{"id":65,"date":"2017-01-03T12:18:34","date_gmt":"2017-01-03T12:18:34","guid":{"rendered":"http:\/\/www.blog.buprojects.uk\/2016-2017\/mollyyeomans\/?p=65"},"modified":"2017-01-22T21:02:01","modified_gmt":"2017-01-22T21:02:01","slug":"celebrity-icloud-hacking-scandal","status":"publish","type":"post","link":"https:\/\/www.blog.buprojects.uk\/2016-2017\/mollyyeomans\/2017\/01\/03\/celebrity-icloud-hacking-scandal\/","title":{"rendered":"The Celebrity iCloud Hacking Scandal"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-66\" src=\"http:\/\/www.blog.buprojects.uk\/2016-2017\/mollyyeomans\/wp-content\/uploads\/sites\/131\/2016\/12\/cloud-159475_1280-300x165.png\" alt=\"Upload to the Cloud\" width=\"300\" height=\"165\" srcset=\"https:\/\/www.blog.buprojects.uk\/2016-2017\/mollyyeomans\/wp-content\/uploads\/sites\/131\/2016\/12\/cloud-159475_1280-300x165.png 300w, https:\/\/www.blog.buprojects.uk\/2016-2017\/mollyyeomans\/wp-content\/uploads\/sites\/131\/2016\/12\/cloud-159475_1280-768x424.png 768w, https:\/\/www.blog.buprojects.uk\/2016-2017\/mollyyeomans\/wp-content\/uploads\/sites\/131\/2016\/12\/cloud-159475_1280-1024x565.png 1024w, https:\/\/www.blog.buprojects.uk\/2016-2017\/mollyyeomans\/wp-content\/uploads\/sites\/131\/2016\/12\/cloud-159475_1280-730x400.png 730w, https:\/\/www.blog.buprojects.uk\/2016-2017\/mollyyeomans\/wp-content\/uploads\/sites\/131\/2016\/12\/cloud-159475_1280.png 1280w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>In the\u00a0age of the internet, privacy is everything. A high profile person must be cautious to what they upload to the cloud and what security procedures they are under taking, to avoid their personal information being leaked. <!--more-->\u00a0In 2014 iCloud hacking&#8217;s were brought to everyone&#8217;s attention as hundreds of celebrities had there privacy invaded. The images that caused the most stir contain nudity. One of the biggest names to be leaked was actress Jennifer Lawrence.<\/p>\n<figure id=\"attachment_69\" aria-describedby=\"caption-attachment-69\" style=\"width: 194px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-69\" src=\"http:\/\/www.blog.buprojects.uk\/2016-2017\/mollyyeomans\/wp-content\/uploads\/sites\/131\/2016\/12\/25811842743_48553e5730_m.jpg\" alt=\"Jennifer Lawrence\" width=\"194\" height=\"256\" \/><figcaption id=\"caption-attachment-69\" class=\"wp-caption-text\">Jennifer Lawrence<\/figcaption><\/figure>\n<p>Many of the photos were first posted on <a href=\"http:\/\/www.4chan.org\/\" target=\"_blank\">4Chan<\/a>\u00a0which then made there way to <a href=\"http:\/\/imgur.com\/\" target=\"_blank\">Reddit<\/a>,\u00a0<a href=\"http:\/\/imgur.com\/\" target=\"_blank\">Imgur<\/a>\u00a0and other social media sites. In an interview for <a href=\"http:\/\/www.vanityfair.com\/hollywood\/2014\/10\/jennifer-lawrence-photo-hacking-privacy\" target=\"_blank\">Vanity Fair<\/a>\u00a0Jennifer Lawrence spoke out about how she felt about the events:<\/p>\n<blockquote><p>&#8220;It just makes me feel like a piece of meat that&#8217;s being passed around for profit&#8221;<\/p><\/blockquote>\n<p>She then went on to say:<\/p>\n<blockquote><p>&#8220;People forget that we&#8217;re human&#8221;<\/p><\/blockquote>\n<p>Other celebrities that were also affected by the hacking scandal spoke out on social media sites like Twitter, for example <a href=\"https:\/\/twitter.com\/M_E_Winstead\/status\/506197725285998592?ref_src=twsrc%5Etfw\">Mary E Winstead<\/a> posted:<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\">\n<p lang=\"en\" dir=\"ltr\">To those of you looking at photos I took with my husband years ago in the privacy of our home, hope you feel great about yourselves.<\/p>\n<p>&mdash; Mary E. Winstead (@M_E_Winstead) <a href=\"https:\/\/twitter.com\/M_E_Winstead\/status\/506197725285998592\">August 31, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\">\n<p lang=\"en\" dir=\"ltr\">Knowing those photos were deleted long ago, I can only imagine the creepy effort that went into this. Feeling for everyone who got hacked.<\/p>\n<p>&mdash; Mary E. Winstead (@M_E_Winstead) <a href=\"https:\/\/twitter.com\/M_E_Winstead\/status\/506198161811992576\">August 31, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The first hacker to be identified was <a href=\"https:\/\/www.theguardian.com\/technology\/2016\/oct\/27\/nude-celebrity-photos-hacker-prison-sentence-ryan-collins\" target=\"_blank\">Ryan Collins<\/a>, a 36 year old <a href=\"http:\/\/heavy.com\/news\/2016\/03\/ryan-collins-celebgate-fappening-hacker-lancaster-pennsylvania-celebrity-phones-photos-phishing-photos-family-documents\/\" target=\"_blank\">married man<\/a> with two kids, from Pennsylvania. He was sentenced to 18 months in federal prison and a $250,000 fine. He was found out to be tricking celebrities by appearing as Apple and Google in his emails to make the celebrities send him their personal information. He then gained access to at least 50 Apple iCloud accounts and 72 Gmail accounts.