More info on Secure Anonymous Submissions


TOR browser creates a "onion ring" network, by swapping out your ip address before being passed through a total of seven anonymising relays.  TOR submissions are impossible to retrace.  However, if you are accessing TOR download page from your office, your internal Internet network logs records your computer accessed the TOR browser download page and this might expose you to scrutiny.  It would be highly recommended that you download and install the TOR browser for submission of sensitive information from your OWN PERSONAL COMPUTER or simply mail by Canada Post anonymously to 41 Katrina Dr., Fredericton, NB, E3G 0B1.  If sending through the mail, it will be destroyed after it is scanned digitally.

What is the Tor Browser Bundle (TBB)?

The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.

The Tor Browser Bundle lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can also run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained.

Quick videos on how to use the TOR BROWSER

How to download and use Tor Browser in different operating systems:

Microsoft Windows VIDEO    Apple OSX  VIDEO     Linux  VIDEO