text
stringlengths 0
118
|
---|
31, |
2011), |
https://www.wired.com/2011/10/hacker-glad-he-got-caught/; Kusher, supra. |
17. |
Kushner, supra. ‘Hollywood Hacker’ Who Targeted Scarlett Johansson Given 10 Years in Jail, |
Guardian, (Dec. 17, 2012), https://www.theguardian.com/technology/2012/dec/17/hollywood- |
hacker-christopher-chaney-10-years-jail. |
18. |
Christopher Chaney, So-Called Hollywood Hacker, Gets 10 Years for Posting Celebrities’ |
Personal Photos Online, CBS, (Dec. 18, 2012), http://www.cbsnews.com/news/christopher- |
chaney-so-called-hollywood-hacker-gets-10-years-for-posting-celebrities-personal-photos- |
online/. |
19. |
Walker, supra. |
20. |
CBS, supra. |
21. |
Brief for Respondent, supra at 7. |
22. |
Brief for Respondent, supra at 23. |
23. |
Zetter, supra. |
24. |
CNNsupra; Brief for Respondent, supra. |
25. |
OTRC: Christopher Chaney, Celebrity Hacker, Sentenced to 10 Years in Prison, ABC7 |
Eyewitness News, (2017), http://abc7.com/archive/8923789/. |
26. |
J. Bonneau, C. Herley, P. C. van Oorschot, & F. Stajano, The Quest to Replace Passwords: A |
Framework for Comparative Evaluation of Web Authentication Schemes, IEEE Symposium on |
Security and Privacy (SP) 553, 567, 20–23 May 2012. |
27. |
R. Morris & K. Thompson, Password Security: A Case History, Comm. ACM 22, 11, 594–97 |
(1979); A. Adams & M. Sasse, Users are Not the Enemy, Comm. ACM 42, 12, p. 41–46, |
(1999); C. Herley & P. C. van Oorschot, A Research Agenda Acknowledging the Persistence of |
Passwords, IEEE Security & Privacy, 10, 1, pp. 28–36, 2012; Blase Ur, et al., Helping Users |
Create Better Passwords, USENIX, 37(6): 51–57 (2012). |
28. |
Announcing |
Our |
Worst |
Passwords |
of |
2015, |
TeamPassword, |
(Jan. |
19, |
2016) |
https://www.teamsid.com/worst-passwords-2015/. |
29. |
TeleSign |
Consumer |
Account |
Security |
Report, |
Telesign, |
(June |
3, |
2015), |
https://www.telesign.com/resources/whitepapers/telesign-consumer-account-security-report/. |
30. |
Bruce Schneier, Choosing Secure Passwords, Schneier on Security, (Mar. 3, 2014), |
https://www.schneier.com/blog/archives/2014/03/choosing_secure_1.html. |
31. |
TeleSign |
Consumer |
Account |
Security |
Report, |
Telesign, |
(June |
3, |
2015), |
https://www.telesign.com/resources/whitepapers/telesign-consumer-account-security-report/. |
32. |
Id. |
33. |
Password Minder Infomercial (more information about the infomercial is here): |
http://www.infomercial-hell.com/blog/2013/03/11/password-minder/. |
34. |
Casey Johnston, Password Minder: The Blank Notebook that Got Laughed Out of Production, |
ARS Technica, (May 16, 2013), http://arstechnica.com/gadgets/2013/05/password-minder-the- |
blank-notebook-that-got-laughed-out-of-production/. |
35. |
Internet, |
Groupware, |
& |
Telecommunications, |
Amazon, |
http://www.amazon.com/gp/bestsellers/books/3705/ref=pd_zg_hrsr_b_1_4_last%20%28last%2 |
0visited%20July%2023,%202015%29. |
36. |
Cormac Herley, So Long, and No Thanks For the Externalities: The Rational Rejection of |
Security Advice by Users, NSPW ‘09: Proceedings of the 2009 Workshop on New Security |
Paradigms |
Workshop, |
September |
2009, |
pages |
133–144, |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.