Editorial Policy

Our Core Commitment

At Aevum News, protecting sources is not just an editorial preference—it is a foundational principle. We recognize that confidential informants, whistleblowers, and at-risk individuals play a vital role in holding power accountable.

Our newsroom operates under a strict zero-disclosure policy. Journalists are legally, technically, and ethically bound to safeguard source identities unless explicit, written consent is granted or a direct, imminent threat to life exists.

We employ military-grade encryption, secure drop infrastructure, and data minimization protocols to ensure that metadata, communications, and submitted documents remain inaccessible to third parties, law enforcement, or malicious actors.

  • 🔒

    End-to-End Confidentiality

    All source communications are encrypted at rest and in transit. Access is strictly need-to-know.

  • ⚖️

    Legal Shield Compliance

    We uphold journalist shield laws where applicable and maintain legal counsel ready for contempt litigation if necessary.

  • 🌐

    Zero-Trace Infrastructure

    Secure servers operate outside host jurisdictions. Logs are purged automatically. No commercial analytics track source interactions.

Security Architecture

Technical Safeguards

Our infrastructure is built on open-source, audited security frameworks designed specifically for investigative journalism.

🔐 SecureDrop Integration Active

Hosted on isolated, air-gapped systems with Tor-only access. Documents and messages are encrypted using GnuPG before reaching editors.

🧹 Metadata Sanitization Automated

All submitted files pass through EXIF stripping, font normalization, and author-identifier removal before editorial review.

📡 Encrypted Messaging Verified

Journalists communicate with sources exclusively via Signal (with disappearing messages), Session, or PGP-encrypted email.

🛡️ Legal Firewalls Enforced

Editorial and legal teams operate in strict silos. Legal counsel never accesses raw source data without court order and editorial consent.

🗑️ Data Retention Limits 30-Day Purge

Unverified or unused submissions are automatically shredded after 30 days. Approved material is archived in isolated cold storage.

🌍 Tor & Proxy Routing Global

Source portals are accessible via Tor hidden services. IP logs are never stored. Geographic routing masks server locations.

For Sources & Whistleblowers

Submit Securely

If you have information in the public interest, we welcome your submission. You may remain completely anonymous. We do not require your name, contact information, or personal identifiers unless you choose to provide them.

Before submitting:

  • Use a clean device or public computer with no personal accounts logged in
  • Disable camera and microphone access
  • Do not submit personal documents containing your name or ID numbers
  • Consider consulting a press freedom attorney in your jurisdiction

All submissions are automatically encrypted. You will receive a one-time recovery key to track status without revealing your identity.

📤

Encrypted Submission Portal

Access our SecureDrop via Tor or direct PGP channel.

Drag & drop encrypted files, or access the secure browser portal

Access SecureDrop (Tor) 🔗

PGP Public Key (for encrypted email):

mQINBF...aevum-secure@protonmail.ch...END PGP PUBLIC KEY BLOCK
Guidelines & Compliance

Legal & Editorial Framework

When will Aevum News break a source's confidentiality?
Never without cause. We will only disclose source information if: (1) a court issues a valid, non-moot subpoena after exhausting all legal defenses, (2) there is an imminent, verifiable threat to human life that cannot be mitigated otherwise, or (3) the source has provided written, informed consent. In all cases, our legal team will file contempt motions before considering any disclosure.
How do you verify information from anonymous sources?
Anonymous claims require corroboration. We demand documentary evidence, cross-referencing with public records, or confirmation from at least one additional independent source. If information cannot be verified, it will not be published, regardless of its sensational value.
What happens to submitted documents after publication?
Documents are redacted automatically. Metadata is stripped. Files are moved to encrypted, offline archives. Access is restricted to senior editors and the assigned investigative team. All digital access logs are monitored and purged quarterly.
Which press freedom laws do you operate under?
Aevum News complies with the strongest available protections in our registered jurisdictions (including U.S. shield laws, EU press privacy directives, and International Press Institute standards). We actively support legislative efforts to strengthen source protection globally.

Contact & Support

Press Freedom Helpline: +1 (800) 123-4567 (Encrypted VoIP)

Legal Support Network: We partner with the International Consortium of Investigative Journalists (ICIJ) and Reporters Without Borders for whistleblower safety protocols.

If you believe your information has been compromised, contact our security team immediately through our verified Signal handle: @AevumSecurity

🛡️ Security Verification

Always verify our contact channels. Official Aevum News communications will:

  • Never ask for passwords or personal credentials
  • Use our verified PGP fingerprint
  • Communicate through encrypted platforms only
  • Be traceable to our published SecureDrop onion address