{
  "version": "https://jsonfeed.org/version/1",
  "title": "Leaks and hacks on The Braindump Blog",
  "icon": "https://www.gravatar.com/avatar/2cd1cf37f23381b39225041fc80e9595?s=96&d=https%3A%2F%2Fmicro.blog%2Fimages%2Fblank_avatar.png",
  "home_page_url": "https://thebraindumpblog.com/",
  "feed_url": "https://thebraindumpblog.com/feed.json",
  "items": [
      {
        "id": "http://adammedcalf.micro.blog/2026/03/22/the-osint-techniques-book-is.html",
        "title": "The 'OSINT Techniques' book is surely the bible for all things Open Source Intelligence",
        "content_html": "<p>📚 Finished reading <a href=\"https://micro.blog/books/9798345969250\">OSINT Techniques: Resources for Uncovering Online Information</a> by Michael Bazzell and Jason Edison.</p>\n<p>This is surely the absolute bible of approaches and methods for anyone interested in pursuing the art and science of <a href=\"https://en.wikipedia.org/wiki/Open-source_intelligence\">Open Source Intelligence</a>, aka OSINT, as a hobby or a career, written by a true <a href=\"https://inteltechniques.com/\">expert in the field</a>. Note that it&rsquo;s very much a &ldquo;how to do&rdquo; rather than &ldquo;interesting stories about&rdquo; type of manual, although a few short case summarise are presented as examples.</p>\n<p>I think I read somewhere that some university courses on the topic use it as a textbook, and I can see why. It&rsquo;s not necessarily the cheapest book <a href=\"https://inteltechniques.com/book1.html\">to purchase</a> but if you&rsquo;ve an interest in the topic then reading its nearly 600 pages has got to be worth it.</p>\n<p>Part of the book is all about setting your computer environment as a virtual environment perfect for safe and effective OSINT work. This involves running a virtual Linux machine.</p>\n<p>Once you&rsquo;ve got that up and running, there are countless OSINT-adjacent tools he advises how to install and use. It must be said that, if you want to follow this section, a certain amount of nerd computer skill (or willingness to learn) is going to be useful. The author advises against blindly copying and pasting the commands he suggests - which is anyway necessary, because so many of these tools are updated, changed, or deleted every day, as do the information sources some of them rely on. Even with some experience of the technologies involved it took me some time to figure out what to change to get everything installed.</p>\n<p>But it was all perfectly doable. And once you&rsquo;ve done that, well, you presumably have a good amount of the preparation you need to succeed done - and possibly improved your computer skills in general. Which is important because tomorrow new tools will appear, old tools will stop working, new data will surface, old data will become more restricted. It is an ever-evolving field to say the least</p>\n<p>Some of the data sources it mentions are a bit US focussed, especially perhaps the people search sites. I&rsquo;m guessing that&rsquo;s a mix of that&rsquo;s where the author lives mixed with the fact the USA has fewer data protections than my own country, so there&rsquo;s more supposedly &ldquo;legitimate&rdquo; data floating about breaching each citizen&rsquo;s privacy. But we live in a global online world - after all, we all use the same social networks for better or worse - so there&rsquo;s more than enough to get on with no matter where you live or where you&rsquo;re investigating.</p>\n<p>And besides, part of the point of the book is to make you self-sufficient, to teach you the flexible skills you need to work with tools and data far beyond the many presented directly in the book.</p>\n<p>It also became quickly apparent to me that even performing a pale imitation of the sort of rigorous investigations the author&rsquo;s company conducts is at least a full-time job. But even for those of us that who are not in a position to follow that route there&rsquo;s a lot of good stuff to learn here. In terms of how to approach the more minor investigations that you might like to pursue (or even how much interest you have in the field itself). And also, conversely, how much data there probably is floating around about you - unless you have gone extremely out of your way to protect yourself (he also sells a book about &ldquo;<a href=\"https://inteltechniques.com/book7.html\">extreme privacy</a>&quot;).</p>\n<p>In fact, why not use yourself as a consenting first OSINT test subject? The results may not please you.</p>\n<p>Buying the book also gives you access to some special tools and scripts he developed to make your life easier. <a href=\"https://inteltechniques.com/\">The author&rsquo;s website</a> actually has a ton of great content and <a href=\"https://inteltechniques.com/tools/index.html\">tools</a> available for free that you can use directly for your investigations or at least take a look at to get to see if this book feels right for you. I can&rsquo;t imagine a better intro to the actual practice of the topic than this book though - as long as its length and detail doesn&rsquo;t prove too intimidating to you. But &ldquo;detail&rdquo; is surely the name of the game in OSINT work.</p>\n<p>Glancing over the section names included in the book might provide some insight as to what&rsquo;s included:</p>\n<ul>\n<li>OSINT Virtual Machines - as in, setting up your computer for success.</li>\n<li>OSINT Resources &amp; Techniques - a vast, vast number of resources and suggestions including about:\n<ul>\n<li>Search Engines</li>\n<li>Facebook</li>\n<li>X (Twitter)</li>\n<li>Instagram</li>\n<li>TikTok</li>\n<li>Online Communities  (outside of mainstream social networks)</li>\n<li>Email Addresses</li>\n<li>Usernames</li>\n<li>People Search Engines</li>\n<li>Telephone Numbers</li>\n<li>Online Maps</li>\n<li>Documents</li>\n<li>Images</li>\n<li>Videos</li>\n<li>Broadcast Streams</li>\n<li>Domain Names</li>\n<li>IP Addresses</li>\n<li>Government &amp; Business Records</li>\n<li>Virtual Currencies</li>\n</ul>\n</li>\n<li>Leaks, Breaches, Logs, &amp; Ransomware - slightly more controversial topics I assume, but where to obtain them, how to process them, how to ensure your use is ethical. A particularly terrifying section from the point of view of privacy.</li>\n<li>OSINT Methodology - how to approach and document an investigation, policies to set, that kind of thing.</li>\n</ul>\n<p>100% recommended for anyone interested in the practical side of the OSINT field.</p>\n<img src=\"https://cdn.uploads.micro.blog/69139/2026/osintbook.png\" alt=\"A book cover titled OSINT Techniques: Resources for Uncovering Online Information features redacted text bars and a minimalist black and white design.\">\n",
        "date_published": "2026-03-22T12:49:53+00:00",
        "url": "https://thebraindumpblog.com/2026/03/22/the-osint-techniques-book-is.html",
        "tags": ["Media diet","Computing","Books","Social media","Technology","Leaks and hacks","Useful software","Privacy"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2025/07/16/two-years-ago-a-data.html",
        "title": "Two years ago a data leak revealed the personal details of the thousands of Afghans who secretly helped the UK's armed forces in the decades long war",
        "content_html": "<p>Potentially the worst data leak I&rsquo;ve ever heard of has <a href=\"https://www.theguardian.com/uk-news/2025/jul/15/thousands-relocated-data-leak-afghans-who-helped-british-forces\">just come to light</a>, two years after it actually took place, seemingly after a substantial effort to cover it up by the British government.</p>\n<p>In summary, after the catastrophic &ldquo;<a href=\"https://www.bbc.co.uk/news/uk-politics-61555821\">betrayal</a>&rdquo; that was the withdrawal of UK (and US) troops from Afghanistan after twenty years of conflict in 2021 took place, the UK set up a scheme - the <a href=\"https://www.gov.uk/government/publications/afghan-relocations-and-assistance-policy/afghan-relocations-and-assistance-policy-information-and-guidance\">Afghan Relocations and Assistance Policy</a> or &ldquo;ARAP&rdquo; - where Afghan locals who had helped out with the UK military effort over there could apply to seek safe haven in the UK. This was on the basis that the fact that they worked with us against the Taliban would obviously make them key targets for the Taliban&rsquo;s cruelty.</p>\n<p>A list was assembled of the thousands Afghan folks that had applied for the scheme and their families. Predictably, most of them received no help from the UK at all, so remained in Afghanistan, facing the substantial afore-mentioned risks.</p>\n<p>In an extra layer of horror, what has just come to light is that the list of applications - i.e. the list of people who had worked against the Taliban to further British efforts - was leaked. Two years ago.</p>\n<p>It seems that we don&rsquo;t know by whom or why. But we do know that the Ministry of Defence found out about it in 2023 after the data had been posted to, wait for it, a Facebook group.</p>\n<blockquote>\n<p>&hellip;it contained 33,000 records among which was “personal information associated to 18,714 Afghans who had applied either to the ex gratia or the Arap [Afghan relocations and assistance policy] scheme on or before 7 January 2022.</p>\n</blockquote>\n<p>As well as:</p>\n<blockquote>\n<p>&hellip;details of MPs, senior military officers and government officials linked to individual claims.</p>\n</blockquote>\n<p>The parts of the Conservative UK government who know about this list rightly feared that were the Taliban to become aware of this list then the people on it might be in great danger if seen as &ldquo;collaborators&rdquo; by the new Afghani regime and their hangers on.</p>\n<p>However, defence secretary Ben Wallace took out  a super-injunction  such that no-one was allowed to acknowledge the existence of this list outside of the few people that already knew. Various defence secretaries of both major political parties in the UK have kept the injunction going since then.</p>\n<p>Journalists started hearing about it but were legally unable to report on it. The vulnerable people who featured on the list were not allowed to be told about it, or even asked to take special precautions, just in case it raised questions. Those most at risk would have no way of knowing that their data was out there in the public domain.</p>\n<p>Most British government ministers remained  in the dark.</p>\n<p>All in all, it was subject to a fairly unique amount of secrecy, until earlier this week - 2 years later - when the super injunction was finally lifted. Just as, it seems,  the Afghan Response Route scheme which had been put in place to help the people unknowingly on the list to come to relative safety in the UK was <a href=\"https://www.gov.uk/guidance/data-incident-affecting-applicants-to-the-afghan-relocations-and-assistance-policy-scheme-and-afghanistan-locally-employed-staff-ex-gratia-scheme\">pre-emptively closed</a>, seemingly on the basis that it cost a bit too much money to help save the lives of the people that had risked life and limb to help our failure of a war effort.</p>\n<p>This, cruelly, leaves not <a href=\"https://www.theguardian.com/uk-news/2025/jul/15/thousands-relocated-data-leak-afghans-who-helped-british-forces\">far off 10,000 people</a> stuck in Afghanistan who I suppose, now at least <em>know</em> they face an enhanced level of risk - but have very few options in terms of mitigating it.</p>\n<p>Says a lawyer with a firm who is representing some of the people affected:</p>\n<blockquote>\n<p>This is essentially a database for anyone who wants to know who assisted the armed forces in Afghanistan. If you’re someone whose family member or friend was killed by these individuals I’m sure you will want to take vengeance.</p>\n</blockquote>\n<p>One of the reporters who learned what was going on very early on is a host on the podcast <a href=\"https://www.globalplayer.com/podcasts/42KuVj/\">The News Agents</a>. This <a href=\"https://www.globalplayer.com/podcasts/episodes/7DrsZBQ/\">episode from a couple of days ago</a>, when one of the hosts, Lewis, could finally tell the story that he&rsquo;d been forced to conceal for the past two years, is quite illuminating on the frustration and possible dangers of exactly what went on.</p>\n<p>We should be ashamed. Again.</p>\n",
        "date_published": "2025-07-16T17:35:04+00:00",
        "url": "https://thebraindumpblog.com/2025/07/16/two-years-ago-a-data.html",
        "tags": ["Politics","Leaks and hacks"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2025/04/26/a-week-after-a-major.html",
        
