text
stringlengths
0
118
apps to communicate with its service over a secure connection.”).
51.
Ian Bogost, supra.
52.
In the Matter of Facebook, Inc., No. C-4365 (July 24, 2019).
53.
See In the Matter of Facebook, Inc., No. C-4365 (July 24, 2019); see also FTC Press Release,
“FTC Imposes $5 Billion Penalty and Sweeping New Privacy Restrictions on Facebook,” (July
24,
2019),
https://www.ftc.gov/news-events/press-releases/2019/07/ftc-imposes-5-billion-
penalty-sweeping-new-privacy-restrictions.
54.
Id.
55.
See Tim Wu, The Attention Merchants (2016).
56.
Zack Whittaker, Oracle’s BlueKai Tracks You Across the Web. That Data Spilled Online,
TechCrunch, (June 19, 2020), https://techcrunch.com/2020/06/19/oracle-bluekai-web-tracking/.
57.
Id.
58.
Danielle Keats Citron, Spying Inc., 72 Wash. & Lee L. Rev. 1243, 1249–50 (2015) (“Under
federal law, it is a crime to manufacture, sell, or advertise a device knowing or having reason to
know that the design of the device renders it “primarily useful” for the covert interception of
electronic, wire, or oral communications. Twenty-five states and the District of Columbia have
similar criminal statutes.”).
59.
Id.
60.
See Kim Zetter, Everything We Know About How the FBI Hacks People, Wired, (May 15,
2016), https://www.wired.com/2016/05/history-fbis-hacking/ (detailing how the FBI deployed a
keystroke logger called “Magic Lantern” to access encrypted data by capturing encryption
keys).
61.
Alex Hern, Fitness Tracking App Strava Gives Away Location of Secret US Army Bases,
Guardian, (Jan. 28, 2018), https://www.theguardian.com/world/2018/jan/28/fitness-tracking-
app-gives-away-location-of-secret-us-army-bases.
62.
Id.
63.
See Woodrow Hartzog, Privacy’s Blueprint: The Battle to Control the Design of New
Technologies (2018); James Grimmelmann, Privacy as Product Safety, 19 Widener L. J. 793
(2010); Danielle Keats Citron, Spying Inc., 72 Wash. & Lee L. Rev. 1243 (2015).
64.
See Data Protection Commission Fine on Tulsa Child and Family Agency Confirmed in Court,
(Nov. 6, 2020), https://www.databreaches.net/category/breach-types/exposure/.
65.
Joseph Cox, Twitter-Owned SDK Leaking Location Data of Millions of Users,
DataBreaches.net, (Oct. 21, 2020), https://www.databreaches.net/twitter-owned-sdk-leaking-
location-data-of-millions-of-users/.
66.
Misconfigured Cloud Storage Bucket Exposed Pfizer Drug Safety-Related Reports-Researchers,
DataBreaches.net, (Oct. 20, 2020), https://www.databreaches.net/misconfigured-cloud-storage-
bucket-exposed-pfizer-drug-safety-related-reports-researchers/.
67.
Zack Whittaker, A Prison Video Visitation Service Exposed Private Calls Between Inmates and
Their Attorneys, DataBreaches.net, (Oct. 11, 2020), https://www.databreaches.net/a-prison-
video-visitation-service-exposed-private-calls-between-inmates-and-their-attorneys/.
68.
Zack Whittaker & Manish Singh, Dr Lal PathLabs, One of India’s Largest Blood Test Labs,
Exposed Patient Data, DataBreaches.net, (Oct. 8, 2020), https://www.databreaches.net/dr-lal-
pathlabs-one-of-indias-largest-blood-test-labs-exposed-patient-data/.
69.
Operation Blockbuster Study, https://www.operationblockbuster.com/resources/index.html.
70.
Mark Seal, An Exclusive Look at Sony’s Hacking Saga, Vanity Fair, (Mar. 2015),
http://www.vanityfair.com/hollywood/2015/02/sony-hacking-seth-rogen-evan-goldberg
(hereafter Vanity Fair).
71.
“I used to work for Sony Pictures. My friend still works there and sent me this. It’s on every
computer
all
over
Sony
Pictures
nationwide”,
Reddit.com,
(Nov.
24,
2016),
https://www.reddit.com/r/hacking/comments/2n9zhv/i_used_to_work_for_sony_pictures_my_f
riend_still/ (author deleted, even in earliest archived snapshots).
72.
See Vanity Fair supra.
73.
Peter Elkind, Inside the Hack of the Century, Part 1, Fortune, (June 25, 2015),
http://fortune.com/sony-hack-part-1/.
74.
A Breakdown and Analysis of the December 2014 Sony Hack, Risk-Based Security, (Dec. 5
2014), https://www.riskbasedsecurity.com/2014/12/a-breakdown-and-analysis-of-the-december-
2014-sony-hack/.
75.
See Vanity Fair supra.
76.
Kim Zetter, Sony Got Hacked Hard: What We Know and Don’t Know So Far, Wired, (Dec. 3
2014), https://www.wired.com/2014/12/sony-hack-what-we-know/.
77.
See Risk-Based Security supra.
78.