Search the site
Press ESC to close
LIVE
Loading...
Updating...
Standards document

Unnamed
& Anonymous
Sources

Our policy on when we grant anonymity, how we evaluate sources who request it, how we protect their identities, and exactly what language appears in articles when we cannot name our sources.

Updated 1 February 2026
Source identity always protected
01

Why this policy exists

Anonymous sources are necessary in journalism. Some of the most important reporting in history depended on people who could not put their names on what they knew. The cryptocurrency industry — with its culture of pseudonymity, its employment relationships that create strong disincentives to public dissent, and its regulatory grey areas — regularly produces situations where the most credible and most important information comes from sources who cannot be named.

At the same time, the anonymous source is a tool that has been widely abused in financial journalism. It has been used to plant rumours. It has been used by insiders to move markets. It has been used to attack competitors under the cover of press protection. It has allowed accusations to be made without accountability.

This policy exists to enable CryptoFox to use anonymous sources when they are genuinely necessary — and to prevent their abuse. It defines clearly when anonymity is justified, how sources are evaluated, and what readers are told when we rely on unnamed sources.

Our default is always named sources. Anonymity is granted when it is necessary to obtain important information that would otherwise be unavailable — not for the convenience of a source who would simply prefer not to be quoted.
02

When anonymity is justified

Anonymity may be granted to a source when all three of the following conditions are met:

  • The information is important and cannot be obtained on the record. The story is genuinely in the public interest and the information would not be available without protecting the source's identity.
  • There is a credible and serious reason why the source cannot speak publicly. Examples include: fear of retaliation by an employer; personal safety risk; legal or professional restrictions on disclosure; whistleblowing against a powerful organisation. "Preferring not to be quoted" or "wanting to stay on message" are not sufficient reasons.
  • The reporter has verified the source's identity and assessed their credibility. Anonymous sources are not anonymous to the reporter. We know who they are. We have evaluated whether they have direct knowledge of what they are telling us.

A source may provide background information — helping a reporter understand a situation, suggesting avenues to pursue — without being granted anonymity for direct quotation. Background is not the same as sourcing a factual claim. Claims require verification regardless of how they were brought to our attention.

03

Evaluating an anonymous source

Before a reporter may use an anonymous source for a factual claim, they must be able to answer yes to each of the following evaluation questions. If the answer to any question is no, the editor must decide whether the story can proceed with the source's information attributed differently or held until additional sourcing is obtained.

Direct knowledge: Does the source have firsthand, direct knowledge of the specific claims they are making — not hearsay or inference?
Identity verified: Has the reporter verified who the source actually is, including their current or former role and how that role would give them access to this information?
Credible reason for anonymity: Is there a serious, credible reason why this source cannot speak on the record — beyond personal preference or PR management?
No undisclosed motive: Is the reporter aware of any personal, financial, or political motive the source may have to share this information, and has that motive been considered in evaluating the claim?
Red flag — attacking others: Is the source primarily using the cover of anonymity to make negative claims about a rival, an ex-employer, or a competitor? This is one of the most common misuses of anonymous sourcing and requires extra scrutiny.
Red flag — market-moving information: Does the claim relate to token prices, token sales, regulatory investigations, or other information whose publication would foreseeably move markets? These claims require the highest level of scrutiny and corroboration.

The reporter must disclose the source's identity to the Managing Editor before any story relying on an anonymous source is published. Editors cannot grant approval for anonymous-source stories if the reporter has not disclosed who the source is.

04

Corroboration requirements

Claims from a single anonymous source are not sufficient to publish a factual assertion as established fact. Every significant factual claim from an unnamed source must be corroborated — either by a second independent source, or by documentary or on-chain evidence.

  • A second independent anonymous source counts as corroboration if the two sources are genuinely independent — they have not shared information with each other and their knowledge derives from different positions.
  • A primary document — a regulatory filing, a leaked internal communication, a block explorer record — that supports the claim counts as corroboration even in the absence of a second source.
  • A single anonymous source whose claim is not corroborated may be published in limited circumstances, but only with: editor approval; a clear attribution note in the article identifying this as a single-source claim; and only if the public interest in the information is judged to outweigh the risks of potentially inaccurate reporting.
Claims about token prices, fundraises, valuations, or financial transactions require corroboration from a document, on-chain data, or a named source — not only from an unnamed source — before they are reported as fact. Market-moving claims from anonymous sources without documentary corroboration are not published.
05

Attribution language

When we use anonymous sources, the attribution language in the article must give the reader as much context as possible about who the source is and what their connection to the story is — without identifying them. Vague attribution is not acceptable. We aim to describe the source's relevant position and proximity to the information being cited.

