Evaluation Methodology

How we evaluate tools. Published so anyone can reproduce our assessments.

What we evaluate

Every tool is assessed across three dimensions:

1. Security posture

2. Ownership and trust

3. Practical value

Security ratings

Each tool receives one of four ratings:

Strong

Robust encryption, minimal data retention, independent audits, transparent ownership. Recommended for all threat levels.

Adequate

Reasonable security practices for standard journalism work. May have some limitations for sensitive reporting.

Caution

Functional tool but with notable security or privacy concerns journalists should understand before using. Use with awareness.

Warning

Significant security, privacy, or trust issues. Not recommended for journalism work involving any sensitive material.

What we don't do

How to challenge an assessment

If you believe an evaluation contains an error — whether you're a journalist, a tool maker, or anyone else — submit a correction. We respond to factual corrections within 7 days.