\u00a0Another man who was revealed to be using the same hacking technique was 29 year old, <a href=\"http:\/\/www.chicagotribune.com\/news\/local\/breaking\/ct-celebrity-photos-hacking-plea-met-20160927-story.html\" target=\"_blank\">Edward Majerczyk<\/a>. It has been said that Majerczyk was using the images for his own satisfaction and had no intentions of selling them, he was sentenced to nine months in prison.<\/p>\n<p>The surprising fact about the scandal was that both men used phishing tactics which needs no technical ability and <a href=\"http:\/\/www.forbes.com\/sites\/thomasbrewster\/2016\/03\/16\/icloud-hacking-jennifer-lawrence-fappening-apple-nude-photo-leaks\/#7f74c967b889\" target=\"_blank\">no hacking skills<\/a>. The men were able to create fake email accounts that appeared to have come from Apple and Google sources. Therefore, essentially anyone who has access to a computer can use hacking tricks to invade other people&#8217;s privacy. Especially as there are still YouTube videos that give just over 15 minute tutorials on how to create fake emails and use a phishing method. The video has been very popular with over 36,000 views.<\/p>\n<figure id=\"attachment_81\" aria-describedby=\"caption-attachment-81\" style=\"width: 309px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-81\" src=\"http:\/\/www.blog.buprojects.uk\/2016-2017\/mollyyeomans\/wp-content\/uploads\/sites\/131\/2017\/01\/youtube-cloud-hacking-300x285.png\" alt=\"YouTube | iCloud Phishing | Gadget Shows\" width=\"309\" height=\"293\" srcset=\"https:\/\/www.blog.buprojects.uk\/2016-2017\/mollyyeomans\/wp-content\/uploads\/sites\/131\/2017\/01\/youtube-cloud-hacking-300x285.png 300w, https:\/\/www.blog.buprojects.uk\/2016-2017\/mollyyeomans\/wp-content\/uploads\/sites\/131\/2017\/01\/youtube-cloud-hacking-768x729.png 768w, https:\/\/www.blog.buprojects.uk\/2016-2017\/mollyyeomans\/wp-content\/uploads\/sites\/131\/2017\/01\/youtube-cloud-hacking.png 960w\" sizes=\"(max-width: 309px) 100vw, 309px\" \/><figcaption id=\"caption-attachment-81\" class=\"wp-caption-text\"><a href=\"https:\/\/www.youtube.com\/watch?v=nqKuQbi3a9c&amp;t=32s\" target=\"_blank\">YouTube | iCloud Phishing | Gadget Shows<\/a><\/figcaption><\/figure>\n<p>Ryan Collins used a software that could download the entire contents of the victims &#8216;iCloud backup&#8217;, which meant that he could then search through all of their data to find sensitive images that he wanted. One of the programs he may of used is Elcomsoft by a Russian provider that has the ability to crack iCloud accounts. Even though they can do this, they are not illegal.<\/p>\n<p>Overall, the celebrity hacking&#8217;s have brought to light how easy it is to trick someone into downloading all of their cloud data. Some may say that it is the celebrities faults for saving the photos to the cloud or for not keeping their password more secure. Morally, nobody has the right to invade another person&#8217;s privacy. The hacking&#8217;s were a total invasion of privacy and devastating to it&#8217;s victims. To keep yourself safe from hackers, remember that companies will rarely ask for your password. Therefore, if you are ever emailed by such companies like Apple and Google, do not forget how you don&#8217;t need to be a &#8220;computer nerd&#8221; to create a fake email account.<\/p>\n<p>Stay safe in the cloud.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; In the\u00a0age of the internet, privacy is everything. A high profile person must be cautious to what they upload to the cloud and what security procedures they are under taking, to avoid their personal information being leaked.<\/p>\n","protected":false},"author":125,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[6,5,4,3],"_links":{"self":[{"href":"https:\/\/www.blog.buprojects.uk\/2016-2017\/mollyyeomans\/wp-json\/wp\/v2\/posts\/65"}],"collection":[{"href":"https:\/\/www.blog.buprojects.uk\/2016-2017\/mollyyeomans\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.blog.buprojects.uk\/2016-2017\/mollyyeomans\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.blog.buprojects.uk\/2016-2017\/mollyyeomans\/wp-json\/wp\/v2\/users\/125"}],"replies":[{"embeddable":true,"href":"https:\/\/www.blog.buprojects.uk\/2016-2017\/mollyyeomans\/wp-json\/wp\/v2\/comments?post=65"}],"version-history":[{"count":11,"href":"https:\/\/www.blog.buprojects.uk\/2016-2017\/mollyyeomans\/wp-json\/wp\/v2\/posts\/65\/revisions"}],"predecessor-version":[{"id":298,"href":"https:\/\/www.blog.buprojects.uk\/2016-2017\/mollyyeomans\/wp-json\/wp\/v2\/posts\/65\/revisions\/298"}],"wp:attachment":[{"href":"https:\/\/www.blog.buprojects.uk\/2016-2017\/mollyyeomans\/wp-json\/wp\/v2\/media?parent=65"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.blog.buprojects.uk\/2016-2017\/mollyyeomans\/wp-json\/wp\/v2\/categories?post=65"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.blog.buprojects.uk\/2016-2017\/mollyyeomans\/wp-json\/wp\/v2\/tags?post=65"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}