Internet leak
   HOME

TheInfoList



OR:

An internet leak is the unauthorized release of information over the
internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, p ...
. Various types of information and data can be, and have been, "leaked" to the Internet, the most common being personal information, computer
software Software is a set of computer programs and associated documentation and data. This is in contrast to hardware, from which the system is built and which actually performs the work. At the lowest programming level, executable code consist ...
and
source code In computing, source code, or simply code, is any collection of code, with or without comments, written using a human-readable programming language, usually as plain text. The source code of a program is specially designed to facilitate the ...
, and artistic works such as books or
album An album is a collection of audio recordings issued on compact disc (CD), vinyl, audio tape, or another medium such as digital distribution. Albums of recorded sound were developed in the early 20th century as individual 78 rpm records c ...
s. For example, a musical album is leaked if it has been made available to the public on the Internet before its official release date.


Music leaks


Source code leaks

Source code leaks are usually caused by misconfiguration of software like CVS or FTP which allow people to get source files through exploits, software bugs, or employees that have access to the sources or part of them revealing the code in order to harm the company. There were many cases of source code leaks in the history of software development. *As Fraunhofer IIS released in 1994 only a low quality version of their
MP3 MP3 (formally MPEG-1 Audio Layer III or MPEG-2 Audio Layer III) is a coding format for digital audio developed largely by the Fraunhofer Society in Germany, with support from other digital scientists in the United States and elsewhere. Origin ...
encoding software (
l3enc Fraunhofer l3enc was the first public software able to encode pulse-code modulation (PCM) .wav files to the MP3 format. The first public version was released on July 13, 1994. This commandline tool was shareware and limited to 112 kbit/s. It w ...
), a hacker named SoloH gathered the
source code In computing, source code, or simply code, is any collection of code, with or without comments, written using a human-readable programming language, usually as plain text. The source code of a program is specially designed to facilitate the ...
from the unprotected servers of the
University of Erlangen A university () is an institution of higher (or tertiary) education and research which awards academic degrees in several academic disciplines. Universities typically offer both undergraduate and postgraduate programs. In the United States, th ...
and developed a higher quality version, which started the MP3 revolution on the internet. *Around 1996
Electronic Arts Electronic Arts Inc. (EA) is an American video game company headquartered in Redwood City, California. Founded in May 1982 by Apple employee Trip Hawkins, the company was a pioneer of the early home computer game industry and promoted the ...
accidentally put the source code of the video game ''
FIFA 97 ''FIFA 97'' (also known as ''FIFA Soccer 97'') is a Association football, football Simulation video game, simulation video game developed by EA Canada and published by Electronic Arts. It was released for IBM PC compatible, PC on 24 June 1996 and ...
'' on a demo disc. *In 2003, Axel Gembe, a German
hacker A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
, who had infiltrated
Valve A valve is a device or natural object that regulates, directs or controls the flow of a fluid (gases, liquids, fluidized solids, or slurries) by opening, closing, or partially obstructing various passageways. Valves are technically fitting ...
's internal network months earlier, exploited a security hole in Microsoft's Outlook to get the complete source of the video game ''
Half-Life 2 ''Half-Life 2'' is a 2004 first-person shooter game developed by Valve Corporation, Valve. It was published by Valve through its distribution service Steam (service), Steam. Like the original ''Half-Life (video game), Half-Life'' (1998), ''Half- ...
