Security Guide

Your safety is our top priority. Here is how Fichua protects your identity and what you can do to stay safe.

Protect Yourself

Fichua is built to protect your identity, but the strongest security starts with you. Follow these practices before and during your submission.

1

Use Tor or a VPN

Access Fichua through the Tor browser or a trusted VPN. This hides your IP address and makes it much harder to trace your activity back to you.

2

Avoid Work Devices & Networks

Never submit from a work computer, work phone, or office Wi-Fi. Corporate devices and networks are often monitored. Use a personal device on a private or public network.

3

Use the Auto-Generated Codename

Let the system generate a random codename for you. Avoid using anything personally meaningful — no nicknames, birthdays, or initials. Memorize it or write it down securely.

4

Let the PII Scanner Do Its Job

Before your submission goes through, our AI scans your explanation for personal information — names, phone numbers, ID numbers, M-Pesa transactions. If it flags something, take the option to auto-redact.

5

Be Careful With Your Explanation

Don't mention your own name, job title, department, or any details that could identify you. Focus on the facts: what happened, when, where, and who was involved in the wrongdoing.

How We Protect You

Every layer of Fichua is designed with security and anonymity in mind. Here is the technology behind the platform.

Zero-Knowledge Codenames

Your codename is hashed with bcrypt (12 rounds) before storage. The platform never stores it in plaintext — even if our database is compromised, your codename cannot be recovered.

Automatic Metadata Stripping

Every uploaded file passes through MAT2, which removes hidden metadata: EXIF data, GPS coordinates, author names, creation timestamps, and software identifiers. This happens automatically before storage.

End-to-End Encryption

Your explanation and all messages are encrypted with AES-256-GCM — a military-grade encryption standard. Data is encrypted before it reaches the database and can only be decrypted with the platform's secure key.

File Encryption at Rest

Every uploaded file is encrypted with AES-256-GCM before permanent storage. Files are stored as encrypted blobs — they are unreadable without the decryption key, even with direct disk access.

PII Detection & Redaction

AI-powered scanning (Presidio) detects personal information before submission — including Kenyan-specific identifiers like national ID numbers, M-Pesa transaction IDs, and vehicle registrations. You can auto-redact or edit before submitting.

Email Hashing for Journalists

Journalist emails are hashed with SHA-256 before storage. This prevents email enumeration attacks — no one can query the database to discover which journalists are registered.

What We Never Store

  • Your codename in plaintext
  • Your IP address
  • Your browser fingerprint
  • Journalist emails in plaintext
  • File metadata (stripped before storage)
  • Unencrypted submission text
  • Session cookies beyond your visit
Fichua is designed so that even we cannot identify you. Our zero-knowledge architecture means that a database breach would not reveal whistleblower identities.