Loading...
private.me Docs
Get xTip
PRIVATE.ME PLATFORM

xTip: Journalist Source Protection

XorIDA splits source documents across independent press organizations with pseudonymous aliases, ensuring no single newsroom holds enough information to expose a source -- even under subpoena.

Legal / Press Freedom COMING SOON XorIDA Powered
Section 01

The Problem

Journalist sources stored at single newsrooms are vulnerable to subpoena, hacking, or insider leaks. Source exposure can be life-threatening in authoritarian contexts and career-ending in corporate whistleblowing.

Investigative journalism depends on source protection. Yet the documents, communications, and identity information that connect a source to a story are typically stored on a single newsroom's servers. A government subpoena, a targeted hack, or a rogue insider can expose the entire source relationship in one breach.

Existing tools like SecureDrop protect the submission channel but not the stored documents. Once a document is on a newsroom server, it is as vulnerable as any other file. Shield laws provide legal protection in some jurisdictions but offer no technical guarantee. A compromised server exposes every source the newsroom has ever protected.

The Old Way

Source Docs Sensitive material SINGLE NEWSROOM Complete Source Record Subpoena vulnerable Hack exposes all sources Insider leak risk Source Exposed Life-threatening consequences
Section 02

The PRIVATE.ME Solution

xTip splits source documents across independent press organizations using XorIDA. Each newsroom holds only a partial share. Pseudonymous aliases decouple source identity from document custody.

When a journalist receives sensitive material, protectSource() splits the documents into N shares distributed across independent newsrooms or press freedom organizations. No single newsroom holds a reconstructable copy. A subpoena to one newsroom produces only an unintelligible share -- mathematically useless without the threshold.

Sources are identified by pseudonymous aliases rather than real names. The alias-to-identity mapping is itself split across custodians using the same threshold scheme. Even the journalist's own newsroom cannot unilaterally deanonymize a source. Document classification via classifyDocument() assigns sensitivity levels that determine the threshold and distribution pattern.

The New Way

Source Doc + Alias XORIDA SPLIT + HMAC Chain Pseudonymous aliases Newsroom A Partial share Newsroom B Partial share Press Org N Partial share RECONSTRUCT Verified + Audited Multi-party consent
Section 03

How It Works

Source protection operates through three layers: document splitting, alias management, and classification-based routing. Each layer uses XorIDA independently.

LAYER 1 Document Split XorIDA K-of-N across newsrooms LAYER 2 Alias Management Pseudonymous identity mapping LAYER 3 Classification Sensitivity-based routing SUBPOENA RESISTANCE No single newsroom holds reconstructable documents or source identity
Key Security Properties
Subpoena resistance: A subpoena to any single newsroom produces only an unintelligible share. Source anonymity: Pseudonymous aliases split across custodians prevent unilateral deanonymization. Classification routing: Higher-sensitivity documents use higher thresholds and more custodians automatically.
Section 04

Use Cases

Journalism
Investigative Journalism

Source documents for long-running investigations split across cooperating newsrooms. No single breach exposes the investigation or the sources behind it.

Source Protection
Compliance
Whistleblower Protection

Corporate and government whistleblower documents split across independent organizations. Retaliation requires compromising multiple independent custodians.

Dodd-Frank / SOX
NGO
Press Freedom Organizations

International press freedom groups serve as distributed custodians across jurisdictions. No single government can compel full document release.

Cross-Jurisdiction
Legal
Source Document Custody

Legal teams and media lawyers hold shares of source material. Attorney-client privilege adds a legal layer on top of the cryptographic protection.