''. The source code was leaked online a week later, a playable version of Half-Life 2 was
compiled In computing, a compiler is a computer program that translates computer code written in one programming language (the ''source'' language) into another language (the ''target'' language). The name "compiler" is primarily used for programs tha ...
from the source code, revealing how unfinished it was. The leaks damaged morale at Valve and slowed development. In March 2004, Gembe contacted Gabe Newell, CEO of Valve, and identified himself, saying he was a fan and had not acted maliciously. Newell worked with the FBI to invite Gembe to a fake job interview, planning to have him arrested in the USA; however, police arrested him in Germany. The complete source was soon available in various file sharing networks. *Also in 2003, source code to Diebold Election Systems Inc.
voting machine A voting machine is a machine used to record votes in an election without paper. The first voting machines were mechanical but it is increasingly more common to use '' electronic voting machines''. Traditionally, a voting machine has been defi ...
s was leaked. Researchers at
Johns Hopkins University Johns Hopkins University (Johns Hopkins, Hopkins, or JHU) is a private research university in Baltimore, Maryland. Founded in 1876, Johns Hopkins is the oldest research university in the United States and in the western hemisphere. It consi ...
and
Rice University William Marsh Rice University (Rice University) is a Private university, private research university in Houston, Houston, Texas. It is on a 300-acre campus near the Houston Museum District and adjacent to the Texas Medical Center. Rice is ranke ...
published a critique of Diebold's products, based on an analysis of the software. They found, for example, that it would be easy to program a
counterfeit To counterfeit means to imitate something authentic, with the intent to steal, destroy, or replace the original, for use in illegal transactions, or otherwise to deceive individuals into believing that the fake is of equal or greater value tha ...
voting card to work with the machines and then use it to cast multiple votes inside the voting booth. *In 2003 a Chinese hacker acquired the source code for '' Lineage II'' and sold it to someone in
California California is a state in the Western United States, located along the Pacific Coast. With nearly 39.2million residents across a total area of approximately , it is the most populous U.S. state and the 3rd largest by area. It is also the m ...
who then used it to create a bootleg version of the game, powered by his own servers. Despite warnings from NCSoft that pirating an online game was considered illegal, he continued doing so for a few years, until the
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice ...
finally raided his home in 2007, seized the servers and permanently disabled the website that fronted his bootleg version of ''Lineage II''. *In 2003, one year after
3dfx 3dfx Interactive was an American technology company headquartered in San Jose, California, founded in 1994, that specialized in the manufacturing of 3D graphics processing units, and later, video cards. It was a pioneer in the field from the l ...
was bought by
Nvidia Nvidia CorporationOfficially written as NVIDIA and stylized in its logo as VIDIA with the lowercase "n" the same height as the uppercase "VIDIA"; formerly stylized as VIDIA with a large italicized lowercase "n" on products from the mid 1990s to ...
and support ended, the source code for their drivers leaked, resulting in fan-made, updated drivers. *In 2004, a large portion of
Windows NT 4.0 Windows NT 4.0 is a major release of the Windows NT operating system developed by Microsoft and oriented towards businesses. It is the direct successor to Windows NT 3.51, which was released to manufacturing on July 31, 1996, and then to retail ...
's source code and a small percentage (reportedly about 15%) of
Windows 2000 Windows 2000 is a major release of the Windows NT operating system developed by Microsoft and oriented towards businesses. It was the direct successor to Windows NT 4.0, and was released to manufacturing on December 15, 1999, and was offici ...
's were leaked online. The Windows 2000 source code leak was analysed by a writer for (now defunct) website Kuro5hin who noted that while the code was generally well written, it allegedly contained about "a dozen" instances of
profanity Profanity, also known as cursing, cussing, swearing, bad language, foul language, obscenities, expletives or vulgarism, is a socially offensive use of language. Accordingly, profanity is language use that is sometimes deemed impolite, rud ...
and the milder
euphemism A euphemism () is an innocuous word or expression used in place of one that is deemed offensive or suggests something unpleasant. Some euphemisms are intended to amuse, while others use bland, inoffensive terms for concepts that the user wishes ...
"crap". The writer also noted that there were a lot of code hacks, with the "uglier" ones mostly being for compatibility with older programs and some hardware. It was feared that because of the leak, the number of security exploits would increase due to wider scrutiny of the source code. It was later discovered that the source of the leak originated from
Mainsoft Mainsoft is a software company, founded in 1993, that develops interoperability software products for Microsoft Windows and Linux/Unix platforms. History Founding Mainsoft was founded in 1993, mainly to propose integration products between Wind ...
