Skip to main content
Security Guide

VPN for Journalists: Source Protection & Secure Reporting (2026)

Journalists face state-level threats. How to protect sources, secure communications, and maintain anonymity while reporting.

Sarah Chen — Lead Security Editor
Sarah Chen·CISSPCompTIA Security+·Lead Security Editor
Updated
Sarah Chen — Lead Security Editor
Sarah ChenCISSPCompTIA Security+

Lead Security Editor · San Francisco, CA

Updated Editorial policy
Editor's picks

Our Recommended VPNs

Chosen after real-world testing across speed, privacy, and streaming. Each ranking is independent — we buy every VPN at retail and test it ourselves.

EDITOR'S PICK
NordVPN logo
Best Overall
NordVPN
4.8/ 5

Fastest speeds, audited no-logs, 6000+ servers

Audited no-logs policyThreat Protection blocks malware10 devices per account30-day money-back guarantee
Save 74%
was $12.99/mo
$3.39/mo
Get NordVPN
30-day money-back guarantee
Read full NordVPN review
Surfshark logo
Best for Unlimited Devices
Surfshark
4.6/ 5

Unlimited devices, CleanWeb blocker, 100+ countries

Unlimited simultaneous devicesCleanWeb ad & malware blockerRAM-only server network30-day money-back guarantee
Save 87%
was $15.45/mo
$1.99/mo
Get Surfshark
30-day money-back guarantee
Read full Surfshark review
Proton VPN logo
Best for Privacy
Proton VPN
4.5/ 5

Swiss privacy laws, open-source, free tier

Swiss jurisdiction (no data laws)Open-source and auditedSecure Core multi-hopFree tier available forever
50% off
was $9.99/mo
$4.99/mo
Get Proton VPN
30-day money-back guarantee
Read full Proton VPN review
FastestVPN logo
Best Budget
FastestVPN
4.2/ 5

Lifetime plans, 10 devices, ad blocker

Lifetime deal available10 devices per accountBuilt-in ad blockerNo-logs policy
Save 89%
was $10/mo
$1.11/mo
Get FastestVPN
30-day money-back guarantee
Read full FastestVPN review

We earn a commission when you click “Get” buttons, at no extra cost to you. Read our affiliate disclosure

2 min read

The Journalist Threat Model

Journalists face the highest threat level of any civilian profession. Your adversaries may include:

  • Government intelligence agencies (domestic and foreign)
  • Law enforcement seeking to identify sources
  • Corporations you're investigating
  • Hacktivists and cybercriminals targeting media organizations
  • State-sponsored hackers (Pegasus spyware, etc.)

Your security stack must match this threat level.

The Journalist Security Stack

Tier 1: Essential (Everyone)

  • VPN: Proton VPN or Proton VPN (not NordVPN — you need open-source, audited, privacy-maximum)
  • Encrypted messaging: Signal (only Signal — not WhatsApp, not Telegram regular chats)
  • Encrypted email: ProtonMail for source communication
  • Password manager: Bitwarden or 1Password with hardware key 2FA
  • Full-disk encryption: BitLocker/FileVault enabled
  • 2FA: Hardware security keys (YubiKey) on email, cloud, and social media

Tier 2: Investigating Sensitive Topics

  • Tor Browser: For research that shouldn't be linked to your identity
  • Tails OS: Amnesic operating system that leaves no trace (boot from USB)
  • SecureDrop: For receiving anonymous tips (if your organization runs one)
  • Separate devices: Dedicated reporting device, not your personal phone
  • VPN + Tor: Connect VPN first, then Tor for maximum anonymity

Tier 3: Hostile Environment

  • Travel device: Dedicated device with minimal data for entering hostile countries
  • Satellite communication: Satellite phone for areas with no or compromised cellular
  • Physical security: Threat assessment before travel, emergency contacts, check-in protocols

VPN Selection for Journalists

Don't use: NordVPN, Proton VPN, FastestVPN — these are consumer VPNs optimized for speed and streaming. They're fine for most people but journalists need maximum privacy guarantees.

Use instead:

  1. Proton VPN — No email, no name, cash payments, proven no-logs (police seizure found nothing), open-source
  2. Proton VPN — Swiss jurisdiction, open-source, Secure Core routing, transparency reports

Source Protection Rules

  1. Never communicate with sources on regular phone/email — Signal only
  2. Never store source identities on connected devices — airgapped notes or mental only
  3. Use Tor for researching topics linked to your sources
  4. Assume your phone is compromised — Pegasus-style spyware exists
  5. Verify Signal safety numbers in person with sources
  6. Use disappearing messages in Signal for sensitive conversations

Found this helpful?

Share it with someone who needs it

Continue learning

Related Guides

Was this guide helpful?

Sources & Citations

  1. 1Committee to Protect Journalists (CPJ): Digital Safety Kit
  2. 2EFF: Surveillance Self-Defense for Journalists
  3. 3Reporters Without Borders: Digital Security Resources