A larger screen is required to display the SKIK webpage correctly.

What is SKIK?

SKIK is a student-led non-profit initiative that allows individuals to share anonymous tips and information.

We ensure complete protection of your identity while collecting, processing, and publishing the truth.

Together, we can make a difference by exposing what needs to be heard.

Truth woven from Timber and Thread.
Scroll down to learn more!
Silence is a part of the problem, and your reports can spark change.
Your voice is the foundation of our work, we can build the truth together.
Choose the most appropriate way to send your message

Picking the right method to send your message depends on your technical skill, the type and sensitivity of the information you wish to share, and the level of risk if that information were to become public.

Each available method (SecureDrop, Signal or PGP-encrypted email) offers a different balance between simplicity, security and anonymity.

Our top priority is protecting your identity and the confidentiality of the information you share. To ensure safe and anonymous communication, please read the detailed instructions by clicking the questions below for the method you wish to use.

SecureDrop is a tool designed for journalists and whistleblowers for anonymous exchange of messages and media content.

It was developed by Aaron Swartz, James Dolan, and Kevin Poulsen, and was later adopted by the Freedom of the Press Foundation.

To protect your anonymity while using SecureDrop, it is important not to use a network or device that can easily be linked to your real identity. Instead, use public Wi-Fi networks and devices only you control.


  • Don't access SecureDrop via your employer's network.
  • Don't use your employer's devices to access SecureDrop.
  • Don't access SecureDrop from your home network.

Use a network not associated with you. For example, Wi-Fi in a library or café.

When you connect to a public network in a café or library:

  • Download and install the desktop version of the Tor browser. After launching it, visit this page again and proceed to the next step;
  • In the Tor browser, visit our unique SecureDrop URL and follow the instructions on the page for sources:
http://xpva4a2gnmouspefjg2abharvrcwn5s4e2lzuadkohtkumjuiejjftad.onion/

At the beginning of using SecureDrop, you will receive a unique code name. If you write it down, be sure to destroy the note as soon as you memorize it.

Use this code name for reaccessing the source page, this way, you can upload additional materials and read responses from journalists.

  • No tool can fully guarantee your safety and anonymity. It is best to follow good security practices to protect your privacy.
  • Your online behavior may reveal your identity. Regularly monitoring social media or our initiative's website may raise suspicion that you are a source. Consider this and use the Tor browser to reduce the risk of being tracked.
  • Do not discuss leaks or whistleblowing with anyone, even trusted contacts.
  • Use a dedicated computer only for sending materials or an alternative operating system like Tails, which runs from a USB stick and deletes all activity after each session.
  • Files contain metadata, such as creation date and model of the device on which they were created. You can remove metadata before sending using tools that come with Tails.
  • Only certain journalists within our initiative have access to SecureDrop materials. We control the servers, so no one outside has direct access to the data you send.

Signal is a messaging app like many others, but it stands out due to full end-to-end encryption (e2ee).

Signal cannot decrypt or view the content of your messages.

From metadata, it only keeps the time of your last activity in the app and the phone number you entered during registration. Nothing more.

Signal has a very good reputation when it comes to security and privacy protection.

Signal was developed by a non-profit organization dedicated to security and privacy, with no use of user data for marketing or other purposes.

All messages are encrypted end-to-end, which means that Signal has no access to their content.


  • Anyone you send a message to can see your nickname and profile picture on Signal (this can be changed in settings).

If your phone is infected with spyware or a malicious virus-like software, consider using Signal unsafe!

Once you confirm that you have control over your device:

  • Download and install the Signal app, then register using your phone number;
  • Start a new conversation and choose the Find by username option;
  • In the input field, enter skik.111;
  • In the newly opened chat send a message or media content.
  • No tool can fully guarantee your safety and anonymity. It is best to follow good security practices to protect your privacy.
  • Your online behavior may reveal your identity. Regularly monitoring social media or our initiative's website may raise suspicion that you are a source. Consider this and use the Tor browser to reduce the risk of being tracked.
  • Do not discuss leaks or whistleblowing with anyone, even trusted contacts.
  • Use a dedicated computer only for sending materials or an alternative operating system like Tails, which runs from a USB stick and deletes all activity after each session.
  • Files contain metadata, such as creation date and model of the device on which they were created. You can remove metadata before sending using tools that come with Tails.
  • Only certain journalists within our initiative have access to SecureDrop materials. We control the servers, so no one outside has direct access to the data you send.