. *Also in 2004, partial (800 MB) proprietary source code that drives
Cisco Systems Cisco Systems, Inc., commonly known as Cisco, is an American-based multinational digital communications technology conglomerate corporation headquartered in San Jose, California. Cisco develops, manufactures, and sells networking hardware, ...
' networking hardware was made available in the internet. The site posted two files of source code written in the
C programming language ''The C Programming Language'' (sometimes termed ''K&R'', after its authors' initials) is a computer programming book written by Brian Kernighan and Dennis Ritchie, the latter of whom originally designed and implemented the language, as well a ...
, which apparently enables some next-generation
IPv6 Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. I ...
functionality. News of the latest source code leak appeared on a Russian security site. *In 2006,
Anonymous Anonymous may refer to: * Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown ** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author * Anony ...
hackers stole source code (about 1 GiB) for
Symantec Symantec may refer to: *An American consumer software company now known as Gen Digital Inc. *A brand of enterprise security software purchased by Broadcom Inc. Broadcom Inc. is an American designer, developer, manufacturer and global supplier ...
's pcAnywhere from the company's network. While confirmed in January 2012, it is still unclear how the hackers accessed the network. *In late 2007, the source code of Norton Ghost 12 and a Norton Anti-Spyware version were available via BitTorrent. *In December 2007 and January 8, a
Pirate Bay The Pirate Bay (sometimes abbreviated as TPB) is an online index of digital content of entertainment media and software. Founded in 2003 by Swedish think tank Piratbyrån, The Pirate Bay allows visitors to search, download, and contribute magn ...
user published the sources of five Idera SQL products via BitTorrent. *In January 2011 the "stolen source code" of Kaspersky Anti-Virus 2008 was published on the Pirate Bay. *On May 20, 2011, ''
EVE Online ''Eve Online'' (stylised ''EVE Online'') is a space-based, persistent world massively multiplayer online role-playing game (MMORPG) developed and published by CCP Games. Players of ''Eve Online'' can participate in a number of in-game profes ...
s
source code In computing, source code, or simply code, is any collection of code, with or without comments, written using a human-readable programming language, usually as plain text. The source code of a program is specially designed to facilitate the ...
was published by someone on a
GitHub GitHub, Inc. () is an Internet hosting service for software development and version control using Git. It provides the distributed version control of Git plus access control, bug tracking, software feature requests, task management, cont ...
repository. After being online for four days, CCP Games issued a
DMCA The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or ...
take-down request which was followed by GitHub. *In 2011, the
source code In computing, source code, or simply code, is any collection of code, with or without comments, written using a human-readable programming language, usually as plain text. The source code of a program is specially designed to facilitate the ...
of '' GunZ: The Duel'' v1.5 became available online. *In December 2011, the source code of the Solaris 11 operating system's kernel was leaked via BitTorrent. *In August 2014 '' S.T.A.L.K.E.R.: Clear Skys X-Ray Engine
source code In computing, source code, or simply code, is any collection of code, with or without comments, written using a human-readable programming language, usually as plain text. The source code of a program is specially designed to facilitate the ...
(and its successor) became available on
GitHub GitHub, Inc. () is an Internet hosting service for software development and version control using Git. It provides the distributed version control of Git plus access control, bug tracking, software feature requests, task management, cont ...
under a non-
open-source license An open-source license is a type of license for computer software and other products that allows the source code, blueprint or design to be used, modified and/or shared under defined terms and conditions. This allows end users and commercial com ...
. *On December 29, 2015, the
AmigaOS AmigaOS is a family of proprietary native operating systems of the Amiga and AmigaOne personal computers. It was developed first by Commodore International and introduced with the launch of the first Amiga, the Amiga 1000, in 1985. Early versions ...