        "content_html": "<p><a href=\"https://www.pcgamer.com/games/a-week-after-a-major-hack-brought-down-4chan-and-doxxed-all-its-users-it-seems-like-it-may-be-dead-for-good/\">A week after a major hack brought down 4chan and doxxed all its users, it seems like it may be dead for good</a></p>\n",
        "date_published": "2025-04-26T22:34:09+00:00",
        "url": "https://thebraindumpblog.com/2025/04/26/a-week-after-a-major.html",
        "tags": ["Technology","Leaks and hacks","Linklog"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2025/04/16/suspected-chan-hack-could-expose.html",
        
        "content_html": "<p><a href=\"https://www.wired.com/story/2025-4chan-hack-admin-leak/\">Suspected 4chan Hack Could Expose Longtime, Anonymous Admins</a>: People might regret using their actual email addresses.</p>\n",
        "date_published": "2025-04-16T22:16:51+00:00",
        "url": "https://thebraindumpblog.com/2025/04/16/suspected-chan-hack-could-expose.html",
        "tags": ["Leaks and hacks","Linklog"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2025/03/27/days-after-the-signal-leak.html",
        
        "content_html": "<p><a href=\"https://www.npr.org/2025/03/25/nx-s1-5339801/pentagon-email-signal-vulnerability\">Days after the Signal leak, the Pentagon warned the app was the target of hackers</a>: Via tricking people into using the linked devices feature to devices they don&rsquo;t own.</p>\n",
        "date_published": "2025-03-27T08:15:37+00:00",
        "url": "https://thebraindumpblog.com/2025/03/27/days-after-the-signal-leak.html",
        "tags": ["Computing","Crime","Technology","Leaks and hacks","Linklog"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2025/03/24/the-trump-administration-accidentally-texted.html",
        
