Strongbox is a new way for you to share information, messages, and files with our writers and editors and is designed to provide you with a greater degree of anonymity and security than afforded by conventional e-mail.
To help protect your anonymity, Strongbox is only accessible using the Tor network (https://www.torproject.org). When using Strongbox, The New Yorker will not record your I.P. address or information about your browser, computer, or operating system, nor will we embed third-party content or deliver cookies to your browser.
You can read our full privacy promise here.
The New Yorker Strongbox is powered by SecureDrop.
You will be assigned a randomly generated and unique code name as part of the process. If a writer or editor at The New Yorker wants to contact you about the information you have submitted, he or she will leave a message for you in Strongbox. These messages are the only way we will be able to reach you, and this message can only be accessed using your code name.
The New Yorker's Strongbox is designed to let you communicate with our writers and editors with greater anonymity and security than afforded by conventional e-mail.
When you visit or use our public Strongbox server at //strngbxhwyuu37a3.onion, The New Yorker and our parent company, Condé Nast, will not record your I.P. address or information about your browser, computer, or operating system, nor will we embed third-party content or deliver cookies to your browser.
Strongbox servers are under the physical control of The New Yorker and Condé Nast.
Strongbox is designed to be accessed only through a “hidden service” on the Tor anonymity network, which is set up to conceal both your online and physical location from us and to offer full end-to-end encryption for your communications with us. This provides a higher level of security and anonymity in your communication with us than afforded by standard e-mail or unencrypted Web forms. Strongbox does not provide perfect security. Among other risks, if you share your unique code name, or if your computer is compromised, any activities, including communications through Strongbox, should be considered compromised as well.
The system is provided on an “as is” basis, with no warranties or representations, and any use of it is at the user's own risk.