To get to Strongbox and begin using it to contact writers and editors at The New Yorker, just follow these two steps:

  1. 1Download and install software to access the Tor Project: https://www.torproject.org. This should only take a few minutes.
  2. 2Once you have access to the Tor network, go to Strongbox at http://tnysbtbxsf356hiy.onion, where you will find further instructions on how to submit files and messages to The New Yorker.

You will be assigned a randomly generated and unique code name as part of the process. If a writer or editor at The New Yorker wants to contact you about the information you have submitted, he or she will leave a message for you in Strongbox. These messages are the only way we will be able to reach you, and this message can only be accessed using your code name.

Our privacy promise

The New Yorker's Strongbox is designed to let you communicate with our writers and editors with greater anonymity and security than afforded by conventional e-mail.

When you visit or use our public Strongbox server at http://tnysbtbxsf356hiy.onion, The New Yorker and our parent company, Condé Nast, will not record your I.P. address or information about your browser, computer, or operating system, nor will we embed third-party content or deliver cookies to your browser.

Strongbox servers are under the physical control of The New Yorker and Condé Nast in a physically and logically segregated area at a secure data center. Strongbox servers and network share no elements in common with The New Yorker or Condé Nast infrastructure.

Strongbox is designed to be accessed only through a “hidden service” on the Tor anonymity network, which is set up to conceal both your online and physical location from us and to offer full end-to-end encryption for your communications with us. This provides a higher level of security and anonymity in your communication with us than afforded by standard e-mail or unencrypted Web forms. Strongbox does not provide perfect security. Among other risks, if you share your unique code name, or if your computer is compromised, any activities, including communications through Strongbox, should be considered compromised as well.

The system is provided on an “as is” basis, with no warranties or representations, and any use of it is at the user's own risk.