3.1 source code leaked to the web, confirmed by the rights holder Hyperion Entertainment. *In January 2017 the source code of Opera's Presto Browser engine was leaked to GitHub. The source code was shortly after taken down with a DMCA notice. *In June 2017 a small part of Microsoft's
Windows 10 Windows 10 is a major release of Microsoft's Windows NT operating system. It is the direct successor to Windows 8.1, which was released nearly two years earlier. It was released to manufacturing on July 15, 2015, and later to retail on ...
source code leaked to the public. The leak was of the Shared Source Kit, a small portion of the source code given to OEMs to help with writing drivers. *In February 2018, the
iBoot iBoot is the stage 2 bootloader for all Apple products. It replaces the old bootloader, BootX. Compared with its predecessor, iBoot improves authentication performed in the boot chain. For x86 macOS, the boot process starts by running code s ...
bootloader for
Apple An apple is an edible fruit produced by an apple tree (''Malus domestica''). Apple trees are cultivated worldwide and are the most widely grown species in the genus '' Malus''. The tree originated in Central Asia, where its wild ancest ...
operating systems' source code was leaked onto GitHub by an Apple engineer. The code was from 2016, and by the time it was leaked, iBoot had been restructured, making it obsolete. *On April 22, 2020, '' Counter-Strike: Global Offensive'' and ''
Team Fortress 2 ''Team Fortress 2'' is a 2007 multiplayer first-person shooter, first-person shooter game developed and published by Valve Corporation. It is the sequel to the 1996 ''Team Fortress'' Mod (video gaming), mod for ''Quake (video game), Quake'' and ...
'' code was leaked. * Some time during March 2018, Nintendo suffered a significant leak when a hacker obtained an alleged 2 TB of confidential material containing source codes to game consoles, games, and internal documentation. Starting in 2018, the contents of this breach slowly made their way onto the Internet, starting with iQue Player ROMs and various
Pokémon (an abbreviation for in Japan) is a Japanese media franchise managed by The Pokémon Company, founded by Nintendo, Game Freak, and Creatures, the owners of the trademark and copyright of the franchise. In terms of what each of thos ...
games. Later in 2020, the leaks gained more attention and grew in size, culminating into the release of Wii and Nintendo 64 source code, and the so-called "Gigaleak", a massive release containing multiple N64 games' source code and SNES Prototypes. After July 2021, no more releases have occurred. * On August 7, 2020, 20 GB of
Intellectual property Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, co ...
of
Intel Intel Corporation is an American multinational corporation and technology company headquartered in Santa Clara, California. It is the world's largest semiconductor chip manufacturer by revenue, and is one of the developers of the x86 ser ...
, including source code (in SystemVerilog and otherwise) of their system on chips leaked (with preserving
git Git () is a distributed version control system: tracking changes in any set of files, usually used for coordinating work among programmers collaboratively developing source code during software development. Its goals include speed, data in ...
structure). That included Intel ME,
Intel Microcode Intel Corporation is an American multinational corporation and technology company headquartered in Santa Clara, California. It is the world's largest semiconductor chip manufacturer by revenue, and is one of the developers of the x86 series ...
and software simulators of their hardware. Their various BIOS source code was also leaked. The
SpaceX Space Exploration Technologies Corp. (SpaceX) is an American spacecraft manufacturer, launcher, and a satellite communications corporation headquartered in Hawthorne, California. It was founded in 2002 by Elon Musk with the stated goal o ...
cameras firmware that Intel worked on also leaked. The data is being distributed through a torrent. * On September 23, 2020,
Windows XP Windows XP is a major release of Microsoft's Windows NT operating system. It was release to manufacturing, released to manufacturing on August 24, 2001, and later to retail on October 25, 2001. It is a direct upgrade to its predecessors, Wind ...
SP1 and
Windows Server 2003 Windows Server 2003 is the sixth version of Windows Server operating system produced by Microsoft. It is part of the Windows NT family of operating systems and was released to manufacturing on March 28, 2003 and generally available on April 24, 2 ...
complete source code depots were leaked. The archives included all the source code from the time it was used at Microsoft, including documentation and build tools. The leak was first dismissed as illegitimate, but it was soon clear that it was legitimate, the source code contained Windows XP specific code and resources, later one user managed to compile the OS and pack it into an
ISO image An optical disc image (or ISO image, from the ISO 9660 file system used with CD-ROM media) is a disk image that contains everything that would be written to an optical disc, disk sector by disc sector, including the optical disc file system. ...