The following phrases illustrate the standard we apply:

Preferred
"…according to a person with direct knowledge of the discussions who spoke on condition of anonymity because they were not authorised to speak publicly"
Use when: source has firsthand knowledge; anonymity is due to employer restriction
Preferred
"…three people briefed on the matter said, asking not to be identified discussing private negotiations"
Use when: multiple sources; topic is sensitive commercial information
Acceptable
"…a former employee of the company who requested anonymity citing concerns about professional retaliation"
Use when: source is a whistleblower or former employee with specific safety concern
Acceptable
"CryptoFox could not independently verify [the specific claim]. One person familiar with the situation said…"
Use when: a single-source claim cannot be corroborated; signals evidential status to reader
Not permitted
"…sources said" / "…according to insiders" / "…sources familiar with the matter said"
Too vague. Does not tell readers who the source is or why they cannot be named. Use one of the forms above.
06

What sources cannot use anonymity for

Anonymity grants a source protection from identification. It does not grant them immunity from editorial scrutiny, or the ability to use our platform to make claims without accountability. The following uses of anonymous sourcing are not permitted at CryptoFox under any circumstances:

  • Personal attacks on named individuals using language that would be potentially defamatory if stated on the record. A source cannot say something anonymously that a named person would be legally exposed for saying.
  • Advocacy or opinion presented as factual reporting. If a source wishes to express a view, not relay a fact, the distinction must be clear in the article or the quote cannot be used.
  • Statements that amount to market manipulation — for example, falsely claiming a token is about to be listed on a major exchange, or spreading false information about a regulatory investigation.
  • Information the source obtained by illegal means, unless the public interest in the information and the nature of the underlying wrongdoing clearly outweighs the illegality of the obtaining method — a judgement made by the Editor-in-Chief, not the individual reporter.
  • Spin or narrative management on behalf of a company or individual who could easily speak on the record but is using anonymity to advance their interests while avoiding accountability.
How to identify narrative-management sourcing
A common pattern: a company faces bad news (a regulatory probe, a staff exodus, a product failure). Representatives call journalists "as sources" to offer context or spin, citing speaking restrictions. The information they provide is self-serving and not independently verifiable. This is PR activity, not journalism sourcing. If a person is representing the interests of the entity they are theoretically speaking confidentially about, their information should be treated as a company statement — attributed to the company, not to a confidential source.
07

Protecting source confidentiality

When we promise a source confidentiality, that promise is absolute. We do not reveal the identity of a confidential source to anyone outside the journalist and the Managing Editor — not to other editorial staff, not to the company being reported on, not to other sources, and not to our ownership.

Operational security

Sources who are concerned about operational security when communicating sensitive information are encouraged to contact us using the following methods, in descending order of security:

  • Signal: contact details available on request via our main editorial email. Signal encrypts messages end-to-end and does not store metadata on its servers.
  • Encrypted email: reporters can provide PGP public keys on request for encrypted email communication.
  • Standard email (editorial@cryptofox.news) — less secure, but acceptable for less sensitive communications.

Reporters are advised not to discuss confidential sources or sensitive stories on unencrypted channels, corporate email systems, or any platform that could be subject to legal discovery without seeking legal advice first.

Source confidentiality note for readers: If you contact CryptoFox with sensitive information and ask for confidentiality, we will protect your identity. If you are unsure how to contact us securely, email editorial@cryptofox.news and we will advise you on secure communication options before you share anything sensitive.
08

Legal demands & compelled disclosure

CryptoFox will resist any legal attempt to compel the disclosure of a confidential source. If we receive a court order, subpoena, or other legal demand seeking to identify a source, we will immediately seek legal representation and oppose the demand through all available legal channels.

We will not voluntarily disclose source identity to law enforcement, regulatory bodies, or any other party without a court order. And even with a court order, we will pursue all available appeals before complying.

Our ability to resist such demands depends on the legal jurisdiction in which we operate and the specific circumstances of the case. We cannot guarantee that a court order can always be successfully resisted — but we can guarantee that we will use every available legal mechanism to try.

Sources who are sharing information that could create significant legal risk for themselves or for CryptoFox are strongly encouraged to seek independent legal advice before making contact. We are journalists, not lawyers, and we cannot provide legal advice to sources.

Have information to share?

We protect every source who asks for confidentiality. If you have a tip and aren't sure how to reach us securely, email us and we'll advise on the safest way to proceed.