Speak Up.
Stay Safe.

Have evidence, documents, or a story? Reach out directly or submit anonymously. Your identity is protected — your information isn't silenced.

Reach Sasha

For media inquiries, collaboration, legal referrals, or if you just want to talk.

Email

Direct line. Checked daily. Encrypted email welcome (PGP available on request).

sashajglenn@gmail.com
📱

Instagram

Follow the campaigns, share the evidence, amplify the signal.

@saveofh
🌐

SaveOFH.com

The original Save the Old Fire House campaign site — petitions, updates, community.

www.saveofh.com

Read This Before You Submit Anything

We want your information. We also want you safe. This form provides a layer of anonymity, but no website can guarantee absolute protection. Before you submit documents or identifying information, understand the risks.

The Reality Winner Case (2017) Reality Winner was an NSA contractor who leaked a classified document to a news outlet. She was identified and prosecuted — not because of a digital trail on the website she submitted to, but because of invisible tracking dots printed by her office printer that encoded the date, time, and printer serial number on every page. The publication she leaked to also contacted the source agency for comment before publishing, which narrowed the pool of possible leakers. She served over four years in federal prison.

The lesson: Digital anonymity is only one layer. Physical documents, metadata in files, workplace access logs, behavioral patterns, and the actions of the people you share information with can all be vectors for identification. Governments and corporations have extensive forensic capabilities.

1

This server has logs. Every web server records IP addresses and connection data. While we do not intentionally log anonymous submissions with identifying data, our hosting provider maintains infrastructure logs and will comply with valid legal process (subpoenas, court orders, national security letters). This is true of virtually all web hosting companies worldwide. We cannot prevent a third party with legal authority from requesting server records.

2

Use Tor or a trusted VPN. If you are submitting something sensitive, access this site through the Tor Browser or a reputable no-log VPN. This prevents your real IP address from appearing in any server log. Do not use your workplace network, your home WiFi without protection, or your personal phone's mobile data.

3

Strip metadata from files before uploading. Documents, photos, and PDFs often contain hidden metadata — author names, GPS coordinates, edit history, printer information, software versions. Use a metadata removal tool before uploading. On Windows: right-click → Properties → Details → "Remove Properties and Personal Information." On Mac/Linux: use exiftool -all= filename.

4

Don't photograph or scan documents at work. Printers, scanners, and copiers in government and corporate offices may log every use. Office cameras may record you. If you must photograph a document, use a personal device in a private location. Be aware that some documents contain invisible tracking features (microprinting, unique formatting variations, or steganographic watermarks) designed to identify the specific copy.

5

Don't tell anyone you submitted. The most common way whistleblowers are identified is not through technology — it's through human behavior. Don't discuss your submission with coworkers, friends, or family. Don't search for this site on work devices. Don't change your behavior at work after submitting.

6

Know your legal protections — and their limits. Federal and state whistleblower protection laws exist, but they are not automatic and they do not cover all situations. If you are considering leaking classified information, information protected by NDA, or information obtained through a security clearance, consult a lawyer first. Organizations like the National Whistleblower Center and the Government Accountability Project offer confidential legal guidance.

We built this form to make it as safe as we can. But "as safe as we can" is not the same as "safe."
If what you have could put you at serious risk, consider reaching out to an established whistleblower protection organization or a journalist with a SecureDrop instance before using any web form — including this one.

Submit a Tip or Document

Have evidence of corruption, documents the public should see, or information that needs to get out? Submit it here. You choose whether to include your identity or stay anonymous.

🛡
Read the safety disclaimer above before submitting. This form does not intentionally record your name or email when submitted anonymously. Uploaded files are stored on a secured server and are not publicly accessible. Only Sasha and the advocacy team review submissions. However, server infrastructure logs exist and may be subject to legal process. If your submission could put you at personal risk, use Tor and strip file metadata first.

PDF, images, audio, video, documents, spreadsheets, or ZIP files. Max 5 files, 50MB each.

What Happens After You Submit

1

Secure Receipt

Your submission is encrypted in transit (HTTPS) and stored on a secured server. Anonymous submissions have no IP or identity attached.

2

Review

Sasha and the team review every submission. Documents are verified and cross-referenced against existing evidence.

3

Action

Verified evidence is incorporated into campaigns, shared with legal counsel where appropriate, and published (with your consent if not anonymous) to hold the powerful accountable.

4

Follow-Up

If you included a reply email, we may reach out for clarification or to let you know the impact of your submission. We never share your contact with third parties.