. *On January 4, 2021,
Nissan , trading as Nissan Motor Corporation and often shortened to Nissan, is a Japanese multinational automobile manufacturer headquartered in Nishi-ku, Yokohama, Japan. The company sells its vehicles under the Nissan, Infiniti, and Datsun bra ...
North America source code was leaked online due to misconfiguration of a company
Git Git () is a distributed version control system: tracking changes in any set of files, usually used for coordinating work among programmers collaboratively developing source code during software development. Its goals include speed, data in ...
server, which was left exposed online with a default username and password of admin/admin. Software engineer Tillie Kottmann learned of the leak and analyzed the data, which they shared with
ZDNet ZDNET is a business technology news website owned and operated by Red Ventures. The brand was founded on April 1, 1991, as a general interest technology portal from Ziff Davis and evolved into an enterprise IT-focused online publication. H ...
. The repository reportedly contained Nissan NA mobile apps, parts of the Nissan ASIST diagnostics tool, Nissan's internal core mobile library, Dealer Business Systems and Dealer Portal, client acquisition and retention tools, market research tools and data, vehicle logistics portal, vehicle connected services, and various other back ends and internal tools, they reported. *On February 10, 2021, ''
Cyberpunk 2077 ''Cyberpunk 2077'' is a 2020 action role-playing video game developed by CD Projekt Red and published by CD Projekt. Set in Night City, an open world set in the ''Cyberpunk'' universe, players assume the role of a customisable mercenary kn ...
'' and '' Witcher 3'' developer
CD Projekt Red CD Projekt S.A. () is a Polish video game developer, publisher and distributor based in Warsaw, founded in May 1994 by Marcin Iwiński and Michał Kiciński. Iwiński and Kiciński were video game retailers before they founded the company, whi ...
(CDPR) announced hackers had targeted the company and attempted to hold it to ransom. On 6 June 2021, someone in possession of the data had leaked all of ''Cyberpunk 2077'' code (96.02 GB of data in 7z archive) online publicly, while previously it was only available in encrypted form. *On October 6, 2021, streaming site Twitch had its source code along with earnings reports of top streamers leaked by hackers on
4chan 4chan is an anonymous English-language imageboard website. Launched by Christopher "moot" Poole in October 2003, the site hosts boards dedicated to a wide variety of topics, from anime and manga to video games, cooking, weapons, television, ...
, citing the streaming site's negative community and desire for competition and disruption of the online video streaming space. The breach was confirmed by Twitch on Twitter. The leak was distributed freely via a
torrent file In the BitTorrent file distribution system, a torrent file or meta-info file is a computer file that contains metadata about files and folders to be distributed, and usually also a list of the network locations of trackers, which are compute ...
and was 135.17 GB in size. As a precaution, all the stream keys have been reset by Twitch. *On February 25, 2022, ransomware group LAPSUS$ hacked
NVIDIA Nvidia CorporationOfficially written as NVIDIA and stylized in its logo as VIDIA with the lowercase "n" the same height as the uppercase "VIDIA"; formerly stylized as VIDIA with a large italicized lowercase "n" on products from the mid 1990s to ...
and reportedly obtained 1 terabyte of proprietary information. The group subsequently released a ~20 GB archive containing the source code for NVIDIA GPU drivers among other things. Details for a
Nintendo Switch The is a hybrid video game console developed by Nintendo and released worldwide in most regions on March 3, 2017. The console itself is a tablet that can either be docked for use as a home console or used as a portable device, making it a ...
