Hush Line is a free and open-source, self-hosted anonymous tip line that makes it easy for organizations or individuals to install and use. It's intended for journalists and newsrooms to offer a public tip line; by educators and school administrators to provide students with a safe way to report potentially sensitive information, or employers, Board rooms, and C-suites for anonymous employee reporting.
Title | Site | Address | Date |
---|---|---|---|
Hush Line | AlternativeTo | https://alternativeto.net/software/hush-line/about/ | Current |
Whistleblowing Section | The Hidden Wiki | http:https://zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6otjiycgwqbym2qad.onion/wiki/index.php/Main_Page | Current |
From Leaks to Justice: Challenges and Opportunities for the Judiciary in the Age of Disclosure | Corporate Crime Observatory | https://www.corporatecrime.co.uk/from-leaks-to-justice | May 22, 2024 |
What is the Dark Web? | Tech Republic | https://www.techrepublic.com/resource-library/downloads/what-is-the-dark-web/ | May 13, 2024 |
Hacker & guest: Science & DESIGN + Security4Good Check in | CryptoHarlem | https://www.youtube.com/watch?v=NV5gA0AgLuY | March 30, 2024 |
Hush Line, an open-source tip line for journalists, activists and businesses | Hacker News | https://news.ycombinator.com/item?id=39601338 | March, 2024 |
Are we missing any roles? Edit this document!
Person | Role | Keybase Contact |
---|---|---|
Abbey | Research Lead | @bodicea |
Brassy | Lead Engineer | @brassy-endomorph |
Glenn | Product/Design | @glennsorrentino |
Glenn | Social | @glennsorrentino |
Ritik | Engineering | @maxseckb |
Sam | Engineering | @schlink |
Sam | Documentation | @schlink |
Scott | Design | @scottjenson |
Sooraj | Engineering | @ianonymous3000 |
Localization |
Italics indicate a temporarily filled role.
Other tools in this space include SecureDrop and GlobalLeaks, two robust, widely adopted whistleblowing platforms whose installation can be complicated for non-technical users. Some systems require an admin to configure it and special infrastructure for it to operate. The security posture of these platforms is increased because the chances are high that you'll receive malicious and dirty data when you allow people to send you files anonymously. Both require significant time and money to manage. It's not much easier for the person sending a message, either. They might have to create accounts, download new software, or manage PGP keys. It requires a significant commitment. Even tools like Signal or Protonmail require end-users to reveal information about themselves unless they can find disposable phone numbers and email addresses. Not a requirement everyone feels comfortable with.
In contrast, Hush Line is a text-only, one-way messenger that is the first handshake in a relationship where two parties want to exchange information. It's a low-risk method of offering a safe channel for someone to reach you without requiring them to reveal anything about themselves, create an account, manage PGP keys, or acquire a burner phone, email address, or phone number.
The tool deploys to either an onion-only instance or Tor + public web. Hush Line is a web and email server and a Python app that encrypts messages with your public PGP key once a message gets submitted, then saves it, and finally emails the encrypted message to you. Your data never gets saved in an unencrypted state. And since all messages are sent to your email, you never have to log in to the device.
We configure Nginx with hardened security headers so no external and potentially nefarious resources can load, automatically set up renewing Let's Encrypt HTTPS certificates so your data is always transmitted safely, privacy-preserving logging which scrubs IP addresses before saving to server logs, and enable automatic updates by default so you never miss a critical security patch.
You only need a public PGP key on a keyserver and an SMTP-compatible email address. We ask for your key this way because uploading it includes verifying your email address, which helps us know you are who you say.
Built with popular and ubiquitous hardware and software in mind, Hush Line works seamlessly on Raspberry Pi and Debian-based operating systems. You can even add an e-paper display to make your Hush Line address easy to discover.
We offer a solution for those who want to help, who might have reportable or actionable information, but don't want to face retaliation or take on the risks of getting involved. In fact, over 70% of people have witnessed or experienced workplace harassment. Only 15% of those people ever make a formal written complaint. About 1% ever has something done about it. That's a big oversight for employers, which could become a significant liability left unattended. And the reason people don't report? They're afraid of retaliation.
