Where in the article does it say that the leaked information is used as a secret to pass security checks?
You are attacking a straw man here.
Where in the article does it say that the leaked information is used as a secret to pass security checks?
You are attacking a straw man here.