successor were also found among the data. It was also reported recently that the group also infiltrated Portuguese media conglomerate Impresa, the Ministry of Health in Brazil and Brazilian telecommunications company Claro. *On September 18, 2022, an
Untitled Grand Theft Auto game An untitled ''Grand Theft Auto'' game is in development by Rockstar Games. It is due to be the eighth main '' Grand Theft Auto'' game, following '' Grand Theft Auto V'' (2013), and the sixteenth instalment overall. Following years of speculat ...
had a massive leak online, with 90 videos of the game being released. It was confirmed by a worker at Rockstar Games that the leak was real. The content of the leak received mixed reviews, with many calling the game unfinished and rushed, but many criticized these complaints by stating the game was not near completion. The leak itself, however, received negative reception, with many claiming it discredited the work of several employees. Publisher TakeTwo began taking down leaks on several different websites. Rockstar issued a statement on September 19, which stated they were "disappointed" with the leak. ** The hacker who got the leak also got the source code for
Grand Theft Auto V ''Grand Theft Auto V'' is a 2013 action-adventure game developed by Rockstar North and published by Rockstar Games. It is the seventh main entry in the ''Grand Theft Auto'' series, following 2008's ''Grand Theft Auto IV'', and the fifteenth in ...
, and announced he would be selling both. Shortly after, he announced the GTA VI source code was no longer for sale, but was still selling the GTA V source code. This has been considered a form of blackmail.


End-of-life leaks by developers

Sometimes software developers themselves will intentionally leak their source code in an effort to prevent a software product from becoming
abandonware Abandonware is a product, typically software, ignored by its owner and manufacturer, and for which no official support is available. Within an intellectual rights contextual background, abandonware is a software (or hardware) sub-case of the ...
after it has reached its end-of-life, allowing the community to continue development and support. Reasons for leaking instead of a proper release to
public domain The public domain (PD) consists of all the creative work to which no exclusive intellectual property rights apply. Those rights may have expired, been forfeited, expressly waived, or may be inapplicable. Because those rights have expired ...
or as
open-source Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use the source code, design documents, or content of the product. The open-source model is a decentralized so ...
can include scattered or lost
intellectual property rights Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, cop ...
. An example is the
video game Video games, also known as computer games, are electronic games that involves interaction with a user interface or input device such as a joystick, controller, keyboard, or motion sensing device to generate visual feedback. This feedba ...
'' Falcon 4.0'' which became available in 2000; another one is '' Dark Reign 2''.


Other leaks

* In late 1998, a number of confidential
Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washi ...
documents later dubbed the ''
Halloween documents The Halloween documents comprise a series of confidential Microsoft memoranda on potential strategies relating to free software, open-source software, and to Linux in particular, and a series of media responses to these memoranda. Both the lea ...
'' were leaked to
Eric S. Raymond Eric Steven Raymond (born December 4, 1957), often referred to as ESR, is an American software developer, open-source software advocate, and author of the 1997 essay and 1999 book ''The Cathedral and the Bazaar''. He wrote a guidebook for the ...
, an activist in the
open-source software Open-source software (OSS) is computer software that is released under a license in which the copyright holder grants users the rights to use, study, change, and distribute the software and its source code to anyone and for any purpose. ...
movement, who published and commented on them online. The documents revealed that internally Microsoft viewed free and open-source software such as
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, whi ...
as technologically competitive and a major threat for Microsoft's dominance in the market, and they discussed strategies to combat them. The discovery caused a public controversy. The documents were also used as evidence in several court cases. *
Nintendo is a Japanese multinational video game company headquartered in Kyoto, Japan. It develops video games and video game consoles. Nintendo was founded in 1889 as by craftsman Fusajiro Yamauchi and originally produced handmade playing cards ...
's crossover fighting video game series '' Super Smash Bros.'' has a history of having unconfirmed content leaked. Every game since, including 2008's ''
Super Smash Bros. Brawl ''Super Smash Bros. Brawl'' is a 2008 crossover fighting video game developed by Sora Ltd. and published by Nintendo for the Wii. The third installment in the ''Super Smash Bros.'' series, it was announced at a pre-E3 2005 press conferenc ...
