Note: This is only for editorial tips. For advertising, technical support, and other inquiries, go here.
Vox relies on knowledgeable inside sources to help us understand the news so we can explain it to our readers. If you have information that the public needs to know — especially about wrongdoing by governments, corporations, or other powerful institutions — we want to hear from you. We’re committed to protecting the confidentiality of sources who don’t want to be publicly identified, and we use technology like PGP and SecureDrop to help sources communicate with us securely.
How to tip Vox
Email is the easiest way to reach us. Send tips to the general Vox email here: firstname.lastname@example.org.
You can find emails for specific Vox reporters by clicking on their names in the Vox staff list.
If you are at risk of reprisal, do not to use your work email or computer. For added security, create a new, anonymous email account for communication with us, and set up and use the account via public (not home) wifi, or with the anonymous Tor browser.
Some of our reporters use PGP, which encrypts the contents of emails but does not disguise the sender or recipient. Reporters with keys and beats are listed below. You should also be able to find their PGP information in their Twitter bio.
Alex Ward, International Security and Defense
4AEA D802 E162 4CE6 A766 DE46 0D6A 8143 D424 433A
Alexia Campbell, Economic Policy
9928 5AC4 8A49 44FF A6BF FB8A 9980 3C2D C75F 72B8
Brian Resnick, Science
229A C31B 8C89 63C6 BD03 A36C 5888 5415 AFD9 EFC9
Julia Belluz, Healthy Policy
F65A 5539 A081 B01E 1E8D 498D 6489 E570 AEAB E972
Yochi Dreazen, Foreign Policy
590E 74E2 3DDF 62E3 2F00 A9F0 119F B065 9B5A DCD0
SecureDrop is the most secure way to send documents to Vox, although it requires some additional work. Accessible only through the Tor browser, our SecureDrop instance can be reached by pasting 2cq26ys7wjhryrzw.onion into the browser’s address bar. After submitting documents, you will be given a password that will allow you to check for responses at the same address.
The Tor network will disguise which site you’re visiting, and SecureDrop will not store any information that could identify you. Network operators may still be able to see that you have accessed the Tor network, so you should avoid accessing SecureDrop from potentially hostile networks, such as at your workplace.
In accordance with best practices set by the Freedom of the Press Foundation, this page is being served over HTTPS without third-party analytics or ad trackers.
Illustration by Javier Zarracina/Vox