        "content_html": "<p><a href=\"https://www.theatlantic.com/politics/archive/2025/03/trump-administration-accidentally-texted-me-its-war-plans/682151/\">The Trump Administration Accidentally Texted Me Its War Plans</a>: The top US national security brass, VP and all, inadvertently included a journalist in their military ops groupchat.</p>\n",
        "date_published": "2025-03-24T23:31:42+00:00",
        "url": "https://thebraindumpblog.com/2025/03/24/the-trump-administration-accidentally-texted.html",
        "tags": ["Politics","Leaks and hacks","Linklog"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2025/03/02/the-winterbreak-exploit-lets-everyone.html",
        "title": "The Winterbreak exploit lets everyone jailbreak their Kindle",
        "content_html": "<p>Here&rsquo;s something I hadn&rsquo;t thought about until recently: jailbreaking my Kindle. I came across advocates of this looking into <a href=\"https://thebraindumpblog.com/2025/02/23/a-script-to-automatically-download.html\">the best way to download</a> my Kindle book collection to my PC before <a href=\"https://www.theverge.com/news/612898/amazon-removing-kindle-book-download-transfer-usb\">they disabled</a> some of the direct-download functionality I used.</p>\n<p>Anyway, at the start of 2025, <a href=\"https://kindlemodding.org/jailbreaking/WinterBreak/\">the &ldquo;Winterbreak&rdquo; exploit was released</a> by &ldquo;HackerDude&rdquo; which lets you <a href=\"https://boingboing.net/2025/02/17/new-kindle-jailbreak-opens-all-models.html\">free any model of Kindle</a> from the shackles of its Amazon overlords.</p>\n<p>It does this in a way that doesn&rsquo;t impact your Kindle&rsquo;s standard features so you can still play just fine in the Kindle ecosystem. But, as ever with this stuff, I&rsquo;m sure there are no guarantees and warranties are unlikely to be honoured if problems occur. Can&rsquo;t say that I&rsquo;ve heard of many permanent problems though.</p>\n<p>Why would I want to do this? Well, apart from the whole &lsquo;because I can&rsquo; and &ldquo;to reduce <a href=\"https://www.inverse.com/input/tech/amazon-tracks-every-tap-on-your-kindle\">Amazon&rsquo;s surveillance of my habits and preferences</a>&rdquo; type stuff, my main functional motivation would be around the highlighting feature, which I use a lot.</p>\n<p>Amazon offers that feature already, but with limitations. Right now, if you sideload a book - i.e. use a book you bought anywhere except the Amazon Kindle store, then any highlights and notes you make in it are largely stuck on the devices you use to read them on. Those highlights and notes <a href=\"https://docs.readwise.io/readwise/docs/importing-highlights/kindle\">don&rsquo;t appear</a> in your <a href=\"http://read.amazon.com/notebook\">Amazon web notebook</a>, which means that tools like <a href=\"https://readwise.io/\">Readwise</a> can&rsquo;t see them. There are workarounds, but they&rsquo;re all a bit annoying.</p>\n<p>Jailbreaking the Kindle would allow me to install non-Amazon reading software that doesn&rsquo;t have that limitation - <a href=\"https://koreader.rocks/\">KO Reader</a> seems to be what everyone in that world uses - which might be enough to make me do it.</p>\n<p>Here&rsquo;s a screenshot of KO Reader from <a href=\"https://koreader.rocks/\">its official website</a>.</p>\n<img src=\"https://cdn.uploads.micro.blog/69139/2025/koreader-menu.png\" width=\"450\" height=\"600\" alt=\"Screenshot of KO Reader\">\n<p>Amazon also has a weird feature where if you highlight &ldquo;too much&rdquo; of a book - the threshold can vary - then your highlights <a href=\"https://docs.readwise.io/readwise/docs/importing-highlights/kindle#why-are-my-kindle-highlights-truncated-or-showing-ellipses\">are truncated</a>. Instead of full sentences you can end up with half a sentence followed by a &ldquo;&hellip;&rdquo;. I would guess this is some extremely lame anti-piracy thing? And I probably highlight too much, but still, I don&rsquo;t like it. I bought the book. Let me highlight what I want. Using a non-Amazon reader software might be the way to never feel that pain again.</p>\n<p>My only slight frustration will be the lack of a KO Reader iOS client for syncing reading positions. But when I think about it, I very rarely read the kind to book I want to take extensive notes or highlights from on any other devices anyway.</p>\n",
        "date_published": "2025-03-02T16:24:09+00:00",
        "url": "https://thebraindumpblog.com/2025/03/02/the-winterbreak-exploit-lets-everyone.html",
        "tags": ["Computing","Books","Technology","Leaks and hacks"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2025/01/14/lawsuit-allstate-used-gasbuddy-and.html",
        
