How to Leak a Secret
Buy a cheap laptop that you’ll only use for leaks., Create an email address designated for leaks., Access wifi from a public place., Download and use the Tor Browser.
Step-by-Step Guide
-
Step 1: Buy a cheap laptop that you’ll only use for leaks.
Your personal computer will almost certainly have personal information stored on it, which makes it easy to find.
You also never want to use a work computer.
Use cash to buy a cheap laptop and designate it for leaks.
Keep it powered off at all times except when you are using it to leak secrets.If the power is on, the location of the laptop can be tracked.
Never use this laptop for anything except leaking information, and never use it to enter any personal information.
Don’t access social media or financial accounts. -
Step 2: Create an email address designated for leaks.
You may already have multiple email accounts, but they all have at least your name attached.
Use Gmail or another service to establish an email account for leaks.
Do not enter any personal information, especially your name or phone number.Make the name something generic that would not have any ties to you.
Examples are: [email protected], [email protected], or [email protected]. , Each wifi access point has information attached to it which specifically identifies it.
Leaks from a personal or workplace wifi source are easy to track.
Your online activity will be tagged with that IP address.
Go somewhere public like a coffee shop as another layer of anonymity., This browser uses a system of relay networks which hides your information when you connect to the internet through them.
By using Tor, you’ll hide your location and IP address, as well as personal info attached to a computer.To download the browser and find out more about how it works, visit the Tor Browser website. -
Step 3: Access wifi from a public place.
-
Step 4: Download and use the Tor Browser.
Detailed Guide
Your personal computer will almost certainly have personal information stored on it, which makes it easy to find.
You also never want to use a work computer.
Use cash to buy a cheap laptop and designate it for leaks.
Keep it powered off at all times except when you are using it to leak secrets.If the power is on, the location of the laptop can be tracked.
Never use this laptop for anything except leaking information, and never use it to enter any personal information.
Don’t access social media or financial accounts.
You may already have multiple email accounts, but they all have at least your name attached.
Use Gmail or another service to establish an email account for leaks.
Do not enter any personal information, especially your name or phone number.Make the name something generic that would not have any ties to you.
Examples are: [email protected], [email protected], or [email protected]. , Each wifi access point has information attached to it which specifically identifies it.
Leaks from a personal or workplace wifi source are easy to track.
Your online activity will be tagged with that IP address.
Go somewhere public like a coffee shop as another layer of anonymity., This browser uses a system of relay networks which hides your information when you connect to the internet through them.
By using Tor, you’ll hide your location and IP address, as well as personal info attached to a computer.To download the browser and find out more about how it works, visit the Tor Browser website.
About the Author
Mark Mendoza
Professional writer focused on creating easy-to-follow home improvement tutorials.
Rate This Guide
How helpful was this guide? Click to rate: