Skip to content

Research Security

How to conduct research safely without exposing yourself or compromising your sources. This guide covers research-specific security practices.


When researching sensitive topics:

  • Your searches can be tracked
  • Your identity can be linked to research activity
  • You may inadvertently expose sources
  • Research targets may detect your interest
  • Browser fingerprinting can identify you across sessions

Key principle: “Distrust and verify” — no single tool provides complete protection. Layer your defenses based on your threat model.


Beyond VPNs and secure browsers (covered in the DFP Guide), research may require full system isolation.

Best for: Field operations, one-off research, leaving no trace

FeatureDetails
TypeLive USB operating system
TraceLeaves nothing on host computer
NetworkRoutes all traffic through Tor
SetupBoot from USB, no installation

Use cases:

  • Research from untrusted computers
  • Journalism in hostile environments
  • Quick investigations requiring no persistence

Download: tails.net

Best for: Ongoing research projects, persistent workflows

FeatureDetails
TypeTwo-VM system (Gateway + Workstation)
TracePersistent storage available
NetworkAll traffic forced through Tor gateway
SetupRequires VirtualBox or KVM

Architecture:

  • Whonix-Gateway: Handles all Tor connections
  • Whonix-Workstation: Where you do your work
  • Even if workstation is compromised, your IP can’t leak

Download: whonix.org

Best for: Multi-project separation, maximum isolation

FeatureDetails
TypeSecurity-focused operating system
TraceCompartmentalized VMs
NetworkConfigurable per-VM
SetupDedicated hardware required

Key feature: Each activity runs in a separate VM. Email, browsing, and research are completely isolated from each other.

Download: qubes-os.org

SituationRecommended
One-time sensitive lookupTails
Ongoing investigationWhonix
Multiple projects, high riskQubes OS
Lower-risk general researchVM with VPN
Quick checkBrowser profile + VPN

The Quick DFP Guide covers general browser recommendations. For research specifically, these provide enhanced anti-fingerprinting:

Best for: Anti-fingerprinting without Tor’s speed penalty

Everyone using Mullvad Browser appears identical to websites, making individual tracking nearly impossible. Uses Tor-grade protection (letterboxing, font standardization) without routing through Tor.

Download: mullvad.net/browser

Best for: Hardened Firefox with maximum privacy

All telemetry removed, uBlock Origin built-in. Excellent protection against cross-session tracking.

Download: librewolf.net

BrowserFingerprint ProtectionSpeedBest For
Tor BrowserExcellentSlowMaximum anonymity
Mullvad BrowserExcellentFastResearch without Tor
LibreWolfVery GoodFastDaily privacy browsing

Warning: Anti-fingerprinting browser extensions are easily detected and can make you MORE identifiable. Use browsers with built-in protection.


Best for: Internal anonymous communications, dead drops

FeatureDetails
Nodes~50,000 (vs Tor’s ~10,000)
RoutingGarlic routing (bundled encrypted messages)
Sites.i2p “eepsites”
DesignFully decentralized

Key differences from Tor:

  • All I2P traffic stays within the I2P network
  • No central directory authority
  • Every node relays traffic by default
  • Short-lived tunnels reduce attack surface

Use cases:

  • Internal network communications
  • Anonymous hosting
  • Peer-to-peer file sharing

Download: geti2p.net


Fabricated online personas to protect your real identity during research.

Essential components:

  • Untraceable email account
  • Realistic but fictional identity
  • Consistent backstory and details
  • Dedicated password manager (separate from personal)
  1. Email: Use ProtonMail or Tutanota with VPN/Tor
  2. Phone: Burner phone with cash-purchased SIM (where legal)
  3. Identity: Consistent fictional details
  4. Passwords: Unique for each account, stored in dedicated KeePass database

Useful for managing multiple research identities in one browser:

  • Each container is isolated (cookies, storage)
  • Can assign specific sites to specific containers
  • Prevents cross-account tracking

Install: Firefox Multi-Account Containers

  • Sock puppet use has legal implications in some jurisdictions
  • Distinguish between passive research and active deception
  • Never use for harassment or illegal purposes
  • Consider whether deception is necessary for your research

Best for: Sharing files with sources anonymously

FeatureDetails
NetworkTor (direct computer-to-computer)
StorageFiles never uploaded to cloud
EncryptionEnd-to-end
FeaturesSend, receive, chat, host websites

How it works:

  1. Start OnionShare and add files
  2. Share the .onion address with recipient
  3. Recipient downloads directly from your computer
  4. No third-party servers involved

Use cases:

  • Receiving documents from sources
  • Sharing research findings securely
  • Quick anonymous chat

Download: onionshare.org

For organizations needing a permanent whistleblower submission system. More complex to set up but designed for institutional use.

Website: securedrop.org


For sharing text and code securely during research:

ServiceNotes
Disroot BinPrivateBin instance, E2E encrypted
PrivateBinSelf-hostable, zero-knowledge
CryptPadEncrypted docs, pads, collaboration
0binClient-side encryption
PaasterE2E encrypted with paste history

Passive (lower risk):

  • Reading public information
  • Search engine queries
  • Viewing public social media
  • Using caches/archives

Active (higher risk):

  • Direct interaction with targets
  • Creating accounts on target platforms
  • Sending requests to target systems
  • Downloading files from targets
  • Use cached versions when available
  • Check archive.org before visiting directly
  • Avoid repeated visits to the same resource
  • Don’t click through from your main search
ToolPurpose
Wayback MachineView archived pages
Google CacheGoogle’s cached version
Archive.todayCreate/view snapshots

  • VPN connected (see DFP Guide)
  • Using research browser/profile/VM
  • Logged out of personal accounts
  • Research accounts ready
  • Secure storage location prepared
  • Threat model understood
  • Not clicking suspicious links
  • Not downloading unknown files
  • Using caches when possible
  • Taking notes securely
  • Not mixing personal/research activity
  • Documenting sources
  • Saving and encrypting findings
  • Clearing browser data
  • Disconnecting from VPN
  • Reviewing what you accessed
  • Securely deleting temporary files

  1. Stop research activity immediately
  2. Disconnect from network
  3. Assess what was exposed
  4. Change relevant passwords (from a different device)
  5. Notify affected parties if needed
  6. Document the incident

For full incident response, see Incident Response Guide.

  • Unexpected account activity
  • Devices behaving strangely
  • Unknown login attempts
  • Being contacted about research activity
  • Increased targeted ads related to research topics

CategoryToolBest ForSetup
IsolationTailsField operationsLow
IsolationWhonixPersistent researchMedium
IsolationQubes OSMulti-projectHigh
BrowserMullvadAnti-fingerprintingLow
BrowserLibreWolfFirefox ecosystemLow
NetworkI2PInternal commsMedium
File ShareOnionShareSource communicationLow
PastebinPrivateBinText sharingLow

For VPNs, password managers, MFA, and mobile security, see the DFP Guide and Mobile Hardening Guide.


  • Hunchly - Automatic web capture for investigations
  • Sherlock - Username search across platforms
  • IntelX - Data leak and darknet search