Encryption

Why Encryption Matters for Reporting Serious Crime

When reporting crimes involving children or powerful individuals, your data must be protected at every stage — from the moment you type it to years later when it's stored on our servers. This isn't just about privacy; it's about safeguarding duties of care under UK law.

Standard web forms and survey platforms offer little to no protection. We use military-grade encryption throughout the entire process.

How Encryption Works

Think of encryption like putting your message in an unbreakable safe. Only someone with the correct key can open it and read what's inside. Even if someone intercepts your message, all they see is meaningless scrambled data.

Without Encryption

"John Smith abused children at Riverside School in 1995. I have evidence including photos and witness statements."

Anyone monitoring the connection can read this

With Encryption

aGVsbG8gd29ybGQgdGhpcyBpcyBqdXN0IGV4YW1wbGUgZW5jcnlwdGVkIGRhdGEgdGhhdCBpcyB1bnJlYWRhYmxl

Completely unreadable without the decryption key

The Problem with Standard Forms

Basic Contact Forms

WordPress contact forms, Google Forms, and standard web forms typically send data as plain text emails. Your message can be read by:

  • • Email providers
  • • Internet service providers
  • • Government surveillance
  • • Hackers monitoring traffic

Survey Platforms

Services like SurveyMonkey or Typeform offer basic SSL encryption in transit, but:

  • • Data stored unencrypted
  • • Platform staff can read submissions
  • • Subject to data requests
  • • No anonymity protections

GlobaLeaks

Purpose-built for sensitive disclosures with:

  • • End-to-end encryption
  • • No browser traces
  • • Encrypted database storage
  • • Anonymous communications

Four Layers of Protection

1

Your Browser

The Problem

Most websites leave traces in your browser history, cache, and temporary files. This creates evidence you visited the site and what you submitted.

Our Technology

GlobaLeaks is designed to leave no traces in your browser cache or history. Combined with Tor Browser, your visit becomes completely untraceable.

2

Data in Transit (SSL/TLS)

The Problem

When you submit data over the internet, it travels through multiple servers and networks. Without proper encryption, anyone monitoring these connections can read your submission.

Our Technology

We use TLS 1.3 encryption with an SSLabs A+ rating. Your data is encrypted the moment you click submit and remains encrypted until it reaches our secure servers.

3

Database Storage

The Problem

Most platforms store your submissions in plain text databases. If their servers are compromised or legal requests are made, your data is immediately readable.

Our Technology

All submissions are encrypted before being stored in our database. Even if someone gained access to our servers, they would only see meaningless encrypted data.

4

Disk Storage

The Problem

Even encrypted databases can be vulnerable if the physical server hard drives are seized or if the encryption keys are stored alongside the data.

Our Technology

Our servers use full disk encryption with keys stored separately. Physical access to our servers would still not reveal your data without the corresponding decryption keys.

Technical Specifications

Encryption Standards

  • TLS 1.3 — Latest transport layer security
  • AES-256 — Military-grade symmetric encryption
  • RSA-4096 — Public key cryptography
  • PGP/GPG — End-to-end email encryption
  • Perfect Forward Secrecy — Each session uses unique keys

Security Certifications

  • SSLabs A+ Rating — Highest security grade
  • ISO 27001:2022 — International security standards
  • OWASP Compliant — Web application security
  • Regular Penetration Testing — Third-party security audits
  • Open Source Auditing — Publicly verifiable code

Why Specialist Security Engineers Matter

Building secure systems for sensitive crime reports requires specialised knowledge most web developers don't possess. The difference between "secure enough for a business contact form" and "secure enough for child abuse evidence" is enormous.

Standard Web Development

  • • Focus on functionality and user experience
  • • Basic SSL implementation
  • • Limited understanding of threat models
  • • Standard database security practices

Security Engineering

  • • Threat modelling against sophisticated adversaries
  • • End-to-end encryption implementation
  • • Operational security (OPSEC) considerations
  • • Zero-knowledge architecture design

GlobaLeaks was built by security specialists who understand crime reporters may face nation-state level threats. Every design decision prioritises protection over convenience.

Real World Impact

This level of encryption has protected crime reporters disclosing to the International Criminal Court, journalists working under authoritarian regimes, and survivors of institutional abuse worldwide.

When reporting abuse by powerful individuals with connections to law enforcement and government, especially crimes involving children, this protection isn't optional — it's essential for your safety and fulfils our duty of care under UK safeguarding law.

"