Skip to main content
⚡ LIMITED TIME

FOUNDER OFFER - Pay for 1 Year → Get 3 Years

of Zero-Knowledge Cloud Encryption

Founder Badge & RecognitionPriority Support & Early Access3x Value - Best Deal Ever
📰

Protect Your Sources, Protect Your Work

Nygma gives journalists the tools to keep sources safe, maintain confidentiality, and resist surveillance.

Zero-Knowledge
Duress Mode
Time Bomb

The Unique Threats You Face

🎯

Source Protection

Whistleblowers and confidential sources trust you with sensitive information that could endanger them if exposed.

Traditional Risk:

  • Government can subpoena cloud providers
  • Providers can be forced to hand over data
  • Your sources get exposed

Nygma Protection:

  • Zero-knowledge = we can't hand over what we can't see
  • Client-side encryption = sources safe even if breached
  • No master keys = cannot decrypt even if forced
🌍

Cross-Border Reporting

Traveling through authoritarian countries with sensitive information on your devices.

Traditional Risk:

  • Device inspection at borders
  • Forced unlock of phones/laptops
  • Discovery of sensitive documents

Nygma Protection:

  • Duress Mode = show decoy content when forced to unlock
  • Time Bomb = auto-wipe if detained long-term
  • Encrypted everything = can't casually browse your files
📡

Surveillance Resistance

Intelligence agencies and adversarial governments targeting journalists.

Traditional Risk:

  • Server-side scanning
  • Metadata analysis
  • Pattern detection
  • Communications monitoring

Nygma Protection:

  • Zero-knowledge = nothing to scan
  • Encrypted metadata = can't analyze patterns
  • No content visibility = no surveillance value

Extended Detention Risk

Journalists detained and unable to delete sensitive materials.

Traditional Risk:

  • Data remains accessible
  • Sources exposed during detention
  • No remote deletion possible

Nygma Protection:

  • Time Bomb = auto-wipe after set inactivity period
  • Email warnings (or stealth mode)
  • Guaranteed deletion if can't access account

How Journalists Use Nygma

Real-world scenarios from the field

📱

Border Crossing with Sensitive Files

Sarah, investigative journalist, traveling to interview sources in a country with strict media controls.

Setup:

  • Real drive: Source documents, interview recordings
  • Decoy drive: Public articles, research papers
  • Duress password set
  • Time bomb: 7 days with Alert Mode

At Border:

  1. 1. Officer demands phone unlock
  2. 2. Sarah uses duress password
  3. 3. Officer sees: Public articles, legitimate research
  4. 4. No red flags → Sarah proceeds
  5. 5. Real sources remain hidden

Backup Protection:

If detained >7 days, Time Bomb wipes everything. Sources protected even if she can't manually delete.

💼

Whistleblower Document Protection

Michael, journalist, receives leaked documents from government whistleblower.

Risk:

  • Government could subpoena cloud provider
  • Insider threat at cloud company
  • Legal pressure to reveal source

Nygma Solution:

  • Whistleblower uploads to Michael's encrypted drive
  • Documents encrypted before upload (zero-knowledge)
  • Even if government subpoenas Nygma, we have nothing
  • Michael's password never stored, cannot be forced
  • Source identity protected mathematically

Legal Protection:

Zero-knowledge providers have successfully fought court orders - cannot decrypt what they cannot decrypt.

🏛️

Newsroom Data Breach

News organization suffers data breach. Hackers access internal systems and cloud storage.

Traditional Cloud Impact:

  • All documents exposed
  • Sources identified
  • Ongoing investigations compromised
  • Whistleblower identities revealed

Nygma Impact:

  • Hackers get encrypted blobs (useless)
  • No keys stored on servers
  • Sources remain safe
  • Investigations can continue

Even NSA can't break AES-256. Your sources stay safe even against nation-state actors.

Recommended Setup for Journalists

Suggested Plan

Professional (2TB)

Includes: Duress Mode + Time Bomb

2TB storage
ChaCha20 encryption
Priority support

$14.99/month

or $149.99/year

Duress Mode Setup

Real Drive: "Work Files"

Source documents, recordings, sensitive communications

Decoy Drive: "Research"

Published articles, public research, non-sensitive interviews

Time Bomb Config

High-Risk Assignments:

1-2 weeks, Alert or Stealth mode

General Use:

1-3 months, Alert mode (safety net)

Protect Your Sources with Nygma

Start with a free account. Upgrade to Professional to unlock Duress Mode and Time Bomb protection.
Full protection for your sources and sensitive data.

No credit card
Full features