An internet leak is the unauthorized release of information over the
internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a ''internetworking, network of networks'' that consists ...
. Various types of information and data can be, and have been, "leaked" to the Internet, the most common being personal information, computer
software
Software is a set of computer programs and associated software documentation, documentation and data (computing), data. This is in contrast to Computer hardware, hardware, from which the system is built and which actually performs the work.
...
and
source code
In computing, source code, or simply code, is any collection of code, with or without comment (computer programming), comments, written using a human-readable programming language, usually as plain text. The source code of a Computer program, p ...
, and artistic works such as books or
album
An album is a collection of audio recordings issued on compact disc (CD), Phonograph record, vinyl, audio tape, or another medium such as Digital distribution#Music, digital distribution. Albums of recorded sound were developed in the early ...
s. For example, a musical album is leaked if it has been made available to the public on the Internet before its official release date.
Music leaks
Source code leaks
Source code leaks are usually caused by misconfiguration of software like
CVS
CVS may refer to:
Organizations
* CVS Health, a US pharmacy chain
** CVS Pharmacy
** CVS Caremark, a prescription benefit management subsidiary
* Council for Voluntary Service, England
* Cable Video Store, former US pay-per-view service
* CVS F ...
or
FTP which allow people to get source files through exploits, software
bugs
Bugs may refer to:
* Plural of bug
Arts, entertainment and media Fictional characters
* Bugs Bunny, a character
* Bugs Meany, a character in the ''Encyclopedia Brown'' books
Films
* ''Bugs'' (2003 film), a science-fiction-horror film
* ''Bugs ...
, or employees that have access to the sources or part of them revealing the code in order to harm the company.
There were many cases of source code leaks in the history of software development.
*As
Fraunhofer IIS released in 1994 only a low quality version of their
MP3
MP3 (formally MPEG-1 Audio Layer III or MPEG-2 Audio Layer III) is a coding format for digital audio developed largely by the Fraunhofer Society in Germany, with support from other digital scientists in the United States and elsewhere. Orig ...
encoding software (
l3enc), a hacker named SoloH gathered the
source code
In computing, source code, or simply code, is any collection of code, with or without comment (computer programming), comments, written using a human-readable programming language, usually as plain text. The source code of a Computer program, p ...
from the unprotected servers of the
University of Erlangen and developed a higher quality version, which started the MP3 revolution on the internet.
*Around 1996
Electronic Arts
Electronic Arts Inc. (EA) is an American video game company headquartered in Redwood City, California. Founded in May 1982 by Apple employee Trip Hawkins, the company was a pioneer of the early home computer game industry and promoted th ...
accidentally put the source code of the video game ''
FIFA 97'' on a
demo disc.
*In 2003, Axel Gembe, a German
hacker, who had infiltrated
Valve
A valve is a device or natural object that regulates, directs or controls the flow of a fluid (gases, liquids, fluidized solids, or slurries) by opening, closing, or partially obstructing various passageways. Valves are technically fitting ...
's internal network months earlier, exploited a security hole in
Microsoft's Outlook to get the complete source of the video game ''
Half-Life 2''. The source code was leaked online a week later, a playable version of Half-Life 2 was
compiled from the source code, revealing how unfinished it was. The leaks damaged morale at Valve and slowed development. In March 2004, Gembe contacted
Gabe Newell, CEO of Valve, and identified himself, saying he was a fan and had not acted maliciously. Newell worked with the
FBI to invite Gembe to a fake job interview, planning to have him arrested in the USA; however, police arrested him in Germany.
The complete source was soon available in various
file sharing networks.
*Also in 2003, source code to
Diebold Election Systems Inc.
voting machine
A voting machine is a machine used to record votes in an election without paper. The first voting machines were mechanical but it is increasingly more common to use '' electronic voting machines''. Traditionally, a voting machine has been defi ...
s was leaked. Researchers at
Johns Hopkins University
Johns Hopkins University (Johns Hopkins, Hopkins, or JHU) is a private research university in Baltimore, Maryland. Founded in 1876, Johns Hopkins is the oldest research university in the United States and in the western hemisphere. It consiste ...
and
Rice University
William Marsh Rice University (Rice University) is a private research university in Houston, Texas. It is on a 300-acre campus near the Houston Museum District and adjacent to the Texas Medical Center. Rice is ranked among the top universit ...
published a critique of Diebold's products, based on an analysis of the software. They found, for example, that it would be easy to program a
counterfeit
To counterfeit means to imitate something authentic, with the intent to steal, destroy, or replace the original, for use in illegal transactions, or otherwise to deceive individuals into believing that the fake is of equal or greater value tha ...
voting card to work with the machines and then use it to cast multiple votes inside the voting booth.
