Where in the article does it say that the leaked information is used as a secret to pass security checks?

You are attacking a straw man here.