Documents and images can contain metadata which could expose you.



NOTE:  If these steps are not followed, your case may not be reviewed


Send your case to this email address :

Your email must include the following details:


BREACH RESULTS - What would exploiting this issue give as a result, explain why this is considered a significant security issue.


TECHNICAL DETAILS - Provide all the technical details to reproduce the issue so our analysts can determine the validity of the claim and provide clear insight to the target company if we initiate contact.