Collect all your evidence into one large archive, upload it somewhere and make it known that if you die of anything other than natural causes, that information will become available to EVERYONE.
Read up on how “dead man’s switches” work. If you don’t send a signal online, log into a particular account on a regular basis, that sends the release signal.
But why bother holding back in the first place. If this is whistleblower information like Boeing safety issues, there’s no point in setting up a dead man’s switch. You want to release it all immediately in the first place, because keeping it to yourself undermines the point of blowing the whistle
Then the incentive becomes to stop a whistleblower faster if they had a dead-man cache than if they released it all at once. There’s no guarantee that the whistleblower is being honest or is capable enough to undertake something like that but there’s always a risk that the whistleblower may disclose that information anyway. Better to stop the whistleblower by arresting them first and deal with the potential fallout than negotiate. Now the whistleblower’s reputation is ruined, if they’re behind bars they’re effectively silenced, and they’re as good as dead to society without all that messy work trying to fake a suicide.
Man, lots of crazy, unrealistic advice here.
One person literally said to live in a motel. No, do not live alone.
The answer is pretty simple, live in a community house with like 8 other people.
*whose adversary
how’d you find the guy?
Easy. We had a list of the fifteen or so guys that did that specific part of the job, we got their IP addresses, watched them for a while, and as it turns out, two of them regularly use a VPN and send all of their traffic to Canada.
How long do you think it would take to figure out whether or not which one of these boys are harmless software pirates, or their man?
People do all of the work in the world without knowing that your preparation will blow your cover.
Have you ever visited TailsOS’s website off of a VPN? Could the Feds find out? Do you think the other guys have the same level of deniability?
That trail is not washing off. You even knowing or having a history of using a Linux iso is suspicion enough if the rest of the suspects are all boring chuds.
Don’t leak. Spread seldom rumours online about the company with plausible deniability. Find a crazy-er person and/or group. Continue spreading dots. Spread info to Youtubers. Others with a platform. Use a VM, a password manager inside the VM. After 12 months, delete all your credentials and the VM. The system can not protect you. Corps rule democracy. Don’t trust the system. Spread the info until it reaches critical mass or the faith in the system collapses. Your life is worth more than some righteous leak. See the Pentagon Papers life. He lived a very humble life afterwards.
NOTE: method untested and invented just now.