Pretty Good Privacy (PGP) is an encryption program for end-to-end encryption, most commonly used for email correspondence.

ProtonMail is a Swiss email provider, and what sets it apart from others (such as Gmail or Outlook) is that all emails are e2ee, meaning only the user can view the content of the emails.

All emails between ProtonMail users are e2ee, and ProtonMail has pre-configured PGP for communication with users of other email providers.

ProtonMail can be used for free, without requiring you to enter a phone number, credit card, or other personal data that might expose your identity.

SKIK uses ProtonMail as its email provider, and only the addresses ending in @skik.org are our official addresses.


  • If you use ProtonMail, all messages you send to us will be automatically e2ee, meaning even ProtonMail won't be able to view the content of your message.
  • If you use another email provider and wish to send us an e2ee message, you must configure PGP using our public key.

Any message sent via another email provider without PGP configured allows your provider to see the full content of the message.

Once you have configured PGP or registered a ProtonMail account:

  • Use our public PGP key which you can find below;
  • ProtonMail users can skip this step:
https://skik.org/publickey.skikuj@skik.org.asc

Send us an email at: skikuj@skik.org

  • No tool can fully guarantee your safety and anonymity. It is best to follow good security practices to protect your privacy.
  • Your online behavior may reveal your identity. Regularly monitoring social media or our initiative's website may raise suspicion that you are a source. Consider this and use the Tor browser to reduce the risk of being tracked.
  • Do not discuss leaks or whistleblowing with anyone, even trusted contacts.
  • Use a dedicated computer only for sending materials or an alternative operating system like Tails, which runs from a USB stick and deletes all activity after each session.
  • Files contain metadata, such as creation date and model of the device on which they were created. You can remove metadata before sending using tools that come with Tails.
  • Only certain journalists within our initiative have access to SecureDrop materials. We control the servers, so no one outside has direct access to the data you send.

About Us

SKIK is a non-profit student initiative committed to uncovering the truth through anonymous whistleblowing and investigative journalism. It was formed during the student protests that followed the tragic canopy collapse in Novi Sad, which claimed 16 lives. Today, our team brings together students and journalists from across Serbia.


Our mission is to expose the problems and injustices around us through objective, responsible, and thorough reporting, drawing on the voices of citizens who feel a moral duty to speak out against corruption and wrongdoing.


As a society, we are only at the beginning of this journey and rely on public support to move forward. To enable this, we have launched Serbia's first anonymous whistleblowing platform, where anyone can share the truth without fear for their safety.


The truth, no matter how uncomfortable, must be heard. Sometimes it arrives fully documented; other times it comes as scattered pieces that need to be assembled. This is expressed in Serbian by “from timber and thread” (“s koca i konopca”), meaning assembled from parts gathered from various, even dubious places.


However it reaches us, we are here to gather the truth, investigate it, and present it to the public with clarity and accuracy.


Contact

If you want to contact us without whistleblowing, you can write to us via:

zdravo@skik.org

For whistleblowing, please use one of the tools mentioned above.


You're a student

No matter your year of study, university, faculty, or field, if you want to join our initiative, send us a short email introducing yourself. Tell us why you're interested in investigative journalism and mention any relevant experience you may have.


You're a journalist

If you're not a student but want to support us with your investigative journalism expertise or connections, we'd like to hear from you. Please email us with a brief introduction, explaining what you can offer and how you wish to contribute.


You're a citizen

If you want to show your support or contribute in other ways, you can donate through our crypto wallets listed below or make a general donation to the student movement. For other types of support you're interested in, contact us via email.