Safety & Privacy
Whistleblowing is sensitive. This page explains how to protect yourself when submitting information to Whistle42 — and how we handle privacy, data minimization, and verification.
Quick safety checklist (read first)
- Avoid workplace devices/accounts if your tip involves your employer.
- Do not include passwords, private keys, or any “access” credentials.
- Share evidence you can legally disclose — when in doubt, seek advice.
- Remove unnecessary personal details from screenshots or documents.
- If you choose anonymity, keep your submission consistent (don’t self-identify later by accident).
Our Safety & Privacy Principles
Trust is the conversion engine. We keep the whistleblower journey clean, minimal, and evidence-first.
Anonymity options
You can submit without revealing your identity. Share only what you’re comfortable sharing.
Data minimization
We request what’s needed to evaluate the tip — not your life story.
Consent-based follow-up
If we need clarification, we’ll ask. You decide whether to respond and what to provide.
Evidence-first
We prioritize verifiable identifiers and documentation over rumors or hype.
What Not to Send
To protect you and maintain integrity, do not submit certain categories of information.
Do not send
- Passwords, private keys, seed phrases, or login credentials
- Instructions or tools for hacking, unauthorized access, or wrongdoing
- Data you obtained by unlawful means or breach of obligations
- Excessive personal data not needed for verification
- Information that could put someone in immediate physical danger
Better alternatives
- Provide verifiable identifiers (domains, wallets, TX hashes, reference numbers)
- Provide documents you are allowed to share (or describe them)
- Redact personal details that do not add verification value
- Use timelines and factual descriptions (who/what/when/how)
- If in doubt, submit a minimal summary and ask how to proceed safely
How We Handle Tips
We use an AI-assisted intake process to structure information — but humans verify and decide what happens next.
AI-assisted structuring (support)
- Entity extraction (names, companies, domains, wallets, PSPs, banks)
- Timeline and evidence inventory (first-pass)
- Duplicate and pattern linking (related case detection)
Human verification (decision)
- Credibility checks and verification tasks
- Risk review (privacy, defamation, exposure, shareability)
- Routing into recovery, sanitized reporting, or professional intel lanes
Tracking & Cookies
Whistleblowers should not feel “tracked.” We keep the submission journey clean and privacy-respecting.
- No third-party tracking pixels are required to submit a tip.
- We may use limited, first-party technical measures to operate the site and protect against abuse.
- Partner referrals can be measured using simple referral links (no pixels), recorded as case metadata.
- For details, refer to our Privacy Policy (linked in the footer).
Safety & Privacy FAQ
Short answers to common questions.
Can I submit anonymously?
Yes. You can submit without revealing your identity. If you want safe follow-up, you may choose to provide a contact method — but it is optional.
Will my tip be published?
We do not publish raw tips one-to-one. If information is used for reporting, it is typically sanitized and aggregated into patterns.
Do you share my information with third parties?
We treat submissions as sensitive. Where appropriate, verified intelligence may support recovery evaluation, referrals, or professional use under strict terms. We aim to minimize exposure and do not disclose unnecessary personal data.
Do I get paid for submitting a tip?
Whistle42 does not pay for volume. Optional C42 program recognition is discretionary and milestone-based, aligned with verified, outcome-driving contributions. There is no “pay-per-tip.”
What makes a tip “high quality”?
Verifiable identifiers and evidence. Names/entities, timelines, money flows, documents, domains, wallet addresses, transaction hashes, emails, and reference numbers significantly increase actionability.
Ready to submit safely?
If you have credible information — even partial — start with what you can safely document. We’ll handle triage and verification.