*In 2003 a Chinese hacker acquired the source code for ''
Lineage II'' and sold it to someone in
California
California is a state in the Western United States, located along the Pacific Coast. With nearly 39.2million residents across a total area of approximately , it is the most populous U.S. state and the 3rd largest by area. It is also the ...
who then used it to create a bootleg version of the game, powered by his own servers. Despite warnings from
NCSoft that pirating an online game was considered illegal, he continued doing so for a few years, until the
Federal Bureau of Investigation
The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, ...
finally raided his home in 2007, seized the servers and permanently disabled the website that fronted his bootleg version of ''Lineage II''.
*In 2003, one year after
3dfx was bought by
Nvidia
Nvidia CorporationOfficially written as NVIDIA and stylized in its logo as VIDIA with the lowercase "n" the same height as the uppercase "VIDIA"; formerly stylized as VIDIA with a large italicized lowercase "n" on products from the mid 1990s to ...
and support ended, the source code for their drivers leaked, resulting in
fan-made, updated drivers.
*In 2004, a large portion of
Windows NT 4.0's source code and a small percentage (reportedly about 15%) of
Windows 2000
Windows 2000 is a major release of the Windows NT operating system developed by Microsoft and oriented towards businesses. It was the direct successor to Windows NT 4.0, and was released to manufacturing on December 15, 1999, and was official ...
's were leaked online. The Windows 2000 source code leak was analysed by a writer for (now defunct) website
Kuro5hin who noted that while the code was generally well written, it allegedly contained about "a dozen" instances of
profanity
Profanity, also known as cursing, cussing, swearing, bad language, foul language, obscenities, expletives or vulgarism, is a socially offensive use of language. Accordingly, profanity is language use that is sometimes deemed impolite, ru ...
and the milder
euphemism
A euphemism () is an innocuous word or expression used in place of one that is deemed offensive or suggests something unpleasant. Some euphemisms are intended to amuse, while others use bland, inoffensive terms for concepts that the user wishes ...
"crap". The writer also noted that there were a lot of code hacks, with the "uglier" ones mostly being for compatibility with older programs and some hardware. It was feared that because of the leak, the number of security
exploit
Exploit means to take advantage of something (a person, situation, etc.) for one's own end, especially unethically or unjustifiably.
Exploit can mean:
* Exploitation of natural resources
*Exploit (computer security)
* Video game exploit
*Exploita ...
s would increase due to wider scrutiny of the source code. It was later discovered that the source of the leak originated from
Mainsoft.
*Also in 2004, partial (800 MB) proprietary source code that drives
Cisco Systems
Cisco Systems, Inc., commonly known as Cisco, is an American-based multinational corporation, multinational digital communications technology conglomerate (company), conglomerate corporation headquartered in San Jose, California. Cisco develo ...
' networking hardware was made available in the internet. The site posted two files of source code written in the
C programming language
''The C Programming Language'' (sometimes termed ''K&R'', after its authors' initials) is a computer programming book written by Brian Kernighan and Dennis Ritchie, the latter of whom originally designed and implemented the language, as well as ...
, which apparently enables some next-generation
IPv6
Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. I ...
functionality. News of the latest source code leak appeared on a Russian security site.
*In 2006,
Anonymous
Anonymous may refer to:
* Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown
** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author
* Anonym ...
hackers stole source code (about 1 GiB) for
Symantec Symantec may refer to:
*An American consumer software company now known as Gen Digital Inc.
*A brand of enterprise security software purchased by Broadcom Inc.
Broadcom Inc. is an American designer, developer, manufacturer and global supplier ...
's
pcAnywhere from the company's network. While confirmed in January 2012, it is still unclear how the hackers accessed the network.
*In late 2007, the source code of
Norton Ghost 12 and a
Norton Anti-Spyware version were available via
BitTorrent.
