Taking sensible security precautions should be a priority for anyone thinking of sending sensitive information.
This advice is by no means comprehensive and is intending only to serve as a starting point from which you explore.
Here are just a few examples of how to protect yourself:
Unileaks recommends the use of TOR for those who are concerned about their internet usage being monitored. Take the time to read the information contained on the TOR site.
The easy to use browser bundle can be found: here
Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis
For more information on the TOR project - Visit the website here: TOR
OpenPGP is a means of sending encrypted email communication.
Its use relies on public and private key systems.
Public keys can be shared with people which they can then use to encrypt data. When the data encrypted it can only be read after first being decrypted by a private key - the second element in the process. This is called Public Key Cryptography.
OpenPGP is a non-proprietary protocol for encrypting email using public key cryptography. It is based on PGP as originally developed by Phil Zimmermann. The OpenPGP protocol defines standard formats for encrypted messages, signatures, and certificates for exchanging public keys.
Using email software which supports OpenPGP encryption keys you can communicate with Unileaks completely confidentially.
Our Public Key can be found Here
Programs such as GPG4win can assist in the creation of your own public and private keys.
Or Email software such as Mozilla Thunderbird have plug ins which also support OpenPGP - The plug in comes with a wizard which assists in the creation of a public and private key.
True Crypt is a powerful open source software which enables you to encrypt your computers data.
True Crypt enables you to create virtual hard-drives which are completely secure.
For a full description please visit http://www.truecrypt.org/
For those who are worried about rare cases of ciminal action resulting from leaks.
The following video is based on laws and rules of eveidence which relate to the United States. That said, it is very instructive and we would urge everyone to watch it.
Most democratic states have at law, or in the case of jurisdictions like the united states, constitutional protections (see 5th ammendment of the bill of rights), which provide the option to make no comment, or remain silent if arrested by law enforcement. Methods used by law enforcement to interrogate potential suspects are fairly uniform across most jurisdictions. (This can include various forms of intimidation, sensory deprevation, implied or actual violence.) The best bet is to reassure yourself that at some stage a formal legal process will take place and that your abilty to resist the urge to speak may be the difference between a judgement of guilt or innocence.
We urge you to seek legal representation if you are arrested.
The lawyer Part 1,
The cop Part 2.