In September 2014, a hacker named Ryan Collins leaked nude pictures of many celebrities. This isn’t the first time a female actor has had to deal with sex abuse online. Obviously, the situation must have been a nightmare for her family. Some of these pictures are of TV actress Sarah Shahi, who recently got into trouble for leaked pictures of her private parts. Some of the actresses have gone as far as taking NSFW pictures with their friends. These pictures are mostly of actors and actresses. These pictures feature a few famous faces from the Hollywood. NSFW fappening picturesĪfter the release of a leak, fans of the celebrities are starting to share NSFW pictures. The photos were stolen from Apple’s iCloud accounts, enabling the attackers to flood the web with celebrity photos. The first incident of this kind took place in 2014, when a group of anonymous hackers leaked private photos of celebrities. 1 September 2014.The Fappening is an internet leak in which cybercriminals use stolen selfies to lure victims. “Naked celebrity hack: security experts focus on iCloud backup theory”. Use it for data that would’t harm you if it were stolen and made publicly, you will have more than enough local storage room left for your private files, especially in the age where a terabyte of hardware data storage costs no more than $50.Ĭharles, Arthur. So, back to the easy solution: just don’t store any data that you would absolutely not want anyone to see into the cloud. They can use simple tools that randomly guess millions of passwords in a few seconds until they find the right one, all they need is a user name of their target. While the best protection for regular users might even be their anonimity, celebrities are targets that the whole world is aiming for, and if you’re a target for hackers, you will always be vulnerable. This is a problem for regular users, but even more so for celebrities. Another problem is that companies that provide cloud computing, will always claim to have a solid, waterproof security system with passwords, security questions and encryption, while they just cannot guarantee that no one will ever be able to break into your account. This means that users don’t really decide what they want to store in the cloud and what they want to keep locally. This means that users don’t consciously upload their data to the cloud, it just happens because it’s in their settings. So why do celebreties then upload their most private photographs to iCloud? According to an article in The Guardian, one reason for iPhone users to upload their pictures to the iCloud, is because Apple uses it as a default for data backups. The solution seems so easy: don’t store any confidential data in the cloud. And that’s exactly what happened at The Fappening. Because the accessibility to the data is now limited by only software instead of a physical limitation (being physically unable to reach the hardware on which the data is stored), means it’s hackable. But the availability of the data to any device that is connected to the network is also what makes cloud computing a very risky operation. Two major advantages are that data becomes availaible on any device that is connected to the network in which the data is stored, and that the purchasing and maintanance of hardware is no longer a concern for the end user, because the data is often stored on large server parks that belong to the cloud service provider. Using the cloud for storing data is a double-edged sword. This way of storing data has found its use in many different sections: from large organisations that want to make their data available to every person that needs access to it (like employees), to end user products like Dropbox which lets regular pc users access their data on multiple devices while at the same time saving them storage space on their hardware. Instead of storing all data on one hardware device, data is made available on all devices that are connected to the network, and it is even uncertain on which device the data is actually stored. ‘The cloud’, or cloud computing, is a term that is used for the storage of data on different hardware units that are connected to a certain network. While it remains unclear how the accounts where exactly hacked – and thus how safe or unsafe the use of iCloud is – the question rises why people, let alone celebrities, store such confidential data online. The images where obtained by hacking into the Apple iCloud-accounts of the celebrities in question. The images where first posted on the internet forum, after which they were spread via numerous other forums and sharing websites. This ‘event’, or ‘happening’, stands symbol for the leakage of hundreds of nude pictures of female celebrities. On August 31st, 2014, “The Fappening” took place.
0 Comments
Leave a Reply. |