guide · published

Privacy stack for journalists in 2026

A concrete, sourced privacy stack for journalists handling sensitive sources in 2026 — device, network, messenger, email, file handling, and source intake.

Journalism source protection is one of the highest-stakes privacy use cases. The legal regimes vary, the adversaries can be state-level, and the cost of getting it wrong can be a source’s livelihood or freedom. This guide assembles a practical stack from the directory’s entries plus a small number of journalism-specific tools.

It is not exhaustive and it does not replace operational training. The Freedom of the Press Foundation runs that training; this is a starting reference.

The threat model#

The default threat model for a journalist handling a sensitive source is:

A useful frame is to assume the source’s adversary has subpoena power over any operator and packet visibility on any network the source touches. The defensive posture is to give that adversary nothing to subpoena and nothing to correlate.

The stack#

Device#

A dedicated device for source work, separate from your day-to-day machine. Two practical options:

For users who can’t run either, a dedicated laptop with VeraCrypt full-disk encryption and strict-use discipline is the floor. Never log into real-name accounts on it.

Network#

Messenger#

Three options depending on the source’s threat model:

Avoid: WhatsApp (Meta operator, phone number, group metadata visible), Telegram (default chats not E2E), iMessage (Apple ID binding), Slack/Teams/email-on-domain (employer-visible).

Document intake#

Avoid: attachments via standard email (transit metadata visible), shared cloud links (operator-visible), in-person USB handoffs (physical-trail risk for the source).

Email and accounts#

Password and key management#

Crypto for source compensation#

If sources need to be compensated in crypto (research grants, expense reimbursement, payment for materials):

Publishing infrastructure#

When the journalism work itself produces a publishing surface — a leak site, a story archive, a temporary onion service for a source intake — the hosting layer matters as much as the device layer.

For threat models where mainstream takedown pressure is the primary risk, this is the routine combination in 2026.

What this stack defeats#

What this stack does NOT defeat#

Operational discipline#

The single highest-value habit is the one this guide cannot enforce: keep the dedicated device, the dedicated accounts, and the dedicated identifier strictly separate from your real-name identity. Don’t log into Twitter on the Tails session. Don’t open Gmail on the dedicated laptop. Don’t use the same VPN account across compartments. Don’t carry the dedicated device alongside a real-name phone tied to your number unless you have to.

Two clean compartments beats five sloppy ones every time. See the operational privacy guide for the layered-threat-model walkthrough.

See also#

FAQ

What is the single most important tool?
Compartmentalization. A dedicated device — Tails on a USB key or a Qubes OS partition — that is used only for source work and is never used to log into your real-name accounts. The specific tools matter less than the discipline of keeping them in their own compartment.
Is Signal enough for source contact?
For most threat models, yes. Signal's E2E is strong, disappearing messages limit forensic exposure on either end, and the phone-number requirement matters less when the journalist controls a dedicated number. For sources who specifically refuse phone-number registration, SimpleX is the no-identifier alternative.
How should I receive documents from a source?
SecureDrop is the gold standard — Tor-onion-service intake operated by The Freedom of the Press Foundation, used by The Guardian, NYT, ProPublica, and others. For ad-hoc transfers, OnionShare provides a temporary Tor hidden service from your own machine. For one-off small files via existing channels, send via Signal Note to Self or a Cwtch chat.
Do I need to use Tor for everything?
No. Use Tor for source-side communication, for accessing onion services like SecureDrop, and for research where your IP could compromise a source. For routine work where the destination already knows you (your editor's Slack, your bank), Tor adds friction without privacy.
What about hardware?
A dedicated laptop with full-disk encryption is the standard. Tails on a USB key works when a separate laptop is impractical — boot from the USB, no data persists. For routine writing and research, a primary laptop with native FDE is sufficient; the dedicated device is for source contact only.
How do I store source-protection keys safely?
KeePassXC for password storage on the dedicated device. The vault file backs up to encrypted storage (Filen, Proton Drive, or a VeraCrypt container on a USB drive). Strong master password; consider a passphrase modifier you remember mentally and never write down.

Sources

  1. Freedom of the Press Foundation — training · accessed
  2. SecureDrop · accessed
  3. Tails · accessed
  4. Privacy Guides · accessed

Referenced by

Topic hubs