GlobaLeaks is an open source project aimed to create a worldwide, anonymous, censorship-resistant, distributed Leak Amplification Network supporting whistleblowers all around the world.
Python JavaScript Other
Switch branches/tags
Nothing to show
Pull request Compare This branch is 66 commits behind globaleaks:master.
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Failed to load latest commit information.
globaleaks
tor2web
.gitignore
.pylintrc
GuideToCustomization.md
LICENSE
MANIFEST.in
Readme.md
ez_setup.py
run_tests.sh
setup.py

Readme.md

GlobaLeaks

GlobaLeaks is the first Open Source Whistleblowing Framework.

It empowers anyone to easily setup and maintain their own Whistleblowing platform. It is also a collection of what are the best practices for people receiveiving and submitting material. GlobaLeaks works in various environments: media, activism, corporations, public agencies.

                                    DISCLAIMER
                            GlobaLeaks is under Development

Installation

First you need to install pip

easy_install pip

You need to get a copy of web2py, you can install it by doing

pip install web2py

then install Globaleaks

pip install git+git://github.com/globaleaks/GlobaLeaks.git#egg=globaleaks

Under Windows|MacOSX|whatever, start the service with: globaleaks/startglobaleaks

then you will find running as a web service the following:

Base configuration

inside

defaults/origin.globaleaks.conf

there are the configuration file with all the required, optional and mandatory fields that an admin could change. When globaleaks is started, the request of a controller that require a proper configuration will redirect to the configuration page. The admin provide with the few mandatory information, and the file globaleaks.conf is saved.

When the login is requested to access as node maintainer, the default login is in: node_admin_username = admin@globaleaks.local

The file globaleaks/globaleaks.conf contain your personal configuration: mail server, installation name, and usually don't be shared

How to hack on it

  1. http://127.0.0.1:8000/globalview
  2. http://127.0.0.1:8000/tulip
  3. http://127.0.0.1:8000/targets
  4. http://127.0.0.1:8000/submit
  5. http://127.0.0.1:8000/subscribe
  6. http://127.0.0.1:8000/unsubscribe
  7. http://127.0.0.1:8000/groups

You are invited to develop, using the web admin interface, because apply automatic checks before saving the code.

updated link-o-graphy

older pages: reference, documentation

GlobaLeaks hackathon soundtrack