BIP Columbus

collapse
Home / Daily News Analysis / How to tip The Verge: email, Signal, and more

How to tip The Verge: email, Signal, and more

May 21, 2026  Twila Rosenbaum  14 views
How to tip The Verge: email, Signal, and more

Some of the most impactful stories in journalism begin with a single tip. Whether it is a leaked document that exposes corporate wrongdoing, a firsthand account of government surveillance, or a whistleblower revealing unsafe working conditions, the information provided by sources is the lifeblood of investigative reporting. However, sharing sensitive information with journalists is not without risks. Reprisals from employers, government agencies, or other powerful entities can have severe consequences for sources. Therefore, it is essential to understand how to communicate securely and anonymously.

This guide outlines the safest ways to send tips to a news organization, focusing on methods that minimize digital footprints and protect your identity. We cover email best practices, the use of encrypted messaging apps like Signal, and additional steps recommended by security experts such as the Freedom of the Press Foundation. Whether you are a corporate insider, a government employee, or a private individual who has witnessed something the public should know, these techniques can help you share information with minimal risk.

Why Secure Communication Matters

In the digital age, almost every online action leaves a trace. When you send an unencrypted email, connect to a public Wi-Fi network, or use a company-owned device, your communications can be intercepted, logged, or monitored. For a source who is at risk of retaliation—such as losing a job, facing legal action, or even physical harm—taking precautions is not optional; it is a necessity. Journalists themselves are often targeted by surveillance, so both parties must adopt secure practices.

Secure communication not only protects the source but also ensures that the information can be used effectively. If a tip is intercepted, the story may be compromised before it even begins. Moreover, the trust between journalists and sources is built on the assurance that confidentiality will be maintained. By using encryption and avoiding common pitfalls, you help preserve that trust and strengthen the role of a free press.

Method 1: Encrypted Email

Email remains one of the most common ways to contact a newsroom. However, standard email services such as Gmail, Outlook, or Yahoo are not inherently secure. Messages are often stored in plaintext on servers, and metadata (sender, recipient, subject line, time) is visible to the provider and potentially to government agencies. For sensitive tips, you should take additional steps to protect your email communications.

First, consider using a dedicated, anonymous email account. Do not use your work email or any account that can be easily traced to your real identity. Free services like ProtonMail or Tutanota offer end-to-end encryption, meaning only you and the recipient can read the contents of the message. These services are based in jurisdictions with strong privacy laws and do not log IP addresses. When creating the account, avoid using your real name, personal phone number, or recovery email that reveals your identity. Use a pseudonym and access the account only through a private browser session or a VPN.

Second, encrypt the body of your email or any attachments using software like PGP (Pretty Good Privacy). PGP allows you to encrypt a message so that only the intended recipient with the corresponding private key can decrypt it. Many news organizations publish their PGP public keys on their website or in their bios. Before sending sensitive material, confirm that the journalist you are contacting supports PGP and follow their instructions. Alternatively, you can send an initial email asking for their public key, but be aware that this exchange itself could be monitored.

Third, never include identifying details in the subject line. Subject lines are often not encrypted and are visible to anyone who intercepts the email. Keep the subject line vague, such as "Potential story idea" or "Regarding a matter of public interest." Within the email body, do not state your real name, employer, or any information that could reveal your identity until you have established a secure channel and trust with the journalist.

Finally, be cautious about using your home internet connection or workplace network. If you are at risk, use a public Wi-Fi network (such as a library or cafe) or a VPN to mask your IP address. Avoid logging into your personal accounts on the same device while sending the tip. The goal is to create as much separation as possible between your everyday digital presence and your tip.

Method 2: Signal

Signal is widely considered the gold standard for secure messaging among journalists and sources. It is a free, open-source app that provides end-to-end encryption for text messages, voice calls, and file transfers. Signal uses the Signal Protocol, which is so secure that it has been adopted by other messaging apps like WhatsApp. However, unlike WhatsApp, Signal does not collect metadata about who you communicate with or for how long. The only data Signal stores is your phone number and the last time you accessed the app. This makes it an excellent choice for sharing sensitive tips.

