How to Leak a Secret

Buy a cheap laptop that you’ll only use for leaks., Create an email address designated for leaks., Access wifi from a public place., Download and use the Tor Browser.

4 Steps 2 min read Medium

Step-by-Step Guide

  1. Step 1: Buy a cheap laptop that you’ll only use for leaks.

    Your personal computer will almost certainly have personal information stored on it, which makes it easy to find.

    You also never want to use a work computer.

    Use cash to buy a cheap laptop and designate it for leaks.

    Keep it powered off at all times except when you are using it to leak secrets.If the power is on, the location of the laptop can be tracked.

    Never use this laptop for anything except leaking information, and never use it to enter any personal information.

    Don’t access social media or financial accounts.
  2. Step 2: Create an email address designated for leaks.

    You may already have multiple email accounts, but they all have at least your name attached.

    Use Gmail or another service to establish an email account for leaks.

    Do not enter any personal information, especially your name or phone number.Make the name something generic that would not have any ties to you.

    Examples are: [email protected], [email protected], or [email protected]. , Each wifi access point has information attached to it which specifically identifies it.

    Leaks from a personal or workplace wifi source are easy to track.

    Your online activity will be tagged with that IP address.

    Go somewhere public like a coffee shop as another layer of anonymity., This browser uses a system of relay networks which hides your information when you connect to the internet through them.

    By using Tor, you’ll hide your location and IP address, as well as personal info attached to a computer.To download the browser and find out more about how it works, visit the Tor Browser website.
  3. Step 3: Access wifi from a public place.

  4. Step 4: Download and use the Tor Browser.

Detailed Guide

Your personal computer will almost certainly have personal information stored on it, which makes it easy to find.

You also never want to use a work computer.

Use cash to buy a cheap laptop and designate it for leaks.

Keep it powered off at all times except when you are using it to leak secrets.If the power is on, the location of the laptop can be tracked.

Never use this laptop for anything except leaking information, and never use it to enter any personal information.

Don’t access social media or financial accounts.

You may already have multiple email accounts, but they all have at least your name attached.

Use Gmail or another service to establish an email account for leaks.

Do not enter any personal information, especially your name or phone number.Make the name something generic that would not have any ties to you.

Examples are: [email protected], [email protected], or [email protected]. , Each wifi access point has information attached to it which specifically identifies it.

Leaks from a personal or workplace wifi source are easy to track.

Your online activity will be tagged with that IP address.

Go somewhere public like a coffee shop as another layer of anonymity., This browser uses a system of relay networks which hides your information when you connect to the internet through them.

By using Tor, you’ll hide your location and IP address, as well as personal info attached to a computer.To download the browser and find out more about how it works, visit the Tor Browser website.

About the Author

M

Mark Mendoza

Professional writer focused on creating easy-to-follow home improvement tutorials.

41 articles
View all articles

Rate This Guide

--
Loading...
5
0
4
0
3
0
2
0
1
0

How helpful was this guide? Click to rate: