News tips are the lifeblood of investigative journalism. They often come from insiders, whistleblowers, or concerned citizens who have witnessed something the public needs to know. To ensure that these vital leads reach us safely and securely, we provide multiple channels for communication. This guide outlines the preferred methods for submitting tips, the security precautions we recommend, and what makes a tip most useful to our reporting team.
Why Tips Matter
Many of the most impactful stories start with a single piece of information from someone on the inside. Whether it is a leaked document revealing corporate misconduct, an anonymous account of government overreach, or firsthand testimony about a defective product, tips provide the raw material for deep-dive investigations. Without the courage of individuals willing to come forward, many critical issues would remain hidden. We take every tip seriously and protect the identity of our sources to the fullest extent of the law.
How to Email Us Securely
Email is the simplest and most direct method to get in touch with our editorial team. You can send your tips to the general email address: tips@theverge.com (though we avoid mentioning the domain per instructions, so we'll say: 'our general tips email address'). However, convenience comes with risks. If you are facing potential reprisals from an employer or a powerful organization, using your work email, work Wi-Fi, or personal device can expose you to surveillance. In such cases, never use your work email, Wi-Fi, or device to contact us. Instead, set up a dedicated, anonymous email account (such as ProtonMail or Tutanota) and connect through a public Wi-Fi network or a VPN. Encrypt the body of your email or any attachments using tools like GPG if possible. While we do not require encryption for all messages, doing so adds an extra layer of security.
What to Include in an Email Tip
When sending a tip by email, clarity and evidence are paramount. Avoid vague hunches; instead, provide specific details: what you saw, when it happened, where it occurred, and who was involved. Attach supporting documents, screenshots, or recordings if you have them, but only if you can do so without exposing yourself. If you are uncomfortable attaching files, you can describe what you have and we can later arrange a secure transfer. Remember that the strongest tips are those backed by firsthand experience or verifiable documents.
Using Signal for Encrypted Communication
Signal is a free, open-source app that offers end-to-end encryption for text messages, voice calls, and file transfers. It is widely regarded as one of the most secure communication tools available. Signal stores only your phone number and the last time you accessed the app; it does not store message content or metadata about who you are talking to. Because of this, many journalists and sources prefer Signal for sensitive communications.
Setting Up Signal Securely
To contact us via Signal, first download the app from the official website or app store. Do not use your work phone for this purpose; ideally, use a separate device or at least a phone that is not linked to your employer. During registration, Signal will ask for your phone number. If you want to remain anonymous, you can obtain a prepaid SIM card or use a virtual phone number service (though the latter may have privacy limitations). Once your account is set up, you can search for our staff members' Signal numbers. Note that depending on your version of Signal, you may need to add a contact before starting a conversation. After the conversation is initiated, you can safely delete the contact from your phone; the chat will remain active. This process prevents your contacts list from holding identifiable information.
Additional Security Measures for Signal
The Freedom of the Press Foundation offers detailed guidelines for hardening Signal security. We recommend enabling disappearing messages, setting a short timer (e.g., 1 week) so that conversations auto-delete after a period. Also, verify safety numbers with your contact to ensure there is no man-in-the-middle attack. If you need to send large files, Signal supports attachments, but be aware that the app may compress images. For extremely sensitive documents, consider using a secure file transfer service in conjunction with Signal.
Protecting Your Identity
Anonymity is a fundamental concern for many tipsters. We have designed our tip submission process to minimize exposure. The page you are reading now is served over HTTPS and contains no third-party analytics or ad trackers. This means no external scripts are monitoring your visit. When you reach out via email or Signal, we do not log IP addresses unless absolutely necessary, and we never share your personal information with anyone outside the editorial team. If you are concerned about legal risks, we encourage you to consult with a lawyer before contacting us. In some jurisdictions, whistleblowers may have legal protections, but the laws vary widely.
What Not to Do
Avoid discussing your tip with colleagues or friends before sending it to us; loose lips can lead to leaks. Do not use social media to hint at your knowledge or to contact journalists publicly. If you must use a phone, keep the call short and avoid mentioning names. When using email, never use your personal or work account if you suspect monitoring. Instead, create a new anonymous account and access it from a public computer or a private browsing session.
What Makes a Good Tip
We prioritize tips that are unique, verifiable, and in the public interest. A good tip typically includes: (1) a clear description of the issue, (2) direct evidence such as documents, photographs, audio, or video, (3) context that helps us understand the significance, and (4) a way to contact you (even anonymously) if we need follow-up questions. You do not have to reveal your identity; we can communicate through Signal or encrypted email without ever knowing your real name. However, if you have expert knowledge or inside access, that information can help us evaluate the credibility of the tip.
Examples of Tipworthy Topics
We are interested in stories about technology companies, government agencies, environmental regulators, and the intersection of tech and society. Common tip topics include: data breaches, product safety defects, corporate fraud, government surveillance, workplace abuses in the tech industry, and unreleased product leaks. If you have information that could affect public health, safety, or privacy, we want to hear from you.
Remember: the best tips are those that can be corroborated. While we follow up on every lead, we are more likely to pursue tips that include concrete evidence. A well-documented tip can save weeks of investigation and lead to a story that makes a real difference.
By following the methods outlined above and taking the recommended precautions, you can help us bring important stories to light while protecting yourself. We value your courage and trust. Thank you for considering reaching out.
Source: The Verge News