'' has been affected by leaks in some form: **''Super Smash Bros. Brawl'' for the
Wii The Wii ( ) is a home video game console developed and marketed by Nintendo. It was released on November 19, 2006, in North America and in December 2006 for most other regions of the world. It is Nintendo's fifth major home game console, ...
was leaked by a video on the
Japanese language is spoken natively by about 128 million people, primarily by Japanese people and primarily in Japan, the only country where it is the national language. Japanese belongs to the Japonic or Japanese- Ryukyuan language family. There have been ...
wii.com website, revealing unconfirmed playable characters on January 28, 2008 (three days before the game's Japanese release). **'' Super Smash Bros. for Nintendo 3DS and Wii U'' was afflicted in August 2014 by the "ESRB leak", where many screenshots and limited video footage of the 3DS version were leaked by a supposed member of the
ESRB The Entertainment Software Rating Board (ESRB) is a self-regulatory organization that assigns age and content ratings to consumer video games in the United States and Canada. The ESRB was established in 1994 by the Entertainment Software Ass ...
. The leak gained traction very quickly due to the screenshots mostly containing elements that the game ratings board would be interested in, such as trophies of suggestively-dressed female characters (some of which were later found to be edited or cut altogether in the final game). **'' Super Smash Bros. Ultimate'' was leaked in its entirety two weeks before its release, allowing many to play and datamine in advance. While the entire roster of characters and stages had already been officially revealed, many unrevealed collectibles, music tracks, and story elements were discovered and distributed. This prompted Nintendo to issue copyright strikes to many YouTube and Twitch channels. *November 2009: Climatic Research Unit email leak, aka Climategate * Several high-profile books have been leaked on the Internet before their official release date, including '' If I Did It'', ''
Harry Potter and the Deathly Hallows ''Harry Potter and the Deathly Hallows'' is a fantasy novel written by British author J. K. Rowling and the seventh and final novel of the main ''Harry Potter'' series. It was released on 21 July 2007 in the United Kingdom by Bloomsbury Publ ...
'', and an early draft of the first twelve chapters of ''
Midnight Sun The midnight sun is a natural phenomenon that occurs in the summer months in places north of the Arctic Circle or south of the Antarctic Circle, when the Sun remains visible at the local midnight. When the midnight sun is seen in the Arctic, ...
''. The leak of the latter prompted the author
Stephenie Meyer Stephenie Meyer (; née Morgan; born December 24, 1973) is an American novelist and film producer. She is best known for writing the vampire romance series ''Twilight'', which has sold over 100 million copies, with translations into 37 differ ...
to suspend work on the novel. * 2010 My Little Pony: Friendship Is Magic has been filled with lot of leaks for later seasons on scenes, leaked full song to the theme song, leaked early released episodes before they got aired on
Discovery Family Discovery Family is an American cable television channel co-owned by Warner Bros. Discovery and Hasbro Entertainment. The channel was originally launched by Discovery Communications on October 7, 1996 as Discovery Kids, a spin-off of Discov ...
, unfinished episodes, 2018–present there was leaks for the generation 5 as My Little Pony: A New Generation was the start. * On January 31, 2014, the original uncensored version of the ''
South Park ''South Park'' is an American animated sitcom created by Trey Parker and Matt Stone and developed by Brian Graden for Comedy Central. The series revolves around four boysStan Marsh, Kyle Broflovski, Eric Cartman, and Kenny McCormickand ...
'' episode " 201" was leaked, when it was illegally pulled from the South Park Studios servers and was posted online in its entirety without any approval by Comedy Central. The episode was heavily censored by the network when it aired in 2010 against the will of series creators Trey Parker and Matt Stone, and was never formally released uncensored to the public. The episode was the second in a two parter and was censored after the airing of the first part as a result of death threats from
Islamic extremists Islamic extremism, Islamist extremism, or radical Islam, is used in reference to extremist beliefs and behaviors which are associated with the Islamic religion. These are controversial terms with varying definitions, ranging from academic und ...
who were angry of the episode's storyline satirizing censorship of
depictions of Muhammad The permissibility of depictions of Muhammad in Islam has been a contentious issue. Oral and written descriptions of Muhammad are readily accepted by all traditions of Islam, but there is disagreement about visual depictions. The Quran does not ...
