Ordinary contact forms for extraordinary risk
Standard site forms, poorly configured HTTPS, and email forwarding leave a fragile chain when somebody is sharing sensitive information that could have consequences for their job or safety.
Whistleblowing is high risk for the person speaking and for the people who agree to receive and act on what they say. The web infrastructure should not be the weak point.
I build and harden neutral, technical foundations for lawful whistleblowing and public interest disclosures. That covers both internal disclosers who need safe contact routes, and independent projects that receive and protect sensitive information.
For the wider context of public interest work, see Advocacy, campaign, and public interest sites.
This offer is split between internal whistleblowers looking for safe routes, and independent receivers providing those routes to others.
The common thread is simple. There is something important to say, someone is likely to be unhappy about it, and you want the technical side to be solid, boring, and defensible.
A lot of whistleblowing infrastructure is built for appearances, not for safety. The gaps show up at the worst possible time.
Standard site forms, poorly configured HTTPS, and email forwarding leave a fragile chain when somebody is sharing sensitive information that could have consequences for their job or safety.
Staff are told to use internal hotlines or vendor platforms that feel aligned with the organisation, not with them. As a result, serious concerns never leave private chat groups.
Files move between inboxes, messaging apps, and shared drives. When somebody challenges your account, you do not have a clear, technical story of what was sent, when, and from where.
A disclosure surfaces, people rush to the site, lawyers take an interest, and the mix of traffic and pressure breaks a fragile build or cheap hosting plan.
Basic analytics cannot show whether someone is quietly probing your reporting routes, lifting entire pages, or attempting to exploit mistakes in configuration.
Websites promise words like anonymous, safe, and secure without understanding the technical trade offs. That is unfair to disclosers and creates risk for receivers.
This offer is about aligning what you say with what you actually do, with conservative technical choices that keep everyone safer.
If you are the one receiving disclosures, your responsibilities are heavy. Your infrastructure should support that, not undermine it.
If you are the person inside an organisation, you do not need a complicated platform. You need a stable, simple site you can control that supports whatever route you choose to take.
I do not tell you when or how to disclose. I make sure that, when you decide, the technical side is not held together with string.
Whistleblowing and public interest disclosures attract a specific kind of traffic and attention. Your site should assume that from day one.
That can include quiet monitoring by internal teams, legal firms checking wording, external contractors scanning your routes, and sudden bursts of public interest when a story lands. Logs, fingerprinting, and Cloudflare rules can give you a clear view of that activity.
The point is not to create drama. It is to have a record you can use calmly if somebody later claims that nothing happened or that you are exaggerating.
If you want a deeper view of monitoring and patterns, see the public interest overview section on Expected monitoring.
These limits are there so that whistleblowers and receivers know exactly what Ki-Ki does and does not do.
The full position is set out in the Neutral infrastructure policy. Your use of Ki-Ki is also governed by the Terms of use and Privacy policy.
No one can honestly guarantee anonymity. What I can do is design routes that minimise unnecessary data, use encryption properly, and avoid fragile platforms. I will also be clear about what is and is not realistic for your situation.
I can work with individuals or small groups where there is a clear, lawful public interest goal and a sensible scope. I do not act as a case adviser or representative. I look after the technical side and point you toward independent sources of legal advice where appropriate.
Yes. That is a core part of this offer. I can set up secure PGP based contact routes, harden the site, and give you a clear process for handling incoming messages and files on your side.
No. Fingerprinting identifies devices and sessions on your own site, not real world identities. It can show patterns, repeat access, and attempts to evade logging, but it cannot tell you which named person typed the message.
Often yes. I can help you understand the technical reality of what it is doing, improve the surrounding infrastructure, and design a separate route if you want an additional, independent option.
If I am already working with an organisation in a way that would create a clear conflict with a proposed whistleblower project, I will say so and decline the new work. I do not sit on both sides of the same dispute.
Set out, in simple terms, what kind of disclosures you are dealing with, who might be unhappy about them, and what you already have in place. I will tell you plainly whether I am the right person and what a realistic first step looks like.