Note: this is only for editorial tips. For advertising, technical support, and other inquiries, please use the appropriate contact channels listed elsewhere.
Some of our most important stories start with tips. We are always looking for information about the companies and products that shape the way we live, insight into the government agencies responsible for regulating the environment and technology we interact with daily, and other stories about the impact technology has on human beings. Evidence is key: firsthand experience or revealing documents will be more useful than a hunch. Have you encountered something that the public should know about? If so, we want to hear from you.
How to Submit a Tip Safely
Journalism thrives on the courage of sources who share critical information. Whether you are an employee at a major tech firm who has witnessed unethical practices, a government contractor with access to classified documents, or simply a citizen who noticed something amiss, your tip can spark investigations that hold power accountable. However, the act of tipping carries inherent risks, especially when the information involves powerful entities that may retaliate. This guide outlines the most secure methods to reach our editorial team while minimizing the chances of exposure.
Before contacting us, consider the sensitivity of the information you possess. The more concrete and verifiable the evidence, the stronger the story. Documents, internal memos, financial records, emails, or detailed accounts of incidents are far more valuable than vague allegations. If you have firsthand knowledge, be prepared to describe what you saw, heard, or experienced with as much context as possible. We treat all tips with strict confidentiality and will never publish your identity without your explicit consent.
Email is the easiest way to reach us. For general editorial tips, you can send a message to our dedicated tips address: tips at our domain. However, standard email is not encrypted by default, meaning it can be intercepted or accessed by third parties. If you are at risk of reprisals, do not use your work email account, your employer's Wi-Fi network, or any device managed by your company. These are often monitored, and even deleting sent messages does not erase copies on corporate servers.
For an added layer of security, consider using a personal email account that you create solely for this purpose, and access it only from a private, trusted network, such as a home connection or a public Wi-Fi that does not require personal identification. Avoid logging into that account on your work computer or phone. If you choose to send sensitive documents via email, you can encrypt the attachments using tools like GPG (Gnu Privacy Guard) or password-protect the files with a strong password that you share with us through a different channel, such as Signal.
Our journalists also have individual email addresses listed on their author pages. For time-sensitive or highly sensitive tips, it may be better to contact a specific reporter who covers the relevant beat rather than the general inbox. However, the general inbox is monitored by multiple editors and guarantees that your tip reaches the team as a whole.
Signal
Signal is a messaging app that provides end-to-end encryption for text messages, voice calls, and file transfers. This means that only the sender and the intended recipient can read the content; even Signal itself cannot access the messages. Signal stores only your phone number and the last time you accessed the application, but it does not log who you are communicating with or the content of those conversations. This makes it one of the most secure tools available for anonymous communication.
To use Signal, you must install the app on a smartphone (both iOS and Android are supported) and register with a phone number. If you want to remain anonymous, consider purchasing a prepaid phone and a separate SIM card that you pay for with cash. Do not use your personal mobile phone or a work-issued device, as those can be traced back to you. Once you have Signal installed, you can contact our staff members using their Signal-linked phone numbers, which are often listed on their author pages.
Depending on what version of Signal you are using, you may need to add the recipient's phone number as a contact before beginning a conversation. The contact can be deleted from your address book once the conversation has begun. The Freedom of the Press Foundation offers additional guidelines for locking down security on Signal, including how to enable disappearing messages, disable screenshots, and use the app's safety number verification feature to ensure you are communicating with the right person.
When you send a tip via Signal, you can include text, photos, videos, and documents. Signal also allows you to set a timer for messages to automatically be deleted after a certain period. This is particularly useful for sensitive information that you do not want lingering on your device or the recipient's device. However, be aware that the recipient may take a screenshot or forward the message before it disappears. Trust is essential in the journalist-source relationship, and we take every measure to respect your wishes regarding retention and publication.
Additional Security Considerations
Beyond the communication channel, your operational security matters. If you are planning to share information that could lead to legal or professional repercussions, consider using a virtual private network (VPN) to mask your internet traffic, especially if you are accessing Signal or email from a monitored network. Use a VPN that does not keep logs and that is based in a jurisdiction with strong privacy laws. Similarly, when browsing our website or reading about our staff, do not do so from a device that can be associated with you. The digital footprint you leave behind can be as revealing as the information you share.
We also recommend that you avoid using work-related devices or accounts for any part of the tip process. Many employers have policies that allow them to monitor all activity on company equipment, including emails, web browsing, and even messages sent through personal apps if they are installed on a work phone. Use a clean, personal device that you keep solely for private communications.
If you decide to call one of our reporters, note that standard phone calls are not encrypted and can be intercepted. Use Signal's voice call feature instead, which provides end-to-end encryption. For extremely sensitive matters, we may arrange a meeting in person, but that requires careful planning and should only be considered after establishing trust through encrypted channels.
What to Expect After You Submit a Tip
Once we receive your tip, an editor or reporter will review it. Given the volume of tips we receive, we cannot personally respond to every submission, but each one is read. If your tip has strong evidence and aligns with our editorial focus, a journalist may reach out to you using the contact method you provided. Be patient; sometimes it takes weeks or months to verify and develop a story.
If you are contacted, we will discuss the details of the information you provided, what we intend to do with it, and how we can protect your identity. We may ask additional questions or request more documentation. At no point will we publish your name or any identifying information without your explicit permission. In cases where we believe you are at risk, we may even recommend that you seek legal counsel before proceeding.
We adhere to the ethical standards of journalism, which include verifying facts, providing context, and giving subjects of stories a chance to respond. Your tip is the beginning of an investigative process, not the end. We will handle your information with the care it deserves.
Why Tips Matter
Investigative journalism relies heavily on tips because many of the most consequential stories are hidden behind corporate nondisclosure agreements, government classification systems, or private business practices. Without people willing to speak up, abuses of power can go unchecked. Tips have led to exposés on surveillance programs, data breaches, environmental violations, and discriminatory algorithms. They are the lifeblood of accountability reporting.
In an age where disinformation spreads rapidly, verified tips from credible sources help separate fact from fiction. They provide the raw material that journalists can examine, cross-reference, and present to the public. Every tip, no matter how small, could be the missing piece that completes an important puzzle.
In accordance with best practices set by the Freedom of the Press Foundation, this page is being served over HTTPS without third-party analytics or ad trackers.
Source: The Verge News