en

Tor for Investigative Journalists - Building Secure Source Communication

Investigative journalism depends on sources who can communicate sensitive information without risk to themselves. The legal protections that traditionally shielded sources from identification have weakened as digital surveillance capabilities have grown: metadata analysis, call records, and IP logs can identify contacts that no court protection reaches. Journalists who take source protection seriously build technical infrastructure that makes surveillance of source communications difficult even at the metadata level. Tor is the foundation of this infrastructure. This guide addresses how journalists and newsrooms operationalize Tor for source protection.

Need this done for your project?

We implement, you ship. Async, documented, done in days.

Start a Brief

The Source Protection Problem in 2026

Traditional source protection relied on reporter privilege, editorial discretion, and limited law enforcement surveillance capability. Digital communication has eroded these protections significantly. A journalist's email metadata (who they communicated with, when, how often) can be obtained through legal process without content decryption. Phone records identify source contacts through carrier metadata. Browser history and DNS queries logged by ISPs reveal research patterns. Even when content remains protected, metadata provides powerful investigative leads.

The only effective defense against metadata surveillance is preventing the metadata from being collected in the first place. Tor prevents IP-level metadata collection by routing communication through multiple encrypted relays. A Tor-based communication between a journalist and a source leaves no IP-level record at the source's ISP or the journalist's ISP. The metadata simply does not exist to subpoena.

Newsrooms that have deployed this infrastructure include the New York Times, Washington Post, and Guardian. Their SecureDrop deployments receive thousands of tips annually from sources who specifically chose anonymous digital channels over riskier traditional contact methods. The infrastructure works and its deployment is now standard practice for major investigative journalism organizations.

SecureDrop: The Foundation of Newsroom Source Infrastructure

SecureDrop is the Freedom of the Press Foundation's open-source whistleblower submission platform designed specifically for newsrooms. It runs as a Tor hidden service accessible only through Tor Browser. Sources submit documents and messages through a web interface; journalists read submissions through a separate admin hidden service accessible only from an air-gapped workstation running Tails.

The air-gap is the critical security property. Documents submitted to SecureDrop never exist on internet-connected systems. The journalist workstation used to read submissions is a dedicated machine that connects to SecureDrop only, runs the amnesic Tails OS, and has no internet connection except through Tor. A server compromise, a network compromise, or a journalist workstation compromise cannot expose submission contents because the data exists only on the air-gapped machine.

For newsrooms evaluating SecureDrop deployment, the Freedom of the Press Foundation provides free installation support and training. The total infrastructure cost is modest: two VPS instances (one for the application, one for the monitor) at $19.99 to $49.99/mo each, plus staff time for training and operations.

Signal, Briar, and Direct Contact Alternatives

SecureDrop is the right tool for anonymous document submission from unknown sources. For ongoing relationships with known sources who need operational security, other tools may be more appropriate. Signal is the most widely deployed secure messaging tool and provides strong content protection through end-to-end encryption. Its limitation for anonymous source communications is the phone number requirement: both parties need a phone number-linked account, and the phone number is a real-world identity anchor.

Signal accessed through Tor by the source adds a Tor layer to Signal's existing encryption, hiding the source's IP address from Signal's servers. This combination provides both content encryption and IP-level anonymity for sources who already use Signal and have operational security around their phone number (purchased with cash, registered with a pseudonym).

Briar, described in the Tor alternatives section, creates direct Tor hidden service connections between two Briar app instances without any central servers. A journalist and a known source who both install Briar and exchange contact addresses can communicate with no server metadata at all. This is the strongest available protection for ongoing communication, at the cost of both parties needing Briar installed and being simultaneously online for message delivery.

Operational Security for Journalists

Journalist operational security has multiple layers beyond technical tool selection. The human and behavioral layer is often where security breaks down even when technical tools are in place:

Device separation: work devices, personal devices, and source communication devices should be distinct. A journalist who uses the same phone for work email, personal communication, and secure source contact creates connections between these contexts that sophisticated adversaries can exploit. Dedicated secure communication devices, used only for sensitive source interactions, limit this cross-contamination.

Location discipline: accessing SecureDrop or Tor from a consistent location creates geolocation patterns in Tor entry point traffic. Vary locations, particularly for high-sensitivity sessions. Access from the newsroom, from home, from cafes, and from other locations to prevent temporal correlation of Tor access with specific work sessions.

Source compartmentalization: know only what you need to know about each source. Avoid aggregating information about multiple sources in one location. Compartmentalized knowledge limits the damage of any single device or account compromise. The source's identity should be known to the minimum number of newsroom personnel necessary for editorial approval and legal review.

Why Anubiz Host

100% async — no calls, no meetings
Delivered in days, not weeks
Full documentation included
Production-grade from day one
Security-first approach
Post-delivery support included

Ready to get started?

Skip the research. Tell us what you need, and we'll scope it, implement it, and hand it back — fully documented and production-ready.

Anubiz Chat AI

Online