This Site Requires JavaScript Enabled.
Action Required!
Please select your Toolkit from the left sidebar.

Step 7

Communicate Securely

Use these tools to improve the security of your texts, calls, and emails to better protect your data and safeguard your sources.

Imagine you’re a watchdog researcher. For years you’ve been diving into documents relating to a major bank in your part of the world. You’re working with a network of whistleblowers, government regulators, analysts, and other informants. Some of them are anonymous, and others aren’t. You’ll verify their identities through corroboration, in due time, and ideally in face-to-face interactions. Lawyers have spent hundreds of hours poring over your documents, making sure your conclusions are adequately supported, and everybody you talk to is protected from retribution once the story is published.

After weeks of attempting to get a comment from the bank, you finally get an email from a bank executive. In it, they quote questions you asked your sources. They dispute the very premise of your line of questioning, picking it apart word-by-word.

One of two things could have happened – you didn’t have the proper tools to identify your sources, or the private messages you were using to correspond weren’t so private. Now the bank can get ahead of your reporting, and they have the resources to do a good job of it.

Similar scenarios have happened several times to a major business news publication with operations in Western Europe and Asia. Even if you’re reporting on private interests, malicious state interests may intervene and vice versa. The security of your communications can determine what’s considered “public” and “private,” where journalistic privileges begin and end, and whether or not your stories ever reach their intended audience. Using verified, encrypted, and end-to-end communications allows for you to communicate on your terms.

It is important to use these apps prudently, though. One drawback to some end-to-end communication is little regulation against the spread of hate speech, disinformation, and impersonation. Since 2017, the misuse of some communications apps has led to mass violence. That’s why some apps allow you to establish a digital signature that can be used to verify the identity of your sources, so you’re not inadvertently communicating with one of your opponents nor are people able to use your accounts to spread disinformation. Because of the inherent privacy of these apps, some have been banned by local jurisdictions, so make sure to check whether they are legal to use before using the apps.

7.1 Secure Instant Messaging

Select “Secure Instant Messaging” under the Category menu, and choose any of the tools listed to assist in securely sending and receiving messages, photos, videos, documents, and voice calls.

Narrow your search by selecting your OS
0h 20min


Use this tool to send secure messages with end-to-end encryption.

Additional Training & Resources

Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.

VPN Ratings logo

What is a VPN?

This resource provides an overview of virtual private networks (VPNs) including how they work, what kinds of protection they...

Read More

GCA Cybersecurity Toolkit Workshop

This GCA workshop provides real-world scenarios and walks participants through the implementation of recommendations through...

Read More
Totem training

Totem Project | Secure Messaging Apps

Totem is an online platform that offers interactive courses to learn how to increase digital security and privacy. The optimal...

Read More

Bot Sentinal

Bot Sentinel is a free platform developed to classify and track inauthentic accounts and toxic trolls.

Read More

Hootesuite Social Media Audit

Social media is an invaluable extension of your brand. Make sure the people you engage with online maintain confidence in...

Read More