🚨 TRAINING SIMULATION - FICTIONAL CONTENT FOR EDUCATIONAL PURPOSES ONLY 🚨

📡 Secure Contact

Protecting sources. Securing communications.

🔒 Security First

We are a target for corporate legal action and potential law enforcement. Our sources face even greater risks. We take security seriously because lives, careers, and legal freedom depend on it.

Never contact us through insecure channels. Never use work devices or networks. Never trust that standard email is private.

If you're a whistleblower or have sensitive information, follow the security guidelines below exactly. If you're reaching out for other reasons, still use secure methods - it protects both you and us.

🛡️ For Whistleblowers: Maximum Security Contact

If you have internal information about corporate greenwashing, environmental fraud, or related crimes, use these methods to contact us safely.

⚠️ DO NOT:

Use company email, phone, or devices. Use company networks or WiFi. Take documents off-site without understanding risks. Contact us from identifiable accounts. Leave digital trails linking you to us. Trust anyone in your organization until information is safely shared.

Method 1: Tor-Based Secure Drop (Most Secure)

Access Instructions:

Download Tor Browser from torproject.org using a personal device on a public network (coffee shop, library, etc.). Never use work network.

Our SecureDrop address (this is a placeholder for training purposes):

greentruthabcdef123456789xyz.onion (TRAINING ONLY - NOT REAL)

SecureDrop allows anonymous document and message submission. No accounts. No tracking. No logs. This is the safest method for sharing large document collections or detailed information.

Method 2: PGP Encrypted Email

Setup Instructions:

Create a new email account using a privacy-focused provider like ProtonMail or Tutanota. Never use your real name or identifying information. Access only from non-work devices on public networks.

Download our PGP public key and encrypt all messages before sending. Send encrypted messages to:

secure@greentruthcollective.org (TRAINING ONLY - NOT REAL)

Our PGP key fingerprint (placeholder for training):

1234 5678 90AB CDEF 1234 5678 90AB CDEF 1234 5678 (TRAINING ONLY - NOT REAL)

Method 3: Signal Messenger

Setup Requirements:

Install Signal on a personal device (never work phone). Use a prepaid SIM card or Google Voice number not connected to your identity. Enable disappearing messages (recommend 1 week). Verify safety numbers before sharing sensitive information.

Our Signal contact (placeholder for training):

+31-6-123-45678 (TRAINING ONLY - NOT REAL)

Signal provides end-to-end encryption but requires phone numbers. Use anonymous numbers and enable all security features.

What to Share:

Tell us about yourself only if necessary (industry, role level, timeframe at company). Describe what evidence you have access to. Explain why you believe your company is engaged in greenwashing or environmental fraud. Share documentation if you have it safely collected.

We will guide you through safe documentation collection if needed. We verify all information independently - you don't need to risk yourself proving authenticity.

🤝 For General Collaboration

If you want to join our research team, contribute skills, or discuss collaboration (not whistleblowing), you can use these methods.

Encrypted Email

Send PGP-encrypted email to our general contact: collaboration@greentruthcollective.org (TRAINING ONLY)

Include: Your skills or expertise, how you want to contribute, your availability, and how we should contact you securely for follow-up.

Matrix/Element Chat

Join our Matrix server for team communications. Matrix provides encrypted group chat suitable for coordinating research, analysis, and operations.

@greentruth:matrix.org (TRAINING ONLY - NOT REAL)

📰 For Media & Journalists

If you're a journalist wanting to cover our exposures or request interviews, contact us through encrypted channels above. We're happy to provide additional documentation, connect you with experts, or arrange interviews (usually anonymous).

We strongly encourage investigative journalists to independently verify our evidence and conduct their own reporting. We provide source materials to facilitate this.

❓ Frequently Asked Questions

Will you protect my identity?

Absolutely. We never reveal sources unless you explicitly authorize it. We use multiple security layers to ensure whistleblower anonymity. Your identity is more important than any single exposure.

What if I'm already under suspicion?

Stop all contact immediately. Secure any evidence you have. Consult a lawyer familiar with whistleblower protections in your jurisdiction. We can recommend legal resources through secure channels if you've already contacted us.

Can you guarantee I won't face consequences?

No one can guarantee that, but we take every possible precaution. Most successful whistleblower exposures never lead to source identification. We provide guidance on operational security, legal protection, and risk assessment.

How do you verify information?

We independently confirm all information through multiple sources before publication. We analyze documents for authenticity, cross-reference with public records, consult experts, and sometimes conduct our own investigations. We never publish unverified claims.

How long does an exposure take?

From initial contact to publication varies widely: 2-12 months typically. Complex cases with extensive documentation take longer. We prioritize accuracy over speed. Your safety always comes first.

What happens after exposure?

We monitor impact, support legal actions, coordinate public pressure, and sometimes conduct follow-up investigations. We maintain contact with sources who choose to stay involved, but involvement is entirely voluntary.

You're Not Alone

If you're considering becoming a whistleblower, you're facing a difficult decision. The risks are real. But so is the impact. Every major exposure we've published came from people like you who decided the truth mattered more than staying silent.

We'll support you through the process. We'll protect your identity. We'll verify your information. We'll make sure your courage creates real change.

The planet needs your courage. Contact us securely. Let's expose the truth together.