1. C.E. Shannon, “Communication Theory of Secrecy Systems,” Bell System Tech-nical Journal, no. 4 (October 1949): 656–715.

  2. Whitfield Diffie and Martin Hellman, “New Directions in Cryptography,” IEEETransactions on Information Theory, no. 6 (1976),

  3. “The Official SecureDrop Directory,” Freedom of the Press Foundation,

  4. “HOPE X Schedule,” HOPE,

  5. Kevin Poulsen, “Strongbox and Aaron Swartz,” The New Yorker, 14 May 2013,

  6. Amy Davidson, “Introducing Strongbox,” The New Yorker, 14 May 2013,

  7. Jesse Holcomb, Amy Mitchell, and Kristen Purcell, “Investigative Journalists andDigital Security: Perceptions of Vulnerability and Changes in Behavior,” Pew ResearchCenter, 5 February 2015,

  8. MIT,

  9. Emily Bell, “Facebook Is Eating the World,” Columbia Journalism Review, 7 March2016,

  10. Chris Anderson, Emily Bell, and Clay Shirkey, “Post-Industrial Journalism: Adapt-ing to the Present,” Tow Center for Digital Journalism, 3 December 2014,

  11. Jordan Smith and Micah Lee, “Not So Securus: Massive Hack of 70 Million Pris-oner Phone Calls Indicates Violations of Attorney-Client Privilege,” The Intercept,11 November 2015,

  12. Jenna McLaughlin, “U.S. Mass Surveillance Has No Record of Thwarting LargeTerror Attacks, Regardless of Snowden Leaks,” The Intercept, 17 November 2015,

  13. Colin Freeze, “The Globe Adopts Encrypted Technology in Effort to Protect Whistle-Blowers,” The Globe and Mail, 4 March 2015,

  14. Smith and Lee, “Not So Securus: Massive Hack of 70 Million Prisoner Phone CallsIndicates Violations of Attorney-Client Privilege.”

  15. MIT.