PGP Fingerprint: AE6F E153 58CA 6443 9E2C A9A4 B505 5207 32AC 63AF
Signal fingerprint: 05 6d 1b 54 20 6f bd c9 75 27 a9 68 89 bb 2c 1f 60 3a b9 9c 9b 99 fe ce f9 2c f1 93 9a 91 8a 04 30.
If you are planning on disclosing tips or leads for investigative reporting projects I’m working on and believe that you may be at risk if the information is somehow traced back to you, I encourage you to consider the implications before doing so.
I will challenge any subpoenas or attempts by either government agencies or private sector organizations to gain access to any information I obtain, and will attempt to provide notice (unless legally prohibited from doing so) if legally required to disclose information, in order to give you an opportunity to object to the disclosure.
However, please be aware that there are numerous ways to trace individuals to social media and email accounts (even pseudonymous ones), that secure messaging tools typically allow any user to see who else in their phone’s contact list has downloaded the tool, and that even encrypted communications typically leak metadata (e.g. who you emailed, when, and with what subject line…or who you called, when, and how long you spoke).
For more information on secure, private communications, and on threat modeling, please see Access Tech and Electronic Frontier Foundation’s Surveillance Self-Defense Project. I have listed ways to contact me with a variety of tools (OnionShare, Signal, Ricochet, PGP) depending on what makes sense for your situation.