Surveillance capitalism exposed

The biggest difficulty for any whistleblower is finding a journalist who has the time to do the work, especially in data abuse cases because the issues are complex and often requires specialised data science knowledge. And usually, an editor, publisher or producer must also approve it. In some countries, risk of defamation can cause a publisher to not proceed with stories.

  • We offer whistleblowers various verification, research, expert networking, and other resources not currently widely available from credible actors who are not beholden to existing media gatekeepers, and have people in our core team that have had first-hand experience with what can happen, and know which types of internal issues and power dynamics a whistleblower could be subjected to.
  • We support campaigns of privacy analysts, journalists, lawyers, activists, scientists and law makers to meaningfully improve data protection/privacy under surveillance capitalism, and to help identify and implement technological, social and political remedies to some of its worst consequences for real people with real lives.

We never underestimate the possibility of creating change without necessarily doing it in the public eye. Publication might not be the endgame in every case.

Before giving us tips

How our process works, how we protect anonymity and confidentiality, what you would be consenting to, your legal rights, and our recommendations for how to keep yourself as safe as possible when contributing?

Make sound decisions

Bias and discrimination

The models used are opaque, use is officially regulated in Europe by the GDPR (but public authorities and civil society struggle to apply its rules in concrete ways), and the results of the models are mostly incontestable …


Influencing elections

European elections 2019 are coming up and we are looking at GDPR abuses, personal profile markets, and wish to gain more insights on how political campaigning and propaganda weaponize politicians' messages.

Are we being targeted?

Whistleblower workplace retaliation

You have contributed a tip on wrongdoings, and now face harassment by your employer and/or are being met by an increasingly hostile environment on the job, or had your job terminated?

More on that

De-anonymisation threat model

A strategy in data mining in which anonymous data is cross-referenced with other sources of data to re-identify the anonymous data source.

The adversaries, possible attack vectors, the attacks, threats, assistive technologies, the possible uses, and if and where possible, what we can do.

Transparent intentions

Project tools

On debian, the tools the core team of the project use can be unavailable or unfriendly. Installations, configurations, alternatives, and …


Data mining

Don't take my data mining seriously. I certainly don't. I do it for demystification of the graph matching in the “De-anonymizing Social Networks” hack trail of Arvind Narayanan and Vitaly Shmatikov, for showing how easy it really is, and for upgrading my ancient programming skills to python.

Bet on it

Smart metering architecture

Risk-related information seems to be deliberately suppressed, and the public seems to be provided information that indicates there are no additional privacy or security risks related to smart meters as compared to the old analog meters.

Investigating ...

Facebook information architecture

Facebook’s news feed algorithm shapes the social lives and reading habits of more than 1 billion daily active users—one-fifth of the world’s adult population. No one outside Facebook knows for sure how the algorithm works.

Some informed guessing ...


Newspeak is the language of Oceania, a fictional totalitarian state. Bleedingedgespeak is used in the not-so-fictional-yet-virtual IT industry. More words and meanings. Moar.

Bleeding edge

Profiling corporations

Computer behavioural profiling systems are focused on identifying normal user patterns, based purely on a limited set of user actions collected by detection systems. Red flags are raised when an action outside of the “normal” profile occurs.

Apparently, tracking is normal.

Corporations as users (of us)