        "content_html": "<p><a href=\"https://arstechnica.com/gadgets/2025/01/allstate-sued-for-allegedly-tracking-drivers-behavior-through-third-party-apps/\">Lawsuit: Allstate used GasBuddy and other apps to quietly track driving behavior</a>: Allstate taken to court for covertly using data from apps to track drivers and adjust or cancel their car insurance.</p>\n",
        "date_published": "2025-01-14T23:32:07+00:00",
        "url": "https://thebraindumpblog.com/2025/01/14/lawsuit-allstate-used-gasbuddy-and.html",
        "tags": ["Bad tech","Technology","Leaks and hacks","Linklog"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2024/12/05/cybersecurity-has-gotten.html",
        "title": "Cybersecurity has gotten so bad that even the US government is imploring us to encrypt our communications",
        "content_html": "<p>It feels like a topsy-turvy world we&rsquo;re living in when it’s the US state authorities that are telling us to use <a href=\"https://www.nbcnews.com/tech/security/us-officials-urge-americans-use-encrypted-apps-cyberattack-rcna182694\">end-to-end encrypted messenger services</a>. Back in my youth their government tended to exude rather <a href=\"https://www.brookings.edu/articles/a-brief-history-of-u-s-encryption-policy/\">anti-encryption vibes</a>, or at least anti any encryption that didn&rsquo;t have a state-sponsored backdoor in it. A backdoor for the FBI is of course a backdoor for everyone who finds it, rendering the whole enterprise a bit pointless.</p>\n<p>Which unfortunately has ended up with them (well, us) somewhat reaping what they sowed</p>\n<p>Now the US FBI and CISA (&ldquo;Cybersecurity and Infrastructure Security Agency&rdquo;) are <a href=\"https://www.nbcnews.com/tech/security/us-officials-urge-americans-use-encrypted-apps-cyberattack-rcna182694\">warning Americans to use encryption</a> for their messages and phone calls. This appears to have been prompted by the discovery of a hack on their communications networks by Chinese hackers - probably the &ldquo;<a href=\"https://www.washingtonpost.com/national-security/2024/11/21/salt-typhoon-china-hack-telecom/\">Salt Typhoon</a>&rdquo; gang -  which is &ldquo;ongoing and likely larger in scale than previously understood&rdquo;. Apparently <a href=\"https://www.washingtonpost.com/technology/2024/12/03/china-hack-salt-typhoon-telecom/\">it might take years</a> to figure out exactly where they are and what they did - but <a href=\"https://www.washingtonpost.com/national-security/2024/11/21/salt-typhoon-china-hack-telecom/\">at the very least</a>:</p>\n<blockquote>\n<p>“Specifically, we have identified that [Chinese government]-affiliated actors have compromised networks at multiple telecommunications companies to enable the theft of customer call records data, the compromise of private communications of a limited number of individuals who are primarily involved in government or political activity, and the copying of certain information that was subject to U.S. law enforcement requests pursuant to court orders,” the FBI said in a statement issued with the Cybersecurity and Infrastructure Security Agency earlier this month.</p>\n<p>So far, the hack is known to have affected major U.S. firms such as AT&amp;T, Verizon and T-Mobile, U.S. and industry officials said.</p>\n</blockquote>\n<p>Or, in a <a href=\"https://www.nbcnews.com/tech/security/us-officials-urge-americans-use-encrypted-apps-cyberattack-rcna182694\">bit more detail</a>:</p>\n<blockquote>\n<p>The hackers generally accessed three types of information, the FBI official said.</p>\n<p>One type has been call records, or metadata, showing the numbers that phones called and when. The hackers focused on records around the Washington, D.C., area, and the FBI does not plan to alert people whose phone metadata was accessed.</p>\n<p>The second type has been live phone calls of some specific targets. The FBI official declined to say how many alerts it had sent out to targets of that campaign; the presidential campaigns of Donald Trump and Kamala Harris, as well as the office of Senate Majority Leader Chuck Schumer, D-N.Y., told NBC News in October that the FBI had informed that they had been targeted.</p>\n<p>The third has been systems that telecommunications companies use in compliance with the Commission on Accreditation for Law Enforcement Agencies (CALEA), which allows law enforcement and intelligence agencies with court orders to track people’s communications. CALEA systems can include classified court orders from the Foreign Intelligence Surveillance Court, which processes some U.S. intelligence court orders. The FBI official declined to say whether any classified material was accessed.</p>\n</blockquote>\n<p>Basically, it seem that they don&rsquo;t know how deep the Chinese state (not to cast aspersions, but&hellip;) has gotten into the system. But if you&rsquo;re using proper encryption then, to an extent, <a href=\"https://www.nbcnews.com/tech/security/us-officials-urge-americans-use-encrypted-apps-cyberattack-rcna182694\">it might not matter quite so much</a>. They might still see you&rsquo;re sending messages depending on how exactly the service works, but not what they were.</p>\n<blockquote>\n<p>“Our suggestion, what we have told folks internally, is not new here: Encryption is your friend, whether it’s on text messaging or if you have the capacity to use encrypted voice communication. Even if the adversary is able to intercept the data, if it is encrypted, it will make it impossible,” Greene said.</p>\n</blockquote>\n<p>So, for folk less pre-existingly digitally tin-foil hatted than myself, what is the practical upshot? Probably that you want to message people, and preferably call them, via end-to-end encrypted apps. That&rsquo;s the <a href=\"https://www.nbcnews.com/tech/security/us-officials-urge-americans-use-encrypted-apps-cyberattack-rcna182694\">recommendation from the US authorities</a>.</p>\n<p><a href=\"https://signal.org/\">Signal</a> is the exemplar of this technology, being free, open-source, and very highly recommended by all manner of experts. But it&rsquo;s also a network that relatively few people are all that engaged on - so <a href=\"https://www.whatsapp.com/\">WhatsApp</a> is probably a more realistic option for most folk that also <a href=\"https://faq.whatsapp.com/820124435853543\">uses encryption</a> by default. Both of those apps can handle text messages, photos and video calls in a securely encrypted manner.</p>\n<p>If you&rsquo;re an Android user messaging Android users, or an iOS user messaging iOS users then you&rsquo;re probably also safe on the texting front from the point of view of encryption if using the default messages app. But as soon as you cross operating systems they revert to standard text messages which are absolutely not encrypted. So, much as it pains me to promote a Meta product, WhatsApp is probably a good bet for most as an encrypted app that appears to work on almost everything and almost everyone has heard of.</p>\n<p>Lest us Britons somehow delude ourselves into thinking we&rsquo;re safe, folks from our <a href=\"https://www.theguardian.com/technology/2024/dec/03/uk-underestimates-threat-of-cyber-attacks-from-hostile-states-and-gangs-says-security-chief\">National Cyber Security Centre</a> have also recently provided us some stark warnings.</p>\n<blockquote>\n<p>In a speech at the NCSC’s London HQ, Horne, who took on the role in October, will point to “the aggression and recklessness of cyber-activity we see coming from Russia” and how “China remains a highly sophisticated cyber-actor, with increasing ambition to project its influence beyond its borders”.</p>\n<p>“And yet, despite all this, we believe the severity of the risk facing the UK is being widely underestimated,” he will say.</p>\n</blockquote>\n<p>It&rsquo;s not only China raising the alert - but Russia as well. Earlier this year the NSCS and its allies <a href=\"https://www.ncsc.gov.uk/news/uk-allies-uncover-russian-military-carrying-out-cyber-attacks-digital-sabotage\">uncovered a Russian military unit</a> who had been &ldquo;carrying out cyber attacks and digital sabotage&rdquo; for at least a few years.</p>\n<p>Only last month was <a href=\"https://www.theguardian.com/world/2024/nov/25/russia-plotting-to-use-ai-to-enhance-cyber-attacks-against-uk-minister-will-warn\">one of our cabinet ministers warning that</a>:</p>\n<blockquote>\n<p>There is a danger that artificial intelligence “could be weaponised against us,” McFadden will warn, arguing that the UK is already engaged in the “daily reality” of a “cyberwar,” with hacking efforts coming in particular from Russia.</p>\n<p>&hellip;</p>\n<p>McFadden is expected to say that “Russia has targeted our media, our telecoms, our political and democratic institutions and our energy infrastructure,” and warn that “with a cyber-attack, Russia can turn the lights off for millions of people. It can shut down the power grids”.</p>\n</blockquote>\n<p>The UK Government&rsquo;s official &ldquo;<a href=\"https://prepare.campaign.gov.uk/be-informed-about-hazards/cyber/\">prepare for cyber-emergency advice</a>&rdquo; has the following suggested steps for us to take:</p>\n<ul>\n<li>Use strong passwords (especially for your email)</li>\n<li>Keep your software up to date</li>\n<li>Use 2 step verification.</li>\n<li>Use a password manager.</li>\n<li>Back up your data.</li>\n</ul>\n",
        "date_published": "2024-12-05T18:09:24+00:00",
        "url": "https://thebraindumpblog.com/2024/12/05/cybersecurity-has-gotten.html",
        "tags": ["Computing","Technology","Leaks and hacks"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2024/12/04/us-officials-urge.html",
        
