Privacy Policy

At IntegrityChain, anonymity isn’t optional—it’s foundational.

We exist to protect whistleblowers who expose wrongdoing in funded startups. Whether you're revealing fraud, corruption, or internal misconduct, your identity must remain safe—not only from employers, but also from surveillance systems, malicious actors, and even us.

That’s why we’ve built IntegrityChain on GlobaLeaks, a leading open-source platform for secure and anonymous whistleblowing. Combined with Tor technology, we ensure your submissions are untraceable, encrypted, and handled with extreme care.

🛡️ What We Use: GlobaLeaks + Tor

GlobaLeaks

An open-source whistleblowing framework developed by privacy experts.

  • End-to-end encryption
  • Automatic data sanitization (removes metadata like IP addresses, file history)
  • No account or login required
  • Optional delayed messaging (anonymous follow-up system)

GlobaLeaks is used by investigative journalists, anti-corruption NGOs, and even governments worldwide.

Tor Network

We only accept submissions via our Tor (.onion) hidden service—a privacy layer that masks your IP address, device, and network identity.

  • Traffic is encrypted and routed through multiple global servers.
  • Your internet provider or employer won’t know you accessed our site.
  • You can browse securely even in censored or high-surveillance environments.

You’ll need the Tor Browser to access our reporting portal.

🤐 What We Don’t Collect

We deliberately avoid storing or collecting the following:

  • IP addresses
  • Device/browser fingerprints
  • Email addresses (unless you choose to provide one)
  • Location data
  • Names or job titles

You are in full control of what you share. You can remain completely anonymous, or opt to disclose your identity if you wish to be compensated or contacted securely.

🔁 Two-Way Anonymous Communication

After submitting a report, you’ll receive a unique access code (generated by GlobaLeaks).
This allows you to:

  • Send follow-up documents
  • Respond to our questions
  • Track case progress
    ...all without revealing who you are.

We will never ask you to sign up, give your name, or install anything.

🔒 How We Handle Submissions Internally

  1. Every report is reviewed manually by a trained ethics and compliance team.
  2. We validate and cross-reference evidence before any outreach.
  3. No third-party hosting - everything is stored on self-hosted, encrypted servers.
  4. After 90 days of inactivity, your report is permanently deleted unless flagged for ongoing review.

We will never disclose your identity to anyone—including the company you’re reporting on—without your explicit consent.

🧨 What Happens If You're Tracked?

If you believe you’ve already been compromised or surveilled:

  • Don’t submit anything yet.
  • Use a public Wi-Fi connection or burner device to access our Tor portal.
  • Consider legal or NGO support (we can help connect you).

We are also working on partnerships with legal and digital rights organizations to provide emergency support for high-risk whistleblowers.

✨ We Believe Privacy Is Power

IntegrityChain was built not to exploit whistleblowers, but to protect and empower them.
By combining cutting-edge technology with real-world ethics, we ensure your voice is heard, without putting your life or livelihood at risk.