File Encryption for Reporters: The Complete Digital Safety Guide
1. Introduction: The New Frontline of Journalism
The physical risks of journalism have never been higher. In 2024 alone, 124 journalists were killed, making it the deadliest year for the press on record according to the Committee to Protect Journalists (CPJ). But today, physical safety is inextricably linked to digital safety. A seized laptop or a compromised phone isn’t just a loss of hardware—it’s a direct threat to the lives of your sources.
For years, the industry has focused heavily on secure communication. Reporters know to use Signal for chats and ProtonMail for tips. Yet, there is a glaring gap in this defense: data at rest.
While your messages might be encrypted in transit, what happens to your notes, drafts, and scanned documents once they sit on your hard drive?
State-level surveillance is no longer a dystopian fiction. At least 180 journalists have been confirmed as targets of the Pegasus spyware (IBAHRI, 2024). This software can exfiltrate files directly from your device. If those files are sitting open in your “Documents” folder, they are free for the taking.
This guide isn’t about turning you into a cybersecurity engineer. It’s about a fundamental ethical obligation. Protecting your sources means ensuring that even if your device falls into the wrong hands, your files remain unreadable.
To understand the technology that makes this possible, you can read more about What is AES-256 Encryption, but the good news is: you don’t need to be a math whiz to use it.
2. Why Reporters Need File Encryption (Beyond the Hype)
There is a dangerous misconception that digital security is only for those covering national security or cartels. This “low stakes” myth leaves countless reporters vulnerable. Whether you are covering City Hall corruption, local police beats, or corporate malfeasance, you are a target.
The reality is that when a reporter’s digital security fails, the source pays the price. According to the Center for News, Technology & Innovation (CNTI, 2024), 64% of journalists facing high levels of risk report that their sources also face high levels of risk. If your notes on a whistleblower are exposed, that source could lose their job, their freedom, or their life.
The Legal Privilege vs. Technical Reality
Many reporters rely on “Reporter’s Privilege” or shield laws to protect their notes from subpoenas. While these laws are vital, they are legal defenses, not technical ones. A court order might respect your privilege, but a hacker, a corrupt official, or a border agent seizing your device does not.
Micah Lee, former Director of Information Security at The Intercept, explains the shift in the landscape perfectly:
“It used to be that if you really needed to protect your source, you could just not tell the government who your source was… Things have completely changed now; everything is being spied on. Now the government can just look through your e-mails or through your text messages or through all of the digital evidence that exists.”
File encryption ensures that your “digital evidence”—your interview transcripts, audio recordings, and scanned leaks—cannot be read without your permission, regardless of who physically possesses the drive.
3. Real-World Risk Scenarios
Abstract warnings often get ignored in the rush of a deadline. To understand why file encryption is necessary, let’s look at three specific scenarios where standard protections fail.
Scenario A: The Border Crossing (Physical Seizure)
The Story: Elena, a freelance investigative journalist, returns from a trip in Central America. Customs agents seize her laptop for a “routine inspection.” Elena is smart—she has Full-Disk Encryption enabled on her laptop. However, she backed up her audio interviews onto a USB drive before the flight.
The Failure: The agents copy the contents of the unencrypted USB drive before returning it. The drive contained raw audio of dissidents. Two weeks later, her key source is arrested.
The Fix: If Elena had encrypted the specific audio files before moving them to the USB drive, the agents would have copied useless, scrambled data. File-level encryption travels with the file, protecting it on any device.
Scenario B: The Spear Phishing Attack (Malware)
The Story: Mark covers city politics. He receives an email about a “leaked budget.” It’s a spear-phishing attack—the primary infection vector in 41% of cybersecurity incidents (IBM Security, 2023). Mark clicks the link, and malware silently installs on his machine.
The Failure: The malware scans his hard drive for keywords like “confidential,” “draft,” and “source.” It uploads his entire investigation folder to a remote server. The corrupt officials he was investigating kill the story and intimidate his witnesses.
The Fix: Malware generally runs with the user’s permissions. If Mark’s sensitive files were encrypted “at rest” (individually locked), the malware could steal the files, but the attackers would not be able to open them.
Scenario C: The Cloud Sync Breach
The Story: Sarah, a health reporter, stores patient records and whistleblower notes in Dropbox for easy access. She believes her cloud provider is secure. However, she reuses a password from an old account, and her cloud credentials are breached.
The Failure: The attackers log into her cloud account. Because she uploaded standard Word and PDF documents, the attackers can read every patient name immediately. This leads to a massive HIPAA violation and lawsuits against her publication.
The Fix: Client-side encryption. If Sarah had encrypted the files on her computer before dragging them to Dropbox, the cloud provider (and the hackers) would only see locked data blobs. They would need her specific decryption password to read anything.
4. Full-Disk vs. File-Level Encryption: What Reporters Get Wrong
One of the most common mistakes journalists make is assuming that because they turned on FileVault (Mac) or BitLocker (Windows), they are “done.”