        "content_html": "<p><a href=\"https://www.nbcnews.com/tech/security/us-officials-urge-americans-use-encrypted-apps-cyberattack-rcna182694\">U.S. officials urge Americans to use encrypted apps amid cyberattack</a>: Chinese hackers have gotten into key telecommunications infrastructure.</p>\n",
        "date_published": "2024-12-04T09:57:44+00:00",
        "url": "https://thebraindumpblog.com/2024/12/04/us-officials-urge.html",
        "tags": ["Leaks and hacks","Linklog"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2024/12/04/hackers-breach-andrew.html",
        
        "content_html": "<p><a href=\"https://www.dailydot.com/debug/andrew-tate-the-real-world-hack/\">Hackers breach Andrew Tate&rsquo;s online university - obtain chat logs and leak data on 800,000 users</a>: Imagine the levels of dystopia those chats probably complain whilst funding the reprehensible life of Tate</p>\n",
        "date_published": "2024-12-04T09:56:37+00:00",
        "url": "https://thebraindumpblog.com/2024/12/04/hackers-breach-andrew.html",
        "tags": ["Leaks and hacks","Linklog"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2024/12/03/hackers-leak-data.html",
        "title": "Hackers leak data from Andrew Tate's 'university' of 'money making'",
        "content_html": "<p>&ldquo;The Real World&rdquo; - Andrew Tate&rsquo;s presumably vomitous $50-a-month &ldquo;learning platform&rdquo; which promises to teach you how to master the skill of &ldquo;money making&rdquo; -<a href=\"https://www.forbes.com/sites/larsdaniel/2024/11/25/andrew-tates-online-university-hacked-800000-users-exposed/\"> has been hacked</a>.  Yes, the institution formerly known as &ldquo;<a href=\"https://www.independent.co.uk/news/world/europe/andrew-tate-news-hustler-university-prison-b2270271.html\">Hustler&rsquo;s University</a>&rdquo; has been exposed.</p>\n<p>Well, OK, Tate says <a href=\"https://x.com/Gadget44027447/status/1860544788589641810\">it hasn&rsquo;t</a>. But nonetheless data on around 800k usernames, 300k email addresses and a ton of messages that were extracted from their various servers was acquired by a group of anti-Tate hacktivists who shared it with various media publications, and indeed the internet at large via <a href=\"https://ddosecrets.com/\">Distributed Denial of Secrets</a>.</p>\n<p>The hackers later went on to <a href=\"https://www.forbes.com/sites/larsdaniel/2024/11/25/andrew-tates-online-university-hacked-800000-users-exposed/\">disrupt one of Tate&rsquo;s streaming shows</a> via &ldquo;flooding it with emojis and symbols associated with feminist and LGBTQ+ communities&rdquo;.</p>\n<p>I can&rsquo;t imagine many things less wholesome than reading the chat logs of Andrew Tate&rsquo;s subscription-only online course, but there we go, they&rsquo;re now <a href=\"https://ddosecrets.com/article/andrew-tate-s-the-real-world\">available to all</a>.</p>\n<blockquote>\n<p>The logs are taken from the platform’s 221 public and 395 private chat servers, which are spread across a dozen &ldquo;campuses.&rdquo; According to the site&rsquo;s metrics, it generates approximately $5,650,000 monthly. The data also includes 324,382 unique email addresses that appear to belong to users who were removed from the main database after they stopped paying their subscriptions.</p>\n</blockquote>\n<p>They later also managed to get their hands on <a href=\"https://ddosecrets.com/article/andrew-tate-staff-chats\">chats from staff servers</a>, where it appears those in power were mostly <a href=\"https://www.dailydot.com/debug/andrew-tate-the-real-world-hack-staff-chats/\">complaining about grifters and engagement farmers</a>. Who&rsquo;d have thought those sort of characters would turn up in the Tate-o-sphere?</p>\n<blockquote>\n<p>The chat logs include details about the inner workings of the organization; Tate&rsquo;s conversations with site moderators; user concerns about widespread site abuse; members farming engagement; and lack of action on content moderation.</p>\n</blockquote>\n<p>The email addresses have been added to <a href=\"https://haveibeenpwned.com/\">have i been pwned</a> so if you&rsquo;re one of the unlucky ex-subscribers then you can find out if your personal details were leaked at the email level at least.</p>\n<p>This isn&rsquo;t the first evidence of a hack on his place of &ldquo;learning&rdquo;. In July, <a href=\"https://cybernews.com/security/tates-real-world-exposes-user-messages/\">Cybernews reported</a> finding a ton of publicly exposed data including nearly a million user accounts, email addresses and millions of messages. I&rsquo;m not sure chancing upon a appallingly configured database is exactly hacking to be fair, but it has the same net effect. Despite Tate&rsquo;s vehement and yet entirely untrue denials, time to re-add The Real World to the list of dubious institutions failing to take any care of the basic privacy and security of its users, as unsympathetic crowd as they may be to some.</p>\n<p>As a reminder, Andrew Tate is a <a href=\"https://www.bbc.co.uk/news/uk-64125045\">self-proclaimed misogynist</a> who is <a href=\"https://www.bbc.co.uk/news/uk-64125045\">currently on trial</a>  for several crimes including &ldquo;rape, human trafficking and forming an organised crime group to sexually exploit women.&rdquo;</p>\n<p>His &ldquo;university&rdquo; is also the only one I&rsquo;ve seen where the first FAQ is &ldquo;Is this program suitable for women?&rdquo;. Despite the answer - which a cynic might claim has strong vibes of &ldquo;YeS of Course! soMeOf my best friEnds aRe Women!?&rdquo; -  I can&rsquo;t imagine it&rsquo;s actually suitable for anyone.</p>\n",
        "date_published": "2024-12-03T19:20:14+00:00",
        "url": "https://thebraindumpblog.com/2024/12/03/hackers-leak-data.html",
        "tags": ["Leaks and hacks"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2024/11/30/why-you-should.html",
        
