Our Recommended VPNs
Chosen after real-world testing across speed, privacy, and streaming. Each ranking is independent — we buy every VPN at retail and test it ourselves.
Fastest speeds, audited no-logs, 6000+ servers
Unlimited devices, CleanWeb blocker, 100+ countries
Swiss privacy laws, open-source, free tier
Lifetime plans, 10 devices, ad blocker
We earn a commission when you click “Get” buttons, at no extra cost to you. Read our affiliate disclosure
The Journalist Threat Model
Journalists face the highest threat level of any civilian profession. Your adversaries may include:
- Government intelligence agencies (domestic and foreign)
- Law enforcement seeking to identify sources
- Corporations you're investigating
- Hacktivists and cybercriminals targeting media organizations
- State-sponsored hackers (Pegasus spyware, etc.)
Your security stack must match this threat level.
The Journalist Security Stack
Tier 1: Essential (Everyone)
- VPN: Proton VPN or Proton VPN (not NordVPN — you need open-source, audited, privacy-maximum)
- Encrypted messaging: Signal (only Signal — not WhatsApp, not Telegram regular chats)
- Encrypted email: ProtonMail for source communication
- Password manager: Bitwarden or 1Password with hardware key 2FA
- Full-disk encryption: BitLocker/FileVault enabled
- 2FA: Hardware security keys (YubiKey) on email, cloud, and social media
Tier 2: Investigating Sensitive Topics
- Tor Browser: For research that shouldn't be linked to your identity
- Tails OS: Amnesic operating system that leaves no trace (boot from USB)
- SecureDrop: For receiving anonymous tips (if your organization runs one)
- Separate devices: Dedicated reporting device, not your personal phone
- VPN + Tor: Connect VPN first, then Tor for maximum anonymity
Tier 3: Hostile Environment
- Travel device: Dedicated device with minimal data for entering hostile countries
- Satellite communication: Satellite phone for areas with no or compromised cellular
- Physical security: Threat assessment before travel, emergency contacts, check-in protocols
VPN Selection for Journalists
Don't use: NordVPN, Proton VPN, FastestVPN — these are consumer VPNs optimized for speed and streaming. They're fine for most people but journalists need maximum privacy guarantees.
Use instead:
- Proton VPN — No email, no name, cash payments, proven no-logs (police seizure found nothing), open-source
- Proton VPN — Swiss jurisdiction, open-source, Secure Core routing, transparency reports
Source Protection Rules
- Never communicate with sources on regular phone/email — Signal only
- Never store source identities on connected devices — airgapped notes or mental only
- Use Tor for researching topics linked to your sources
- Assume your phone is compromised — Pegasus-style spyware exists
- Verify Signal safety numbers in person with sources
- Use disappearing messages in Signal for sensitive conversations
Continue learning
Related Guides
How to Share Passwords Safely: Stop Using Slack and Email (2026)
Secure methods for sharing passwords, API keys, and credentials with teammates. Password manager sharing, Bitwarden Send, and one-time links.
Device Encryption Guide: Protect Your Data If Your Laptop Is Lost (2026)
How to enable full-disk encryption on Windows, Mac, iOS, and Android. Your data stays secure even if your device is stolen.
Endpoint Security for Remote Workers: Beyond Antivirus (2026)
Your devices are endpoints in the security chain. Modern endpoint protection goes beyond antivirus — here's what you need in 2026.
Was this guide helpful?
What's next
Keep exploring
Sources & Citations
- 1Committee to Protect Journalists (CPJ): Digital Safety Kit
- 2EFF: Surveillance Self-Defense for Journalists
- 3Reporters Without Borders: Digital Security Resources

