How does SecureDrop work and why do newsrooms host it as an onion service?

Checked on January 18, 2026
Disclaimer: Factually can make mistakes. Please verify important information or breaking news. Learn more.

Executive summary

SecureDrop is an open‑source whistleblower submission system that runs on newsroom‑controlled servers and requires sources to connect over Tor so their identities and network traces are minimized; submissions are encrypted on upload and journalists retrieve them using air‑gapped, Tails‑booted workstations [1] [2]. Newsrooms host SecureDrop as a Tor onion service because onion services provide end‑to‑end anonymity and encryption, hide the server’s location, and force use of Tor which protects both sources and the newsroom from many network‑level attackers [3] [4].

1. What SecureDrop is and the basic architecture

SecureDrop is software maintained by the Freedom of the Press Foundation that news organizations install on dedicated, on‑premises hardware—typically two segmented servers (an application server and a monitor/security server) behind a firewall—so sources can upload documents and messages into an encrypted repository controlled by the newsroom [1] [2]. The public interface that sources use is only available as a Tor onion service (the Source Interface); when a submission is uploaded it is encrypted in place on the Application Server and stored for journalists to access through separate, hardened journalistic workflows [2] [5].

2. How a source submits material — Tor, onion addresses, and encryption

A source accesses the Source Interface with Tor Browser or a Tails live system and connects to the newsroom’s .onion address, which guarantees that traffic is routed through Tor’s network of relays and that the connection uses the onion‑service protocol that both encrypts and anonymizes the path between client and server [5] [3] [4]. The SecureDrop web application GPG‑encrypts uploaded files for storage so that even on the server the material remains encrypted until retrieved by authorized newsroom staff [1] [2].

3. How journalists retrieve and review submissions — air gaps and operational security

Journalists do not open SecureDrop files on everyday work laptops: they use two specialized machines and USB drives—one Journalist Workstation booted from Tails to pull encrypted bundles via Tor, and a physically air‑gapped Secure Viewing Station to inspect files offline—so that sensitive material never touches the newsroom’s general network and metadata or IP traces are minimized [2] [6]. Administrators manage the servers from dedicated admin workstations and tools like Ansible, and the servers are intended to remain physically on‑site to preserve the security model [2] [5].

4. Why run it as an onion service — technical and threat‑model advantages

Hosting SecureDrop only as a Tor onion service provides several concrete protections: the descriptor and introduction‑point protocol hide the server’s network location, Tor circuits provide layered, encrypted routing between source and service, and requiring Tor prevents many classes of network surveillance or ISP logging from deanonymizing senders—advantages explicitly built into the onion‑service model SecureDrop depends on [4] [3]. The Tor Project and SecureDrop documentation also point out that making the service accessible only via Tor reduces mistakes by sources who might otherwise leak identifying network metadata, since the system will not respond outside Tor [1] [3].

5. Operational tradeoffs, usability and newsroom incentives

Running SecureDrop on‑premises and through Tor imposes operational costs: hardware, administrators, and training (introducing staff takes days), and workflows are deliberately awkward to maximize security—factors that made early deployments difficult and required months of hardening before wider adoption [2] [7]. Despite the friction, newsrooms adopt SecureDrop because it restores a defensible, technically enforceable channel for confidential sourcing—particularly after high‑profile surveillance revelations—while preserving editorial control over evidence and source protection [8] [7].

6. Alternate viewpoints and implicit agendas

Proponents frame SecureDrop as a safety‑first tool that cannot be outsourced without losing its security guarantees, while critics point to usability burdens and potential false comfort if operational best practices aren’t followed; reporting cautions that SecureDrop’s protections depend on correct user behavior (use of Tor/Tails, metadata scrubbing) and diligent server management, and newsrooms explicitly warn users that nothing is risk‑free and to follow guidance when submitting [7] [9] [10]. The Freedom of the Press Foundation’s stewardship and choices—such as providing onion name mapping to make addresses more memorable—reflect an institutional agenda to expand adoption while balancing usability and cryptographic trust [11] [3].

Want to dive deeper?
How do journalists safely strip metadata from leaked documents before publication?
What operational failures have led to SecureDrop deanonymization incidents, and what lessons were learned?
How do Tor onion services protect host location and what are their remaining vulnerabilities?