        "content_html": "<p><a href=\"https://addy.io/blog/why-you-should-use-a-different-email-address-for-every-site/\">Why you should use a different email address for every site</a>: The list of things you might want to do in order to maintain some semblance of privacy/safety on the internet these days grows ever longer.</p>\n",
        "date_published": "2024-11-30T23:13:09+00:00",
        "url": "https://thebraindumpblog.com/2024/11/30/why-you-should.html",
        "tags": ["Computing","Technology","Leaks and hacks","Linklog"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2024/11/26/helpline-for-yakuza.html",
        
        "content_html": "<p><a href=\"https://www.theregister.com/2024/11/22/helpline_for_yakuza_victims_may/\">Helpline for Yakuza victims fears it leaked their personal info</a>: A Japanese government agency was phished.</p>\n",
        "date_published": "2024-11-26T11:47:49+00:00",
        "url": "https://thebraindumpblog.com/2024/11/26/helpline-for-yakuza.html",
        "tags": ["Computing","Bad tech","Crime","Technology","Leaks and hacks","Linklog"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2024/11/26/from-the-register.html",
        
        "content_html": "<p>From <a href=\"https://www.theregister.com/2024/11/22/helpline_for_yakuza_victims_may/\">The Register</a>:</p>\n<blockquote>\n<p>A local Japanese government agency dedicated to preventing organized crime has apologized after experiencing an incident it fears may have led to a leak of personal information describing 2,500 people who reached out to it for consultation.</p>\n</blockquote>\n<p>This is a particularly unfortunate hack given that organised crime gangs have something of a reputation for seeking revenge on anyone whom they might regard as disloyal or a threat to their impunity.</p>\n<p>It happened as the result of one of the classic phishing exercises:</p>\n<blockquote>\n<p>A staff member was using his work computer when he received a popup warning him his computer had been disabled and to call a number for support. He did so, followed the instructions, and unintentionally gave criminals remote access</p>\n</blockquote>\n",
        "date_published": "2024-11-26T11:46:17+00:00",
        "url": "https://thebraindumpblog.com/2024/11/26/from-the-register.html",
        "tags": ["Computing","Bad tech","Crime","Technology","Leaks and hacks"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2024/11/18/ukrainian-hackers-breach.html",
        
        "content_html": "<p><a href=\"https://global.espreso.tv/russia-ukraine-war-ukrainian-hackers-target-former-russian-commanders-computer-reveal-key-findings\">Ukrainian hackers breach former Russian commander’s computer</a>: Romanchuk turns out to be more a chronically idle office slacker than a heroic warrior no matter whose side you&rsquo;re on.</p>\n",
        "date_published": "2024-11-18T22:33:13+00:00",
        "url": "https://thebraindumpblog.com/2024/11/18/ukrainian-hackers-breach.html",
        "tags": ["Leaks and hacks","Linklog"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2024/10/21/governments-spying-on.html",
        
        "content_html": "<p><a href=\"https://www.reuters.com/technology/cybersecurity/governments-spying-apple-google-users-through-push-notifications-us-senator-2023-12-06/\">Governments spying on Apple, Google users through push notifications - US senator</a>: Inevitably the centralisation and lack of encryption around push notifications makes them a useful source of surveillance material.</p>\n",
        "date_published": "2024-10-21T10:18:53+00:00",
        "url": "https://thebraindumpblog.com/2024/10/21/governments-spying-on.html",
        "tags": ["Bad tech","Technology","Leaks and hacks","Privacy","Linklog"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2024/10/21/governments-are-using.html",
        
        "content_html": "<p><a href=\"https://carnegieendowment.org/posts/2021/07/governments-are-using-spyware-on-citizens-can-they-be-stopped\">Governments Are Using Spyware on Citizens. Can They Be Stopped?</a>: Companies like the NSO Group are happy to sell commercial spyware to governments who will predictably use it for bad things.</p>\n",
        "date_published": "2024-10-21T10:16:24+00:00",
        "url": "https://thebraindumpblog.com/2024/10/21/governments-are-using.html",
        "tags": ["Bad tech","Technology","Leaks and hacks","Privacy","Linklog"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2024/10/04/thousands-of-linux.html",
        
        "content_html": "<p><a href=\"https://arstechnica.com/security/2024/10/persistent-stealthy-linux-malware-has-infected-thousands-since-2021/\">Thousands of Linux systems infected by stealthy malware since 2021</a>: Researchers discover &lsquo;perfCtl&rsquo; - computer malware that, unusually, targets Linux and does all sorts of nasty things.</p>\n",
        "date_published": "2024-10-04T22:47:29+00:00",
        "url": "https://thebraindumpblog.com/2024/10/04/thousands-of-linux.html",
        "tags": ["Bad tech","Technology","Leaks and hacks","Linklog"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2024/10/02/exposing-the-flaw.html",
        
        "content_html": "<p><a href=\"https://m.youtube.com/watch?v=wVyu7NB7W6Y\">Exposing The Flaw In Our Phone System</a>: Mildly terrifying episode of Veritasium showing how easy it is to hack almost any phone via exploiting the <a href=\"https://en.wikipedia.org/wiki/Signalling_System_No._7\">SS7 system</a>.</p>\n",
        "date_published": "2024-10-02T22:34:45+00:00",
        "url": "https://thebraindumpblog.com/2024/10/02/exposing-the-flaw.html",
        "tags": ["Computing","Bad tech","Technology","Leaks and hacks","Linklog"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2024/10/02/spy-companies-using.html",
        
        "content_html": "<p><a href=\"https://www.thebureauinvestigates.com/stories/2020-12-16/spy-companies-using-channel-islands-to-track-phones-around-the-world/\">Spy companies using Channel Islands to track phones around the world</a>: The Channel Islands are a hotspot for the SS7 attacks that may allow hackers to track almost any phone&rsquo;s location as well as intercepting calls and SMS.</p>\n",
        "date_published": "2024-10-02T10:22:55+00:00",
        "url": "https://thebraindumpblog.com/2024/10/02/spy-companies-using.html",
        "tags": ["Bad tech","Technology","Leaks and hacks","Privacy","Linklog"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2024/07/02/last-month-ticketmaster.html",
        