To use Signal securely, follow these steps:

  • Do not use your work phone. If you are a whistleblower, your employer may monitor company devices. Use a personal phone that is not linked to your workplace.
  • Create a new Signal account using a burner phone number. You can purchase a prepaid SIM card with cash and use it solely for Signal. Do not register with your real phone number. Google Voice numbers are also an option, but they may be associated with your Google account if you are not careful.
  • Enable disappearing messages. Signal allows you to set messages to automatically disappear after a certain time. This ensures that even if your phone is seized or compromised, the conversation history is gone. For very sensitive tips, set the timer to a short duration like one hour or one day.
  • Lock the app with a PIN or biometric lock. Signal requires a registration lock PIN to prevent unauthorized access. Also enable screen lock on your phone so that if the device is lost, the app cannot be opened.
  • Add the journalist as a contact only after creating the conversation. Depending on the version of Signal, you may need to save the recipient's phone number in your contacts before starting a chat. Once the conversation has begun, you can delete the contact entry from your phone to avoid leaving traces. The Freedom of the Press Foundation recommends this step.
  • Verify security numbers. Signal allows you to verify that you are communicating with the correct person by comparing safety numbers in person or through an out-of-band method (like another secure channel). This prevents man-in-the-middle attacks.

When contacting a journalist via Signal, keep your initial message brief and do not include sensitive information until you are confident of the recipient's identity. You can say something like "I have information regarding [general topic] and would like to discuss securely." The journalist may ask you to verify your identity or provide proof of your claims. Once trust is established, you can share documents or detailed accounts.

Additional Safety Tips

Beyond choosing the right communication tool, there are several broader security practices that can protect you:

  • Assume you are being watched. If you are a potential target—such as a government employee with access to classified material—operate under the assumption that your communications are monitored. Take steps such as using Tor Browser to access websites, or using a separate device that you do not connect to your home network.
  • Be careful with documents. If you are sharing leaked documents, remove metadata that might reveal your identity. Metadata can include the author name, company name, editing time, and even GPS coordinates from photos. Use tools like ExifTool to scrub metadata before sending.
  • Use encrypted file sharing. For large files, avoid email attachments. Use services like OnionShare (which works over Tor) or send files via Signal if they are small. If you must use a cloud service, encrypt the file and share the password through a separate channel.
  • Limit the number of people you contact. Only reach out to one journalist at a time to reduce the risk of leaks. If the story is extremely sensitive, consider contacting a journalist who specializes in your field and who has a strong reputation for protecting sources.
  • Know your rights. In many countries, there are laws that protect whistleblowers, but they vary widely. Consult with a lawyer before blowing the whistle if you can do so without compromising your safety. Some journalism organizations offer legal resources for sources.

Understanding What Makes a Good Tip

Journalists receive hundreds of tips every week, and not all of them lead to stories. To increase the likelihood that your information will be investigated, ensure it meets certain criteria. First, provide evidence. Firsthand experience, original documents, or photographs are far more valuable than speculation or rumors. If you have a document, do not describe it in vague terms—share it directly if possible, even if it is a partial copy. Second, be specific. Avoid general claims like "the company is corrupt." Instead, provide concrete examples: dates, names, amounts, or procedures. Third, explain why the public should know. Connect your tip to a broader issue of accountability, safety, or justice. Finally, be prepared to verify your identity if needed. While journalists respect the need for anonymity, they may need to verify your bona fides to avoid being misled by false information.

Remember that journalists are also taking risks by working on stories that powerful interests want to suppress. They have experience protecting sources and will guide you through the process. Do not be afraid to ask questions about how your information will be used and what protections are in place. A trustworthy journalist will be transparent about their security practices.

The Role of Secure Tips in Democracy

History is full of stories that began with a secure tip. The Pentagon Papers, the Watergate scandal, and the exposure of mass surveillance by Edward Snowden all relied on sources who took great personal risks to share information with journalists. Without secure channels for communication, many of these revelations would have been impossible. In an era of increasing surveillance and corporate power, the ability to securely contact the press is not merely a technical convenience—it is a pillar of democratic accountability.

News organizations have a responsibility to make it easy and safe for sources to come forward. That is why many now provide dedicated tip lines, encrypted communication options, and clear instructions like those in this guide. By following these best practices, you can help ensure that wrongdoing is exposed without endangering yourself or others. The next great story might depend on your willingness to speak out—and on your ability to do so safely.


Source: The Verge News


Share:

Your experience on this site will be improved by allowing cookies Cookie Policy