ANONYMOUS COMMUNICATIONS?

The mailbox guarantees, at all times, the confidentiality of communications and the indemnity of the communicator. Identification and contact data can be provided or, if preferred, communication can also be made anonymously.

You have two options to communicate anonymously:

– Using your browser, but without providing identification and contact information . In this case, there is a trace of the IP address from which the communication is made.​

 Fully guaranteeing anonymity of communication in the digital environment (also of the IP address, which can identify who is browsing the internet), using an anonymization network. The most used tool is the TOR network. Like any other browser, to use the TOR tool, you must download the browser from corresponding page . In this link , you can see a video tutorial on how to download the TOR browser.

Read more

The TOR network is basically free and open source software that improves privacy and security on the Internet. When connecting to the internet with TOR, the connection passes through a series of encrypted tunnels, rather than directly, making it difficult to trace the source of the information. Thus, the identity of the person connecting is protected.

The use of the TOR network to access the mailbox is advisable or essential when you are convinced or certain of risk, because it guarantees the anonymity of the person at the time of receipt of the communication. However, it must be remembered that whoever communicates must also preserve anonymity at the time of issuance.

It is recalled that City Council workers and, in general, public servants who work with institutional networks do not have access to this download page from their workstations. To use the TOR browser, they must download it from their personal device.

It is recommended to close all other browsers and applications while using TOR.