. * In 2015 the unaired ''
Aqua Teen Hunger Force ''Aqua Teen Hunger Force'' (also known by various alternative titles), sometimes abbreviated as ''ATHF'' or ''Aqua Teen'', is an American adult animated television series created by Dave Willis and Matt Maiellaro for Cartoon Network's late ni ...
'' episode "Boston" was leaked online. The episode was set to air during the fifth season as a response to a controversial
publicity stunt In marketing, a publicity stunt is a planned event designed to attract the public's attention to the event's organizers or their cause. Publicity stunts can be professionally organized, or set up by amateurs. Such events are frequently utilize ...
for ''
Aqua Teen Hunger Force Colon Movie Film for Theaters ''Aqua Teen Hunger Force Colon Movie Film for Theaters'' (also known as ''Aqua Teen Hunger Force: Movie Film for Theaters'') is a 2007 American adult animated surreal black comedy film based on the Adult Swim animated series ''Aqua Teen Hunger Fo ...
'' that occurred in the titular city, but
Adult Swim Adult Swim (AS; stylized as dult swim'' and often abbreviated as s'') is an American adult-oriented night-time cable television channel that shares channel space with the basic cable network Cartoon Network and is programmed by its in-house ...
was forced to pull it to avoid further controversy. * On March 13, 2016, the full list of qualifying teams and first round match-ups for the 2016 NCAA Men's Division I Basketball Tournament leaked on Twitter in the midst of a television special being broadcast by CBS to officially unveil them. The leak exacerbated criticism of a new, two-hour format for the selection broadcast, which was criticized for revealing the full tournament bracket at a slower pace than in previous years. * On April 20, 2021,
Apple An apple is an edible fruit produced by an apple tree (''Malus domestica''). Apple trees are cultivated worldwide and are the most widely grown species in the genus '' Malus''. The tree originated in Central Asia, where its wild ancest ...
supplier
Quanta Computer Quanta Computer Incorporated () () is a Taiwan-based manufacturer of notebook computers and other electronic hardware. Its customers include Apple Inc., Dell, Hewlett-Packard Inc., Acer Inc., Alienware, Amazon.com, Cisco, Fujitsu, Gericom ...
was hit by a ransomware attack. The attackers began posting documents and schematics of MacBook computer designs as recent as March 2021. The attackers threatened to release everything they had obtained by May 1, 2021, unless a ransom had been paid, however nothing further came out of the breach.


See also

* Distributed Denial of Secrets *
GlobaLeaks GlobaLeaks is an open-source, free software intended to enable secure and anonymous whistleblowing initiatives. History The project started on 15 December 2010 and the first software prototype was announced on 6 September 2011. Relevant figure ...
* News leak *
Nikki Catsouras photographs controversy The Nikki Catsouras photographs controversy concerns the leaked photographs of Nicole "Nikki" Catsouras (March 4, 1988 – October 31, 2006), who died at the age of 18 in a high speed car crash after losing control of her father's Porsche 911 Ca ...
, a 2006 California case in which police photographs of a fatal automobile accident were leaked online * royaldutchshellplc.com *
Software release life cycle A software release life cycle is the sum of the stages of development and maturity for a piece of computer software ranging from its initial development to its eventual release, and including updated versions of the released version to help impro ...
*
WikiLeaks WikiLeaks () is an international non-profit organisation that published news leaks and classified media provided by anonymous sources. Julian Assange, an Australian Internet activist, is generally described as its founder and director and ...


References

{{Reflist, 30em Internet terminology Intellectual property law Internet trolling Internet leaks