Dual Protection
Section 05

Integration

Quick Start
import { protectSource, classifyDocument } from '@private.me/sourcesplit';

// Classify document sensitivity
const classification = await classifyDocument(documentBuffer);
// classification.level: 'CRITICAL' | 'HIGH' | 'STANDARD'

// Protect source with 3 independent newsrooms (2-of-3)
const shares = await protectSource(documentBuffer, 'ALIAS-7X92', [
  'newsroom-a.example',
  'newsroom-b.example',
  'press-freedom.example'
]);

console.log(shares.length); // 3 -- one per newsroom
protectSource(document: Buffer, alias: string, newsrooms: string[]): Promise<SourceShare[]>
Splits a source document into K-of-N shares using XorIDA and distributes them across the specified newsrooms or press organizations. Associates the document with a pseudonymous alias. Returns an array of SourceShare objects containing share receipts and distribution confirmations.
classifyDocument(document: Buffer): Promise<Classification>
Analyzes a document to determine its sensitivity classification. Returns a Classification object with sensitivity level, recommended threshold, and suggested custodian count. Higher sensitivity automatically triggers higher thresholds.
Section 06

Security Properties

PropertyMechanismGuarantee
Document ConfidentialityXorIDA K-of-N thresholdInformation-theoretic
Source AnonymityPseudonymous aliases + split mappingNo unilateral deanonymization
Subpoena ResistanceDistributed custody across jurisdictionsSingle-newsroom subpoena yields nothing
Document IntegrityHMAC-SHA256 per shareTamper-evident
Quantum ResistanceGF(2) operations, no keysUnconditional security
<1ms
Typical payload
K-of-N
Threshold scheme
0
Single-party exposure
256-bit
HMAC integrity
VERIFIED BY XPROVE

Verifiable Data Protection

Every operation in this ACI produces a verifiable audit trail via xProve. HMAC-chained integrity proofs let auditors confirm that data was split, stored, and reconstructed correctly — without accessing the data itself.

XPROVE AUDIT TRAIL
Every XorIDA split generates HMAC-SHA256 integrity tags. xProve chains these into a tamper-evident audit trail that proves data was handled correctly at every step. Upgrade to zero-knowledge proofs when regulators or counterparties need public verification.

Read the xProve white paper →
GET STARTED

Ready to deploy xTip?

Talk to Ren, our AI sales engineer, or book a live demo with our team.

Book a Demo

© 2026 StandardClouds Inc. dba PRIVATE.ME. All rights reserved.

VERIFIABLE WITHOUT CODE EXPOSURE

Ship Proofs, Not Source

xTip generates cryptographic proofs of correct execution without exposing proprietary algorithms. Verify integrity using zero-knowledge proofs — no source code required.

XPROVE CRYPTOGRAPHIC PROOF
Download proofs:

Verify proofs online →

Use Cases

🏛️
REGULATORY
FDA / SEC Submissions
Prove algorithm correctness for distributed systems without exposing trade secrets or IP.
Zero IP Exposure
🏦
FINANCIAL
Audit Without Access
External auditors verify secure operations without accessing source code or production systems.
FINRA / SOX Compliant
🛡️
DEFENSE
Classified Verification
Security clearance holders verify distributed systems correctness without clearance for source code.
CMMC / NIST Ready
🏢
ENTERPRISE
Procurement Due Diligence
Prove security + correctness during RFP evaluation without NDA or code escrow.
No NDA Required

Deployment Options

📦

SDK Integration

Embed directly in your application. Runs in your codebase with full programmatic control.

  • npm install @private.me/xtip
  • TypeScript/JavaScript SDK
  • Full source access
  • Enterprise support available
Get Started →
🏢

On-Premise Upon Request

Enterprise CLI for compliance, air-gap, or data residency requirements.

  • Complete data sovereignty
  • Air-gap capable deployment
  • Custom SLA + dedicated support
  • Professional services included
Request Quote →

Enterprise On-Premise Deployment

While xTip is primarily delivered as SaaS or SDK, we build dedicated on-premise infrastructure for customers with:

  • Regulatory mandates — HIPAA, SOX, FedRAMP, CMMC requiring self-hosted processing
  • Air-gapped environments — SCIF, classified networks, offline operations
  • Data residency requirements — EU GDPR, China data laws, government mandates
  • Custom integration needs — Embed in proprietary platforms, specialized workflows

Includes: Enterprise CLI, Docker/Kubernetes orchestration, RBAC, audit logging, and dedicated support.

Contact sales for assessment and pricing →