// Comparison
Extreme Privacy vs Hacks, Leaks, and Revelations: Which Should You Read?
Two cybersecurity books on Privacy, compared honestly: who each is for, what each does best, and which to read first.
Michael Bazzell's defender-side companion to OSINT Techniques: a step-by-step program for removing yourself from data brokers, public records, and the everyday surveillance economy without going off-grid.
Micah Lee on the operational craft of working with leaked datasets: authentication, OPSEC for sources and journalists, and the Python tooling to actually parse what arrives in your dropbox.
Read this if
Skip this if
Key takeaways
- Privacy is a continuous practice, not a one-time purge: data brokers re-acquire your records every quarter, and the workflow is what holds the line.
- The hardest links to break are the ones you created yourself — utility accounts, professional licensing, vehicle titles — and most of the book is the playbook for breaking them.
- Most leaks come from people who used to know you; the book's chapters on family, devices, and shared services are the most underrated.
- Verification is half the work; the book's framing of authentication-by-cross-reference and provenance-by-metadata is the cleanest in print.
- Source OPSEC is structural, not personal; the book's chapters on SecureDrop, Tails, and Tor align with current practitioner standards.
- Python plus Aleph plus DataSette plus a few small custom scripts is enough to handle most real-world leaks; the book's pragmatic tooling choices avoid academic over-engineering.
How they compare
We rate Extreme Privacy higher (5/5 against 4/5 for Hacks, Leaks, and Revelations). For most readers, that means Extreme Privacy is the primary pick and Hacks, Leaks, and Revelations is a useful follow-up.
Extreme Privacy is pitched at intermediate level. Hacks, Leaks, and Revelations is pitched at beginner level. Read the easier one first if you're not yet comfortable with the topic.
Extreme Privacy and Hacks, Leaks, and Revelations both cover Privacy, OSINT, so reading them in sequence reinforces the same material from different angles.
Keep reading
Hacks, Leaks, and Revelations
→ Alternatives to Hacks, Leaks, and Revelations→ What to read after Hacks, Leaks, and Revelations