BIP Messenger

collapse
Home / Daily News Analysis / How to tip The Verge: email, Signal, and more

How to tip The Verge: email, Signal, and more

May 18, 2026  Twila Rosenbaum  15 views
How to tip The Verge: email, Signal, and more

Some of the most important news stories begin not with press releases or official announcements, but with tips from individuals who have direct knowledge of events, documents, or practices that affect the public. Journalists depend on these sources to bring hidden truths to light. Whether it is a whistleblower revealing corporate misconduct, an employee sharing internal documents about a faulty product, or a citizen witnessing government overreach, tips are the lifeblood of investigative journalism. That is why we have established clear, secure channels for anyone who wants to share information with our newsroom. We understand that coming forward with a tip can involve personal risk, and we are committed to protecting your identity and your data.

This guide outlines the best ways to contact us, the security measures we recommend, and what makes a tip most useful. We encourage you to read each section carefully and choose the method that best fits your situation. Remember: evidence is key. Firsthand experience, photographs, internal emails, contracts, or other documents carry far more weight than unsubstantiated speculation. If you have something that the public should know about, we want to hear from you. Below we explain the two primary methods for submitting tips: email and Signal. We also provide general security advice for sources who may be at risk of reprisals.

Why Secure Communication Matters

In an era of widespread digital surveillance, protecting the confidentiality of communications between journalists and their sources is more important than ever. Governments, corporations, and malicious actors can intercept unencrypted emails, track phone calls, and monitor internet activity. For sources who are exposing wrongdoing, these surveillance capabilities pose a serious threat. A leaked document or a candid account can trigger retaliation, including job loss, legal action, or even physical harm. By using encrypted tools and following basic security hygiene, sources can drastically reduce the risk of exposure. Our newsroom takes these precautions seriously, and we expect our sources to do the same. We follow best practices recommended by organizations such as the Freedom of the Press Foundation and the Committee to Protect Journalists. We also serve this page over HTTPS without third-party analytics or ad trackers, so that your visit to this page leaves minimal traces.

Email

Email remains the easiest way to reach us. We maintain a general tips email address that is monitored by our editorial team. If you are using email, please be aware of the security risks. Standard email services like Gmail or Outlook do not encrypt messages end-to-end by default. That means your internet service provider, the email provider, and any third party that intercepts the message could read its contents. To enhance security, we recommend using an encrypted email service such as ProtonMail or Tutanota, which provide zero-access encryption. Even better, you can encrypt your message using PGP (Pretty Good Privacy) if you have our public key. However, for most tips, we suggest using Signal instead of email because of its superior security features. If you choose to use email, follow these guidelines: do not use your work email address, do not send from a work device or Wi-Fi network, and avoid including identifying information in the body of the message. If you are at risk of reprisals, avoid using any email altogether and use Signal or a secure drop.

Signal

Signal is a free, open-source messaging app that provides end-to-end encryption for text messages, voice calls, and video calls. It is widely regarded as one of the most secure communication tools available. Signal stores only your phone number and the last time you accessed the app; it does not store who you communicate with, the content of your messages, or your contacts. This makes it an excellent choice for journalists and sources who need to exchange sensitive information. To use Signal, download the app onto a device that is not your work phone. When possible, use a burner phone or a secondary device that is not linked to your personal identity. Depending on the version of Signal, you may need to add our contact number to your address book before starting a conversation. You can delete the contact after the conversation has begun. Signal also supports disappearing messages, which can automatically delete messages after a set period. We recommend enabling this feature for sensitive tips.

When contacting us via Signal, be mindful of metadata. While the content of your messages is encrypted, Signal does retain your phone number and the last time you connected to its servers. If you want to minimize metadata exposure, consider using Signal in combination with a VPN or Tor, or obtain a phone number that is not tied to your real identity. Some sources use Google Voice numbers or prepaid SIM cards to register a Signal account. The Freedom of the Press Foundation offers detailed guidelines for hardening Signal security and minimizing digital footprints. We encourage all prospective sources to review those resources before reaching out.

What Makes a Good Tip

Not all tips lead to stories. The most valuable tips come with corroborating evidence. Documents, photographs, video, audio recordings, or detailed firsthand accounts are far more compelling than anonymous speculation. If you have a document, please describe what it is and how you obtained it. If you are reporting an incident, include as many specifics as possible: dates, locations, names of people involved, and any supporting evidence. We also appreciate context. Tell us why you think this information is important and how it affects the public. You do not need to be a professional journalist to submit a good tip; you just need to be honest and thorough. If you are unsure whether something is newsworthy, send it anyway. We will evaluate it carefully.

Additional Security Recommendations

Beyond choosing the right communication tool, there are several steps you can take to protect yourself before and after contacting us. First, never use a work computer, phone, or network to send a tip. Employers can monitor all activity on corporate devices. Use a personal device on a trusted network. If possible, use a public Wi-Fi network that is not associated with your home or workplace. Consider using a VPN to hide your IP address. Tor Browser can also be used to access our website anonymously. If you are mailing physical documents or USB drives, use a fake return address and send from a public mailbox. Avoid posting about your tip on social media before we have a chance to review it. If you are especially concerned about surveillance, consider using a dedicated burner phone that you purchase with cash. A burner phone used only for communication with the newsroom can protect your identity even if your regular phone is compromised.

We also advise sources to carefully consider what they say to friends, family, or colleagues about their plans. The most common way sources are identified is not through technical surveillance but through loose talk. Keep your intentions private until the story is published or until you have agreed on next steps with our editorial team. After you have submitted a tip, we will respond as soon as possible, but please be patient. If you do not hear back within a week, we may not have enough information to move forward. You are always free to follow up or submit additional evidence. Your safety remains our priority, and we will never publish your identity without your explicit consent.

Journalism thrives when the public trusts that their disclosures will be handled responsibly. By following the best practices outlined above, you can help ensure that your tip reaches our newsroom securely and that your role in bringing important information to light remains protected. We are grateful for the courage and commitment of those who come forward, and we will continue to update these guidelines as technology and threats evolve.


Source: The Verge News


Share:

Your experience on this site will be improved by allowing cookies Cookie Policy