What is ZeroLeaks?
ZeroLeaks is a revolutionary whistleblowing platform that combines cutting-edge cryptographic technologies with blockchain infrastructure to create a secure, anonymous, and verifiable system for sharing sensitive information. Built on the Sui blockchain and leveraging zero-knowledge proofs, ZeroLeaks addresses the critical need for protecting whistleblowers while ensuring the authenticity of leaked documents.
The Problem We Solve
Traditional whistleblowing faces several critical challenges:
- Source Protection: Whistleblowers risk retaliation, prosecution, or worse when their identities are exposed
- Document Authenticity: Recipients cannot verify if leaked documents are genuine without potentially compromising the source
- Centralized Vulnerabilities: Traditional platforms create single points of failure and censorship
- Trust Issues: No transparent mechanism to verify the credibility of leaks
Our Solution
ZeroLeaks provides a comprehensive solution through:
ZeroKnowledge verification
Using our circom circuits, sources can prove they received legitimate emails from specific domains without revealing their identity or the full email content. This creates verifiable proof of authenticity while maintaining complete anonymity. We use zkemail for email verifction
Encrypted and Decentralised Storage
Documents are encrypted using SEAL encryption protocol and stored on Walrus, ensuring they cannot be censored or tampered
DAO Governance
A decentralized autonomous organization (DAO) manages the access list to sensitive documents, ensuring democratic decision-making about what information should be made available to who.
Who Can Use ZeroLeaks?
- Whistleblowers: Safely expose wrongdoing without fear of retaliation
- Journalists: Receive and verify leaked documents with confidence
- Activists: Share evidence of corruption or abuse transparently
- Researchers: Access verified information for investigations
- General Public: Browse authenticated leaks to stay informed
Security and Privacy First
ZeroLeaks is built with security and privacy as fundamental design principles, not afterthoughts. Every component has been carefully designed to protect user anonymity while ensuring system integrity.