The best way to reach me is via email at jennifer [dot] valentino [at] nytimes [dot] com. You can also follow me on Twitter @jenvalentino.
For encrypted email, please use the public PGP key here. I also am available on Signal, on a Google Voice number at three-four-seven-six-eight-seven-nine-three-five-six and am on Keybase as jenvalentino.
I understand that these technologies are not foolproof and are not effective if running on a compromised machine. If you’d prefer me to set up Tails or a virtual machine — or to follow other protocols — just let me know.
(I talk to a lot of computer-security professionals, who tend to have strict requirements about these things, even for having relatively mundane conversations.)
If you’re not a computer-security pro, you might be wondering: What is she talking about?
Well, PGP encrypts your data — documents, emails and so forth. People who use PGP to communicate have “keys” that lock their data so it can be unlocked only by those they trust. The other technologies also involve encryption, making it difficult for your conversations to be intercepted.
You need to be running special programs for these tools to work. I hope to provide updated instructions in the future; in the meantime, a few old instructions — which are still somewhat useful — are here.