        "content_html": "<p>Last month <a href=\"https://www.nytimes.com/2024/05/31/business/ticketmaster-hack-data-breach.html\">Ticketmaster got hacked</a> by a group known as ShinyHunters, the same group that previously stole data containing details of <a href=\"https://www.bleepingcomputer.com/news/security/atandt-confirms-data-for-73-million-customers-leaked-on-hacker-forum/\">70 million AT&amp;T customers</a>.</p>\n<p>They got their hands on the personal details of 560 million Ticketmaster customers, with the intention of selling the purloined data onwards for half a million dollars. Apparently the information included at least partial credit card numbers and ticket sales.</p>\n<p>No-one, nothing, is safe out there. I guess we all have to operate on the basis of if we enter our data anywhere online then there&rsquo;s a non-zero chance it&rsquo;ll be expropriated by bad actors at some point.</p>\n",
        "date_published": "2024-07-02T07:02:26+00:00",
        "url": "https://thebraindumpblog.com/2024/07/02/last-month-ticketmaster.html",
        "tags": ["Computing","Bad tech","Crime","Leaks and hacks"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2024/06/30/microsoft-accidentally-leaks.html",
        
        "content_html": "<p>Microsoft <a href=\"https://seclists.org/fulldisclosure/2024/Jun/7\">accidentally leaks</a> some of the source code behind their <a href=\"https://en.wikipedia.org/wiki/PlayReady\">PlayReady DRM software</a>.</p>\n<p>The technicalities are beyond me, but let&rsquo;s hope this helps some tech wizard figure out how to remove this particular example of the software scourge known as <a href=\"https://en.wikipedia.org/wiki/Digital_rights_management\">Digital Rights Management</a>, so that we can permanently store and play any digital content we purchased where and when we want to without so much risk it&rsquo;ll all vanish some day.</p>\n",
        "date_published": "2024-06-30T09:59:54+00:00",
        "url": "https://thebraindumpblog.com/2024/06/30/microsoft-accidentally-leaks.html",
        "tags": ["Computing","Bad tech","Leaks and hacks"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2024/06/24/another-huge-nhs.html",
        "title": "Another huge NHS data leak following a ransomware attack",
        "content_html": "<blockquote>\n<p>Stolen test data and NHS numbers published by hospital hackers</p>\n</blockquote>\n<p>(From <a href=\"https://www.bbc.co.uk/news/articles/c9ww90j9dj8o\">The BBC</a>)</p>\n<p>A group called Qilin has shared 400GB of private NHS data on the Darknet, thought <a href=\"https://www.lbc.co.uk/news/russian-hackers-publish-london-hospitals-blood-test-data/\">to include</a> patient identifiers and blood test results. This seems to be the result of an unpaid ransomware demand, <a href=\"https://www.theregister.com/2024/06/20/qilin_our_plan_was_to/\">allegedly for $50 million</a>. The action also caused potentially dangerous disruption to thousands of medical appointments.</p>\n<p>Qilin is a ransomware group <a href=\"https://www.ft.com/content/a54f9c2e-bf5a-464d-94d2-8b08285a148d\">that popped up in 2022</a> and is thought by many to work from Russia.</p>\n<p>The data was not stolen directly from NHS systems but rather from an organisation called <a href=\"https://www.synnovis.co.uk/\">Synnovis</a> who provides pathology services for the NHS. Again this shows that it&rsquo;s really only the weakest link that matters. Hackers only have to be successful once.</p>\n<p>It&rsquo;s far from the first healthcare organisation to be attacked. Just a couple of years ago the NHS once again saw <a href=\"https://www.bbc.com/news/technology-62506039\">one of the organisations who provides it with IT services</a> attacked.  Last year saw 70TB worth of sensitive data <a href=\"https://techcrunch.com/2023/07/10/uk-hacks-public-sector-nhs-ransomware/\">from Barts Health NHS Trust</a> held to ransom as well as details of over 1 million patients threatened by <a href=\"https://www.independent.co.uk/news/health/nhs-patient-data-attack-b2364202.html\">an attack </a> against the University of Manchester.</p>\n<p>Elsewhere, earlier this year United Healthcare decided to <a href=\"https://www.cnbc.com/2024/04/22/unitedhealth-paid-ransom-to-bad-actors-says-patient-data-was-compromised-in-change-healthcare-cyberattack.html\">actually pay the ransom</a>, suggested to represent <a href=\"https://www.crn.com/news/security/2024/unitedhealth-pays-22-million-to-ransomware-group-behind-change-healthcare-cyber-attack\">$22 million worth of Bitcoins</a>, when their subsidiary, Change Healthcare was attacked.</p>\n<p>It&rsquo;s all rather terrifying. At least whilst it feels like there&rsquo;s little indication we really know how to stop it happening.</p>\n",
        "date_published": "2024-06-24T11:10:07+00:00",
        "url": "https://thebraindumpblog.com/2024/06/24/another-huge-nhs.html",
        "tags": ["Bad tech","Health","Crime","Leaks and hacks"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2024/04/14/the-mother-of.html",
        "title": "The 'mother of all breaches' saw billions of confidential data records leaked earlier this year ",
        "content_html": "<p>January 2024 saw the probably the <a href=\"https://www.forbes.com/sites/daveywinder/2024/01/23/massive-26-billion-record-leak-dropbox-linkedin-twitterx-all-named/\">biggest known leak of personal data</a>  yet known. An astonishing 26 billion records from various sources  was found by researchers to available via open resources.</p>\n<blockquote>\n<p>“The dataset is extremely dangerous as threat actors could leverage the aggregated data for a wide range of attacks, including identity theft, sophisticated phishing schemes, targeted cyberattacks, and unauthorized access to personal and sensitive accounts,” the researchers said.</p>\n</blockquote>\n<p>Rather than newly hacked data, it seems to at least mostly be a collection of historical data breaches all handily available in one download. Which makes sense when one realises who the leaker was, outlined below.</p>\n<p><a href=\"https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/\">Cybernews reports</a> on some of the sites whose data was in the haul - site name and number of records:</p>\n<blockquote>\n<ul>\n<li>Tencent (21.5B),</li>\n<li>Weibo (504M),</li>\n<li>MySpace (360M),</li>\n<li>Twitter (281M),</li>\n<li>Wattpad (271M),</li>\n<li>NetEase (261M)</li>\n<li>Deezer (258M),</li>\n<li>Linkedin (251M),</li>\n<li>AdultFriendFinder (220M),</li>\n<li>Zynga (217M) ,</li>\n<li>Luxottica (206M),</li>\n<li>Evite (179M),</li>\n<li>Adobe (153M),</li>\n<li>MyFitnessPal (151M,)</li>\n<li>Canva (143M),</li>\n<li>JD.com (142M),</li>\n<li>Badoo (127M),</li>\n<li>VK (101M),</li>\n<li>Youju (100M).</li>\n<li>Daily Motion (86M),</li>\n<li>Dropbox (69M),</li>\n<li>Telegram (41M),</li>\n<li>and many other companies and organizations.</li>\n</ul>\n</blockquote>\n<p>They <a href=\"https://cybernews.com/personal-data-leak-check/\">set up a site</a> where you can see if your data has been leaked which includes the above collection.</p>\n<p>It seems like it was actually a site that offers the service of checking whether your personal data got leaked that was the inadvertent offender in this case. Whoops.</p>\n<blockquote>\n<p>Leak-Lookup, a data breach search engine, said it was the holder of the leaked dataset. The platform posted a message on X, <a href=\"https://twitter.com/LeakLookup/status/1749951429693919400\">saying</a> the problem behind the leak was a “firewall misconfiguration,” which was fixed.</p>\n</blockquote>\n",
        "date_published": "2024-04-14T08:02:56+00:00",
        "url": "https://thebraindumpblog.com/2024/04/14/the-mother-of.html",
        "tags": ["Computing","Bad tech","Leaks and hacks"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2023/09/05/more-data-leaks.html",
        "title": "More data leaks",
        "content_html": "<p>Another day, another mass data-leak. The one that caught my attention most recently was that the details of 2.6 million <a href=\"https://www.duolingo.com/\">Duolingo</a> users were <a href=\"https://www.bleepingcomputer.com/news/security/scraped-data-of-26-million-duolingo-users-released-on-hacking-forum/\">for sale on hacking forums</a>. To be fair, it looks to be less &ldquo;hacked&rdquo; and more a product of misusing the DuoLingo API in order to collect data that could include people&rsquo;s real name, email address and some DuoLingo specifics such as what language the user was learning, as well as some profile settings.</p>\n<p>Much of this except email address was technically &ldquo;public&rdquo; in that you could see it on a user&rsquo;s profile or at least access it via the API. But by feeding the API a big list of email addresses, probably obtained from some other leak, one could confirm their association with a DuoLingo account. This join to email gives an obvious opening for scammers to send accurately personalised spams or phishes - &ldquo;Hey, to continue your French lessons we need you to re-enter your credit card details here&rdquo; type stuff.</p>\n<p>As it happens I <a href=\"https://dabblingwithdata.amedcalf.com/2021/08/15/accessing-your-duolingo-data-for-analysis-via-python/\">wrote about one way to programmatically access your data</a> from DuoLingo the past. But there I promise that I was more interested in the data of my on progress rather getting everyone&rsquo;s data to sell.</p>\n<p>It&rsquo;s only because <a href=\"https://braindump.amedcalf.com/2022/06/01/amazing-how-unproficient.html\">I&rsquo;ve used DuoLingo</a> that this stood out to me I guess. It&rsquo;s far from the worst leak in recent times. Just this month we&rsquo;ve seen details of 40 million UK folk <a href=\"https://braindump.amedcalf.com/2023/08/08/turns-out-the.html\">leak from the UK Electoral Commission</a>,  details of <a href=\"https://www.standard.co.uk/tech/discord-io-shut-down-data-breach-hacking-b1101000.html\">760000 Discord.io users  released</a> (enough to <a href=\"https://uk.pcmag.com/security/148221/discordio-temporarily-shuts-down-after-hack-promises-security-overhaul\">shut the site down</a> for now) and 10 million French residents exposed via <a href=\"https://www.securityweek.com/10-million-likely-impacted-by-data-breach-at-french-unemployment-agency/\">a leak from their government&rsquo;s unemployment registration agency</a>.</p>\n<p>Basically, it&rsquo;s feeling ever more like if anything related to you is on any computer connected to the internet anywhere in some form other than heavily encrypted then you might consider it could potentially become public one day. In some cases <a href=\"https://braindump.amedcalf.com/2023/08/21/twitters-habit-of.html\">even if you explicitly deleted it years ago</a>.</p>\n",
        "date_published": "2023-09-05T08:45:00+00:00",
        "url": "https://thebraindumpblog.com/2023/09/05/more-data-leaks.html",
        "tags": ["Bad tech","Leaks and hacks"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2023/03/25/there-was-a.html",
        
