Skip to main content

Got a tip off?

Get in touch with Good Law Project securely.

Andrey Popov / Shutterstock

How to contact us securely

Good Law Project uses Secure Drop to allow you to send us information securely. 

SecureDrop servers are under the physical control of Good Law Project. SecureDrop does not record any information that could identify you, like your IP address, information about your browser, computer, or operating system. All Good Law Project will see is the information you send to us and a unique code name.
All material submitted through SecureDrop is automatically encrypted. Good Law Project will decrypt and read each message on a computer that has never and will never be connected to the internet.

What to do:

  • Before you begin, we strongly advise that you use a public WiFi network, like a cafe or public library, instead of your home or work network, which could be tied back to your identity. We also advise that you use your own device, rather than a work phone or laptop.
  • Download and install the Tor Browser from https://www.torproject.org. This will allow you to visit our SecureDrop page, which operates as a Tor “hidden service” and is not accessible via standard internet browsers.
  • To access our SecureDrop page, open the Tor Browser and copy and paste this into the address bar: q4hcmq2hecm27nsfnh2v566mgcludcfadzxgchpoqgvxomfcalqxafyd.onion
  • When the page loads, you will find further instructions on how to submit messages and documents to Good Law Project.
  • When you make your first submission, you will receive a unique codename. Remember this codename as it’s the only way you can make a further submission and see communication from Good Law Project.
  • If you would like to submit further information or read our response, follow the above instructions to access our SecureDrop page again and click on the “Log in” button, under “Return Visit”. Enter your codename. On the following page, you will be able to make a new submission and read our replies. We recommend deleting all replies once you have read them, to help protect your identity.
  • Always log out and close the Tor page once you have finished reading or submitting information, especially if using a public network or a device someone else could have access to.