How to protect a ‘source’?