How much better, safer, and more informed could our schools, workplaces, and society be with a safe way to share information that places the privacy of communities first?
- Journalists and newsrooms can use Hush Line to give the public a safe way to leave a confidential tip.
- Employers and board rooms can use Hush Line to build trust by allowing colleagues to leave suggestions or report concerns anonymously.
- Educators and school staff can use Hush Line to host a safe way for students to share information with someone they trust.
- As a journalist, I need to provide sources with a trustworthy way to send information, so they have confidence that the methods will protect their privacy.
- As an educator, I need to provide students with a safe way to share information with school staff they trust, so critical information can be received while protecting the student's identity.
- As an employee that has witnessed workplace abuse, I need a secure and private way to share information with company executives, so that my identity is kept secret to avoid provoking a hostile retaliatory response.
- As a student, I want a way to report sensitive information without sharing who I am, so I can help to make change without impacting my educational experience.
- As a business leader, I want to make my team feel like they can share sensitive information without risking their career, so I can build trust in the team with which I work.
- As a source, I need a way to access someone's Hush Line, even if the Tor Network and the original URL are blocked in my country, so I can share information even in the most oppressive environments.
- Global
- Areas where censorship is prevalent, including Iran, China, Russia, and Belarus
ℹ️ Information listed here may be inaccurate. Please open an issue or create a PR to request a correction.
Product | Type | Open-Source | E2EE | Onion Service | HTTPS | Verification System | Free | Non-Profit | Security Audit | User Directory |
---|---|---|---|---|---|---|---|---|---|---|
AfriLEAKS | Self-Hosted (Globaleaks Instance) | ✅ | ⛔️ | ✅ | Tor-Only | ⛔️ | ✅ | ⛔️ | ⛔️ | ✅ |
CaseIQ | Managed | ⛔️ | ⛔️ | ⛔️ | ✅ | ⛔️ | ⛔️ | ⛔️ | ⛔️ | ⛔️ |
Castillo | Managed | ⛔️ | ⛔️ | ⛔️ | ✅ | ⛔️ | ⛔️ | ⛔️ | ⛔️ | ⛔️ |
Confide | Managed | ⛔️ | ✅ | ⛔️ | ✅ | ⛔️ | ⛔️ | ⛔️ | ⛔️ | ⛔️ |
FaceUp | Managed | ⛔️ | ✅ | ⛔️ | ✅ | ⛔️ | ⛔️ | ⛔️ | ✅ | |
GlobaLeaks | Self-Hosted | ✅ | ✅ | ✅ | Optional | ⛔️ | ✅ | ⛔️ | ✅ | ⛔️ |
Hush Line | Managed, Self-Hosted, Hardware | ✅ | Optional | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ |
Say Something | Managed | ⛔️ | ⛔️ | ⛔️ | ✅ | ⛔️ | ? | ⛔️ | ✅ | ⛔️ |
SecureDrop | Self-Hosted | ✅ | ⛔️ | ✅ | Tor-Only | ⛔️ | ✅ | ✅ | ✅ | ✅ |
- Roth, V., Güldenring, B., Rieffel, E., Dietrich, S., & Ries, L. (2013). A secure submission system for online whistleblowing platforms. Freie Universität Berlin, FX Palo Alto Laboratory, Stevens Institute of Technology.
- Agrikola, T., Couteau, G., & Maier, S. (n.d.). Anonymous whistleblowing over authenticated channels. CNRS, IRIF, Université de Paris; Karlsruhe Institute of Technology.
- Uddholm, J. (2016). Anonymous Javascript cryptography and cover traffic in whistleblowing applications. KTH Royal Institute of Technology, School of Computer Science and Communication.
- Jayakrishnan, H., & Murali, R. A simple and robust end-to-end encryption architecture for anonymous and secure whistleblowing. Department of Computer Science and Engineering, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India.
- Ahmed-Rengers, M., Vasile, D. A., Hugenroth, D., Beresford, A. R., & Anderson, R. CoverDrop: Blowing the whistle through a news app. Department of Computer Science and Technology, University of Cambridge.