en

Tor for Human Rights Workers: Digital Safety in the Field

Human rights workers document abuses, communicate with survivors, and transmit evidence in environments where state or non-state adversaries actively monitor communications. Digital security failures have led to the exposure of sources, detention of workers, and destruction of evidence. Tor provides a core layer of network security that, combined with encrypted communications and physical security practices, significantly reduces the risk of surveillance detection in field operations. This guide addresses the specific threat model of human rights documentation work.

Need this done for your project?

We implement, you ship. Async, documented, done in days.

Start a Brief

Threat Model for Human Rights Documentation

Human rights workers face threats from state security services with substantial technical capabilities, local law enforcement with phone seizure authority, criminals hired to intimidate workers, and hostile armed groups with informant networks. The technical threat includes deep packet inspection of internet traffic to detect communications with international human rights organizations, IMSI catchers (Stingrays) that impersonate cellular towers to intercept communications, physical device seizure and forensic analysis, and social engineering of communication platform providers to reveal account data. Tor addresses the network surveillance component by encrypting and routing traffic through multiple relays, preventing local network monitoring from identifying communication destinations.

Tails OS for Field Documentation

Tails (The Amnesic Incognito Live System) is purpose-built for human rights work and journalistic documentation in hostile environments. Boot Tails from a USB drive on any computer - it runs entirely in RAM, leaves no trace on the host computer, and shuts down cleanly leaving no forensic evidence. Tails routes all network traffic through Tor by default. Use Tails for drafting reports, encrypting files with GPG, and transmitting documentation to international organizations. Tails includes KeePassXC for secure password management, GnuPG for encryption, and Tor Browser with Tor-routed network access. Configure persistent storage (encrypted partition on the USB) only if you need to retain specific documents between sessions - stateless operation maximizes security.

Secure Communication with Sources in the Field

Sources willing to provide testimony or documentation face retaliation risk if their contact with human rights organizations is discovered. Use Signal for communications with sources who have smartphones, configured with disappearing messages (30 days maximum, 1 week preferred). For sources with limited technical capability, WhatsApp provides end-to-end encryption for messages and calls, though metadata (who talked to whom, when) is visible to the platform. For highly sensitive source relationships, establish contact over SecureDrop - a Tor-based platform specifically designed for source-organization communications. SecureDrop requires the source to access a .onion address, providing protection against network-level surveillance of the contact. Provide sources with Tor Browser and the SecureDrop address through in-person meetings.

Transmitting Evidence to International Organizations

Evidence transmission must balance speed with security. Large files (video documentation, high-resolution photographs) cannot be transmitted over Tor Browser during active monitoring situations due to bandwidth constraints. Pre-encrypt evidence with GPG to the recipient organization's public key before transmission. Use OnionShare to create temporary .onion file transfer endpoints for large encrypted files. OnionShare generates a temporary onion address that only you and the recipient know, avoiding any third-party file storage. For ongoing field teams, establish a dedicated file transfer server running on .onion address with SFTPPlus or similar, so evidence transfers appear as routine Tor traffic rather than identifiable file upload sessions to known organization infrastructure.

Physical Security Integration with Digital Security

Digital security measures fail if physical security is compromised. Border crossings with device inspection are a primary risk - cross sensitive borders with factory-reset or clean devices, upload encrypted backups to secure storage before crossing, and restore after arrival. Use full-disk encryption (VeraCrypt hidden volumes for high-risk scenarios, standard LUKS for moderate risk) on all devices storing sensitive documentation. Carry only information necessary for the immediate field mission. Establish cover stories for device use that explain ordinary travel purposes. For communications with headquarters during field operations, use pre-arranged signal phrases that indicate whether communications are being made under duress. Tor protects network traffic but cannot protect against an adversary physically present at your device.

Why Anubiz Host

100% async — no calls, no meetings
Delivered in days, not weeks
Full documentation included
Production-grade from day one
Security-first approach
Post-delivery support included

Ready to get started?

Skip the research. Tell us what you need, and we'll scope it, implement it, and hand it back — fully documented and production-ready.

Anubiz Chat AI

Online