Full-Disk Encryption (FDE) is essential. The CPJ rightly advises reporters to “Turn on full-disk encryption for all devices.” FDE protects your data when your computer is turned off. If your laptop is stolen out of your car, the thief cannot access your hard drive.
The Gap: Once you turn on your computer and log in, FDE unlocks everything. If you send a file via email, upload it to the cloud, or copy it to a thumb drive, that file is no longer encrypted. It is stripped of its protection the moment it leaves your hard drive.
File-Level Encryption is different. It locks the specific document itself.
Think of it this way:
- Full-Disk Encryption is locking the front door of your newsroom. It stops random strangers from walking in.
- File-Level Encryption is locking the specific safe where the evidence is kept. Even if someone gets past the front door (or if you invite them in), they still can’t open the safe.
For a deeper dive into the technical differences, read our guide on Full Disk vs File Encryption.
5. Integrating Encryption into the Newsroom Workflow
Security tools often fail because they are too difficult to use on a deadline. You don’t have time to run command-line scripts when an editor is screaming for copy. Here is how to integrate encryption without slowing down.
Protecting Drafts & Notes
Make it a habit to encrypt interview transcripts immediately after typing them. If you are working on a long-term investigation, keep the active draft in a secure state. Decrypt it to work on it, then re-encrypt it when you step away from your desk.
Cloud Storage Hygiene
“Is Google Drive safe?” This is the most common question we hear. The answer is: No, not for sensitive sources. Google (and hackers who compromise Google accounts) can technically read your files.
However, you don’t have to abandon the cloud. You just need to change your workflow:
- Encrypt locally: Use a tool to encrypt your file on your laptop.
- Upload the encrypted file: Move the locked
.skror.zipfile to Google Drive. - Decrypt only when needed: Download and unlock it locally.
Sharing with Sources
You cannot expect a nervous whistleblower to learn how to use PGP keys. If you make security too hard, they will just send you an unencrypted email.
Avoid complex setups for non-technical sources. Use simple, browser-based encryption tools. You can encrypt a file, send them the file, and then send the password via a separate, secure channel (like Signal). This “out-of-band” authentication is secure enough for most scenarios and easy for sources to understand.
A Note on Metadata: Encryption hides the content of your files, but it does not always hide the metadata (creation date, location, author). Be sure to scrub metadata from files before sharing them to protect your source’s anonymity.
6. How to Encrypt Files with Sekura (Step-by-Step)
For reporters, we built sekura.app to address the specific constraints of the job.
- No Installation: You can use it on a borrowed computer or an internet cafe machine without leaving installed software behind.
- Offline Capable: Once the page loads, you can disconnect from the internet. The encryption happens entirely in your browser—no data is ever sent to our servers.
- Cross-Platform: It works on your MacBook, your Windows desktop, or your Android phone in the field.
The Process
- Select Your File: Go to sekura.app and drag your sensitive document (PDF, Audio, Doc) into the window.
- Set a Strong Passphrase: Choose a phrase that is long and memorable. We recommend using a “diceware” style phrase (e.g.,
correct-horse-battery-staple). - Click Encrypt: The app uses AES-256 encryption to lock the file.
- Download: Save the encrypted file to your drive.
Critical Step: Once you have the encrypted version, ensure you securely delete (shred) the original unencrypted file so it cannot be recovered.
7. FAQ: Common Questions from the Field
What happens if I forget my password? If you lose your password, the data is gone forever. There is no “reset” button and no back door. This is the price of true security. We recommend storing your passphrases in a secure password manager.
How do I share an encrypted file with my editor? Send the encrypted file via your standard email or Slack. Then, send the password via a secure messenger like Signal. By separating the file and the key, you ensure that if your email is hacked, the attacker still cannot open the file.
Is it illegal to encrypt files when traveling? It depends on where you are going. The CPJ advises researching encryption restrictions for the country you are visiting. Some nations legally demand passwords at border crossings. In extreme risk environments, it may be safer not to carry the data at all.
Does encryption stop Pegasus? This is a nuanced answer. If your phone is infected with Pegasus and the attacker is recording your screen while you have the document open, encryption won’t help. However, encryption does prevent the mass exfiltration of stored files. It adds a critical layer of defense, making the attacker’s job much harder.
8. Conclusion & Digital Safety Checklist
Harlo Holmes, Director of Digital Security at the Freedom of the Press Foundation, puts it best: “Encryption should be part of every journalist’s toolkit.”
Digital hygiene is no longer an optional skill for the tech-savvy few; it is a core competency of modern reporting. You protect your physical notes; you must protect your digital ones.
Your Digital Safety Checklist
- Enable Full-Disk Encryption (FileVault/BitLocker) on all devices immediately.
- Encrypt sensitive files individually before uploading them to the cloud or moving them to USB drives.
- Use strong, unique passphrases for every encrypted file.
Don’t wait for a subpoena or a hack to take security seriously.
Secure your next scoop. Encrypt your source files now with sekura.app.
Protect your files with sekura.app
AES-256 encryption for your sensitive files. Simple drag-and-drop interface, works on Mac and Windows.
Download Sekura FreeSekura is listed on