What is SecureDrop?
SecureDrop is an open-source whistleblowing platform developed by the Freedom of the Press Foundation. It allows sources to submit documents and communicate with journalists entirely through Tor hidden services, ensuring that neither the news organization's servers nor network observers can identify the source. Each news organization operates its own independent SecureDrop instance.
SecureDrop uses air-gapped servers, PGP encryption, and Tails OS to create a multi-layered security architecture. Documents are encrypted before storage, and journalists can only access submissions on dedicated, network-isolated machines.
Major News Organization Instances
The New York Times
The Gray Lady operates one of the most prominent SecureDrop instances, accepting leaked documents from sources worldwide.
NYT SecureDrop
The Washington Post
WaPo's SecureDrop instance is a primary channel for national security and government accountability leaks.
Washington Post SecureDrop
The Guardian
The Guardian accepts confidential tips and documents through its SecureDrop instance, particularly for UK and European accountability stories.
Guardian SecureDrop
ProPublica
Nonprofit investigative journalism — one of the first outlets to adopt SecureDrop for source protection.
ProPublica SecureDrop
The Intercept
Founded by Glenn Greenwald, Laura Poitras, and Jeremy Scahill — known for publishing Edward Snowden's NSA documents.
The Intercept SecureDrop
Independent Leak Platforms
GlobaLeaks
GlobaLeaks is an open-source, self-hosted whistleblowing framework. Unlike SecureDrop, GlobaLeaks is designed to be deployed by any organization — NGOs, government agencies, corporations — to establish their own confidential reporting channels.
Distributed Denial of Secrets (DDoSecrets)
A transparency collective that publishes leaked datasets in the public interest. DDoSecrets serves as a WikiLeaks successor with a stronger editorial framework, redacting personally identifying information when appropriate.
Access: ddosecrets.com
OPSEC for Whistleblowers
- Use Tails OS exclusively: Boot from a USB drive on a computer you do not own. Tails leaves zero forensic trace
- Never access SecureDrop from home or work: Use public WiFi from a location not associated with your routine
- Do not tell anyone: The most common source of whistleblower exposure is confiding in colleagues, friends, or family
- Strip metadata: Remove EXIF data, authorship info, and printer tracking dots from documents before submission
- Use the source's codename: SecureDrop generates a unique codename for each source — memorize it, do not write it down digitally
Whistleblowing is protected speech in many jurisdictions. These platforms exist to protect sources who expose corruption, abuse, and threats to public safety. See our OPSEC Fundamentals for additional security guidance.