Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: nickcarraway
I found Dan Kaminsky's theory interesting:

A theory offered on Twitter by security expert Dan Kaminsky, chief scientist at WhiteOps.com, is that someone who was collecting a cache of the celebrity nudes may have been hacked by the person or people who spread the images online over the weekend. If the photos were collected by a person from different sources over a long period of time, it could explain why some of the images appear to be genuine and others are allegedly fake.
That would also explain why many of the pictures were taken by Android phones, Windows PC webcams, had Tumblr watermarks, etc., and variously didn't come from Apple devices.
4 posted on 09/02/2014 2:47:43 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 3 | View Replies ]


To: Swordmaker

They should use ancient technology-Polaroids!


7 posted on 09/02/2014 2:54:07 AM PDT by Dr. Ursus
[ Post Reply | Private Reply | To 4 | View Replies ]

To: Swordmaker
I found Dan Kaminsky's theory interesting

That's probably not too far from reality. One way you can get into an iCloud account: A very significant number of unsophisticated users use the same password for everything and never change it. Many of these same users also use their email address for their user name. One exploit in Internet Explorer (for example) where a hacker gets your password gets them into all of your accounts. Your pictures are either going to be in iCloud or Google Drive depending on your device. Real world example. A few years ago there was an online e-tailer software package that stored passwords in clear text. You could use a hacking technique called "SQL injection" and get it to dump it's entire database of account names and passwords. From there, you just go to other places the user might have an account and mine away. Information security is an oxymoron. Anything and everything stored electronically is vulnerable.

36 posted on 09/02/2014 4:27:11 AM PDT by IamConservative (If fighting fire with fire is a good idea, why do the pros use water?)
[ Post Reply | Private Reply | To 4 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson