text
stringlengths 0
118
|
---|
apps to communicate with its service over a secure connection.”). |
51. |
Ian Bogost, supra. |
52. |
In the Matter of Facebook, Inc., No. C-4365 (July 24, 2019). |
53. |
See In the Matter of Facebook, Inc., No. C-4365 (July 24, 2019); see also FTC Press Release, |
“FTC Imposes $5 Billion Penalty and Sweeping New Privacy Restrictions on Facebook,” (July |
24, |
2019), |
https://www.ftc.gov/news-events/press-releases/2019/07/ftc-imposes-5-billion- |
penalty-sweeping-new-privacy-restrictions. |
54. |
Id. |
55. |
See Tim Wu, The Attention Merchants (2016). |
56. |
Zack Whittaker, Oracle’s BlueKai Tracks You Across the Web. That Data Spilled Online, |
TechCrunch, (June 19, 2020), https://techcrunch.com/2020/06/19/oracle-bluekai-web-tracking/. |
57. |
Id. |
58. |
Danielle Keats Citron, Spying Inc., 72 Wash. & Lee L. Rev. 1243, 1249–50 (2015) (“Under |
federal law, it is a crime to manufacture, sell, or advertise a device knowing or having reason to |
know that the design of the device renders it “primarily useful” for the covert interception of |
electronic, wire, or oral communications. Twenty-five states and the District of Columbia have |
similar criminal statutes.”). |
59. |
Id. |
60. |
See Kim Zetter, Everything We Know About How the FBI Hacks People, Wired, (May 15, |
2016), https://www.wired.com/2016/05/history-fbis-hacking/ (detailing how the FBI deployed a |
keystroke logger called “Magic Lantern” to access encrypted data by capturing encryption |
keys). |
61. |
Alex Hern, Fitness Tracking App Strava Gives Away Location of Secret US Army Bases, |
Guardian, (Jan. 28, 2018), https://www.theguardian.com/world/2018/jan/28/fitness-tracking- |
app-gives-away-location-of-secret-us-army-bases. |
62. |
Id. |
63. |
See Woodrow Hartzog, Privacy’s Blueprint: The Battle to Control the Design of New |
Technologies (2018); James Grimmelmann, Privacy as Product Safety, 19 Widener L. J. 793 |
(2010); Danielle Keats Citron, Spying Inc., 72 Wash. & Lee L. Rev. 1243 (2015). |
64. |
See Data Protection Commission Fine on Tulsa Child and Family Agency Confirmed in Court, |
(Nov. 6, 2020), https://www.databreaches.net/category/breach-types/exposure/. |
65. |
Joseph Cox, Twitter-Owned SDK Leaking Location Data of Millions of Users, |
DataBreaches.net, (Oct. 21, 2020), https://www.databreaches.net/twitter-owned-sdk-leaking- |
location-data-of-millions-of-users/. |
66. |
Misconfigured Cloud Storage Bucket Exposed Pfizer Drug Safety-Related Reports-Researchers, |
DataBreaches.net, (Oct. 20, 2020), https://www.databreaches.net/misconfigured-cloud-storage- |
bucket-exposed-pfizer-drug-safety-related-reports-researchers/. |
67. |
Zack Whittaker, A Prison Video Visitation Service Exposed Private Calls Between Inmates and |
Their Attorneys, DataBreaches.net, (Oct. 11, 2020), https://www.databreaches.net/a-prison- |
video-visitation-service-exposed-private-calls-between-inmates-and-their-attorneys/. |
68. |
Zack Whittaker & Manish Singh, Dr Lal PathLabs, One of India’s Largest Blood Test Labs, |
Exposed Patient Data, DataBreaches.net, (Oct. 8, 2020), https://www.databreaches.net/dr-lal- |
pathlabs-one-of-indias-largest-blood-test-labs-exposed-patient-data/. |
69. |
Operation Blockbuster Study, https://www.operationblockbuster.com/resources/index.html. |
70. |
Mark Seal, An Exclusive Look at Sony’s Hacking Saga, Vanity Fair, (Mar. 2015), |
http://www.vanityfair.com/hollywood/2015/02/sony-hacking-seth-rogen-evan-goldberg |
(hereafter Vanity Fair). |
71. |
“I used to work for Sony Pictures. My friend still works there and sent me this. It’s on every |
computer |
all |
over |
Sony |
Pictures |
nationwide”, |
Reddit.com, |
(Nov. |
24, |
2016), |
https://www.reddit.com/r/hacking/comments/2n9zhv/i_used_to_work_for_sony_pictures_my_f |
riend_still/ (author deleted, even in earliest archived snapshots). |
72. |
See Vanity Fair supra. |
73. |
Peter Elkind, Inside the Hack of the Century, Part 1, Fortune, (June 25, 2015), |
http://fortune.com/sony-hack-part-1/. |
74. |
A Breakdown and Analysis of the December 2014 Sony Hack, Risk-Based Security, (Dec. 5 |
2014), https://www.riskbasedsecurity.com/2014/12/a-breakdown-and-analysis-of-the-december- |
2014-sony-hack/. |
75. |
See Vanity Fair supra. |
76. |
Kim Zetter, Sony Got Hacked Hard: What We Know and Don’t Know So Far, Wired, (Dec. 3 |
2014), https://www.wired.com/2014/12/sony-hack-what-we-know/. |
77. |
See Risk-Based Security supra. |
78. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.