Anonymous Reporting
No IP addresses are ever logged, even at the nginx layer. Four independent layers of anonymity protection ensure the whistleblower cannot be identified from technical metadata alone.
HinSchG & EU Directive 2019/1937 Compliant
Free, self-hosted, and 100% compliant with HinSchG and EU Directive 2019/1937. Protect your whistleblowers, protect your organization — with zero IP logging and mandatory two-factor authentication.
Since July 2023, the Hinweisgeberschutzgesetz (HinSchG) obligates companies with 50 or more employees to operate a secure internal reporting channel. Yet most compliant software starts at €50 per month — for a legal obligation.
Worse: these commercial platforms are typically cloud-hosted, meaning your reports — and potentially your employees' identities — reside on third-party servers. Every cloud deployment carries GDPR risk.
OpenWhistle gives you a fully compliant, fully self-hosted reporting platform at no cost. Your data never leaves your infrastructure. The source code is open for audit. There is no vendor lock-in.
Kostenloses Hinweisgebersystem — compliant with §§ 12–18 HinSchG from day one.
Deploy in 5 minutes →| Feature | OpenWhistle | Commercial |
|---|---|---|
| Cost | Free forever | €50–200/month |
| Hosting | Self-hosted | Cloud (3rd party) |
| Source code | Open (GPL-3.0) | Closed |
| GDPR / DSGVO | Fully compliant | Depends on vendor |
| IP logging | Never | Often |
| Customizable | Yes | Limited |
| Audit trail | Full, local | Vendor-controlled |
Every design decision in OpenWhistle prioritises the safety of the whistleblower and the legal obligations of the organisation.
No IP addresses are ever logged, even at the nginx layer. Four independent layers of anonymity protection ensure the whistleblower cannot be identified from technical metadata alone.
Whistleblowers receive a unique case number and UUID4 PIN after submission. Both are required to access or update their report — no account, no email address required.
Built-in 7-day acknowledgement deadline and 3-month feedback deadline tracking per §17 HinSchG, with colour-coded dashboard warnings for administrators.
Admin and whistleblower can exchange messages through the same secure channel. Full audit trail without compromising the reporter's identity at any point.
Admin login requires password plus TOTP (RFC 6238) or OIDC single sign-on. No single point of compromise. Web-based setup wizard for first-run configuration.
Redis-based rate limiting on all report access attempts. Session-token based, never IP-based — anonymity is preserved even during abuse mitigation.
OpenWhistle implements every statutory requirement — not just the headline obligations but the detailed procedural requirements that auditors and regulators check.
The law mandates a 7-day acknowledgement and a 3-month substantive feedback deadline, with a legally required bidirectional communication channel.
Article 5(1)(c) of the GDPR requires collecting only the minimum data necessary. OpenWhistle takes this literally: no IP, no session identity, no fingerprint.
The directive covers organizations with 50 or more employees and all public bodies. Germany implemented it via HinSchG, effective 2 July 2023.
OpenWhistle ships as a Docker image published to
GitHub Container Registry, Docker Hub, and quay.io.
A single docker compose up -d starts the
application, PostgreSQL, Redis, and nginx.
After first boot, the /setup route opens an in-browser wizard to create your admin account and configure TOTP two-factor authentication. The wizard disables itself permanently after completion.
All configuration is managed via environment variables in a single
.env file.
No YAML configuration files, no complex setup.
Common questions about OpenWhistle, HinSchG compliance, anonymity guarantees, and deployment.