Best Encrypted Messaging for Journalists
Published March 2026 · Last updated March 2026
Signal is the best encrypted messaging app for journalists. It's end-to-end encrypted, open-source, collects almost no metadata, and has been independently audited. For decentralized communication, use Element. For situations where even metadata is a risk, use Briar. WhatsApp and Telegram are not recommended for sensitive journalism work.
Why encrypted messaging matters
Source protection depends on communication security. Standard text messages and email travel in plaintext or are accessible to the service provider. A subpoena, a hack, or a rogue employee can expose everything.
End-to-end encryption (E2E) means only you and the recipient can read the message. The service provider cannot decrypt it, even under legal compulsion. But encryption alone isn't enough — metadata (who you talked to, when, how often) can be just as revealing as content.
App comparison
| Feature | Signal | Element | Briar | Telegram | |
|---|---|---|---|---|---|
| E2E encrypted by default | Yes | Yes | Yes | Yes | No |
| Open-source | Yes | Yes | Yes | No | Partially |
| Metadata collected | Minimal | Minimal | None | Extensive | Extensive |
| Phone number required | Yes (registration) | No | No | Yes | Yes |
| Decentralized | No | Yes (Matrix) | Yes (P2P) | No | No |
| Independent audit | Yes | Yes | Yes | Protocol only | Limited |
Recommended apps
Best default for all journalists
Signal — End-to-end encrypted messages, voice, and video calls. Open-source, independently audited, and run by a nonprofit. Signal's servers store almost no data — only account creation date and last connection date. Enable disappearing messages for source conversations.
Best for decentralized / newsroom teams
Element — Built on the Matrix protocol. Federated (like email — anyone can run a server), E2E encrypted, and no phone number required. Newsrooms can self-host their own Matrix server for full control. Useful for team communication where Slack-style features are needed with real encryption.
Best for high-risk / metadata-sensitive situations
Briar — Peer-to-peer messaging via Tor, Wi-Fi, or Bluetooth. No central server, no phone number, no metadata trail. Both users must be online simultaneously for messages to sync. Android only. Use when even knowing that two people communicated is dangerous.
Best for encrypted video meetings
Jitsi Meet — Free, open-source video conferencing. No account needed — share a link and join in the browser. Supports E2E encryption. Can be self-hosted for full control. A solid alternative to Zoom when you need encrypted video without vendor lock-in.
Apps to avoid for sensitive work
WhatsApp — not recommended
WhatsApp uses the Signal protocol for message encryption, but Meta collects extensive metadata. Your contact list, group memberships, message timestamps, IP addresses, and device information are all visible to Meta. WhatsApp also backs up messages to Google Drive or iCloud unencrypted by default. Metadata alone can identify sources.
Telegram — not recommended
Telegram is not end-to-end encrypted by default. Regular messages and all group chats are stored on Telegram's servers in a format the company can read. Only "Secret Chats" (one-to-one, manually enabled) use E2E encryption. Telegram's custom MTProto protocol has received less independent scrutiny than the Signal protocol.
Best practices for secure messaging
- Enable disappearing messages in Signal for all source conversations. Set the timer to 1 week or less.
- Verify safety numbers when first connecting with a source on Signal. This confirms you're not being intercepted.
- Use a separate phone number for Signal registration if possible. A prepaid SIM or VoIP number protects your personal number.
- Set a PIN and registration lock in Signal to prevent someone from re-registering your number.
- Don't screenshot sensitive conversations. Screenshots persist in photo libraries, cloud backups, and device storage.
- Remember both devices matter. Your messages are encrypted in transit, but they exist in plaintext on both endpoints. Your security is only as strong as your source's device security.
Frequently asked questions
Is WhatsApp safe for journalists?
WhatsApp uses the Signal protocol for message encryption, but Meta collects extensive metadata: who you message, when, how often, your IP address, phone number, contacts list, and group memberships. This metadata alone can identify sources. WhatsApp also stores unencrypted backups to Google Drive or iCloud by default. Use Signal instead.
Is Telegram encrypted?
Telegram is not end-to-end encrypted by default. Regular chats and all group chats use server-side encryption, meaning Telegram can read them. Only 'Secret Chats' (one-to-one, manually enabled) use end-to-end encryption. Telegram's custom MTProto protocol has not received the same level of independent review as Signal's protocol. Do not use Telegram for sensitive journalism.
Can Signal messages be subpoenaed?
Signal can be subpoenaed, but it has almost nothing to hand over. Signal's servers store only two pieces of data per account: the date the account was created and the date it last connected. No message content, no contacts, no group information, no profile data. Signal has published subpoena responses confirming this. Enable disappearing messages to limit what exists on devices.
Do I need to use my real phone number with Signal?
Signal requires a phone number to register, which can be a privacy concern. You can use a secondary number from a prepaid SIM, Google Voice, or a VoIP service. Signal added username support in 2024, letting you share a username instead of your phone number with contacts, though a number is still needed for registration.
What about Apple iMessage?
iMessage is end-to-end encrypted between Apple devices, but Apple holds the encryption keys for iCloud backups by default. Law enforcement regularly obtains iMessage content through iCloud warrants. Enable Advanced Data Protection in iCloud settings to close this gap, or use Signal for sensitive conversations.
Which messaging app should I tell sources to use?
Signal. It's free, available on iOS and Android, and most people can install it in under a minute. For sources who cannot install new apps, a phone call is better than a text message. For whistleblowers or high-risk sources, consider SecureDrop for initial contact and Briar for ongoing communication.
Can I use Signal for video calls?
Yes. Signal supports end-to-end encrypted voice and video calls, including group calls up to 40 participants. For larger meetings or when participants can't install Signal, Jitsi Meet provides end-to-end encrypted video conferencing in the browser with no account required.