        "content_html": "<p>There was a moment where <a href=\"https://openai.com/blog/chatgpt\">chatGPT</a> was accidentally <a href=\"https://www.bloomberg.com/news/articles/2023-03-21/openai-shut-down-chatgpt-to-fix-bug-exposing-user-chat-titles\">leaking the title of people&rsquo;s chats to other users</a>. Only the title, not the full conversation in this case, but it&rsquo;s perhaps only a matter of time before someone&rsquo;s bot is hacked or malfunctions enough to share more.</p>\n<p>It&rsquo;s a scary thought when already some people are effectively <a href=\"https://mashable.com/article/how-to-chat-with-chatgpt-mental-health-therapy\">using them as therapists</a>. It wouldn&rsquo;t surprise me if the more human-like style of conversation they produce and the &lsquo;texting a friend&rsquo; like interface that many of them have  is conducive to users sharing a whole lot more personal information than they typically would with other online services.</p>\n",
        "date_published": "2023-03-25T08:42:41+00:00",
        "url": "https://thebraindumpblog.com/2023/03/25/there-was-a.html",
        "tags": ["Artificial Intelligence","Leaks and hacks"]
      },
      {
        "id": "http://adammedcalf.micro.blog/2022/07/11/080642.html",
        
        "content_html": "<p>A <a href=\"https://www.theguardian.com/news/2022/jul/10/uber-files-leak-reveals-global-lobbying-campaign\">leak</a> of <a href=\"https://www.uber.com\">Uber’s</a> internal files reveals that they knowingly broke the law, put their drivers in danger, lied to and hid information from law enforcement and manipulated politicians and researchers.</p>\n<p>Falls in the category of ‘<a href=\"https://www.businessinsider.com/uber-company-scandals-and-controversies-2017-11\">not surprising</a> but somehow still a little shocking’.</p>\n",
        "date_published": "2022-07-11T07:06:42+00:00",
        "url": "https://thebraindumpblog.com/2022/07/11/080642.html",
        "tags": ["Leaks and hacks"]
      }
  ]
}