*In December 2007 and January 8, a
Pirate Bay
The Pirate Bay (sometimes abbreviated as TPB) is an online index of digital content of entertainment media and software. Founded in 2003 by Swedish think tank Piratbyrån, The Pirate Bay allows visitors to search, download, and contribute ...
user published the sources of five
Idera SQL products via BitTorrent.
*In January 2011 the "stolen source code" of
Kaspersky Anti-Virus 2008 was published on the Pirate Bay.
*On May 20, 2011, ''
EVE Onlines
source code
In computing, source code, or simply code, is any collection of code, with or without comment (computer programming), comments, written using a human-readable programming language, usually as plain text. The source code of a Computer program, p ...
was published by someone on a
GitHub
GitHub, Inc. () is an Internet hosting service for software development and version control using Git. It provides the distributed version control of Git plus access control, bug tracking, software feature requests, task management, co ...
repository. After being online for four days, CCP Games issued a
DMCA take-down request which was followed by GitHub.
*In 2011, the
source code
In computing, source code, or simply code, is any collection of code, with or without comment (computer programming), comments, written using a human-readable programming language, usually as plain text. The source code of a Computer program, p ...
of ''
GunZ: The Duel'' v1.5 became available online.
*In December 2011, the source code of the
Solaris 11 operating system's kernel was leaked via BitTorrent.
*In August 2014 ''
S.T.A.L.K.E.R.: Clear Skys
X-Ray Engine source code
In computing, source code, or simply code, is any collection of code, with or without comment (computer programming), comments, written using a human-readable programming language, usually as plain text. The source code of a Computer program, p ...
(and its successor) became available on
GitHub
GitHub, Inc. () is an Internet hosting service for software development and version control using Git. It provides the distributed version control of Git plus access control, bug tracking, software feature requests, task management, co ...
under a non-
open-source license.
*On December 29, 2015, the
AmigaOS 3.1 source code leaked to the web, confirmed by the rights holder
Hyperion Entertainment.
*In January 2017 the source code of Opera's
Presto
Presto may refer to:
Computing
* Presto (browser engine), an engine previously used in the Opera web browser
* Presto (operating system), a Linux-based OS by Xandros
* Presto (SQL query engine), a distributed query engine
* Presto (animation s ...
Browser engine was leaked to GitHub. The source code was shortly after taken down with a DMCA notice.
*In June 2017 a small part of Microsoft's
Windows 10
Windows 10 is a major release of Microsoft's Windows NT operating system. It is the direct successor to Windows 8.1, which was released nearly two years earlier. It was released to manufacturing on July 15, 2015, and later to retail on ...
source code leaked to the public. The leak was of the Shared Source Kit, a small portion of the source code given to
OEMs to help with writing drivers.
*In February 2018, the
iBoot bootloader
A bootloader, also spelled as boot loader or called boot manager and bootstrap loader, is a computer program that is responsible for booting a computer.
When a computer is turned off, its softwareincluding operating systems, application code, an ...
for
Apple
An apple is an edible fruit produced by an apple tree (''Malus domestica''). Apple trees are cultivated worldwide and are the most widely grown species in the genus '' Malus''. The tree originated in Central Asia, where its wild ances ...
operating systems' source code was leaked onto GitHub by an Apple engineer. The code was from 2016, and by the time it was leaked, iBoot had been restructured, making it obsolete.
*On April 22, 2020, ''
Counter-Strike: Global Offensive'' and ''
Team Fortress 2
''Team Fortress 2'' is a 2007 multiplayer first-person shooter game developed and published by Valve Corporation. It is the sequel to the 1996 ''Team Fortress'' mod for '' Quake'' and its 1999 remake, ''Team Fortress Classic''. The game was rel ...
'' code was leaked.
* Some time during March 2018, Nintendo suffered a
significant leak when a hacker obtained an alleged 2 TB of confidential material containing source codes to game consoles, games, and internal documentation. Starting in 2018, the contents of this breach slowly made their way onto the Internet, starting with iQue Player ROMs and various
Pokémon
(an abbreviation for in Japan) is a Japanese media franchise managed by The Pokémon Company, founded by Nintendo, Game Freak, and Creatures (company), Creatures, the owners of the trademark and copyright of the franchise.
In terms of ...
games. Later in 2020, the leaks gained more attention and grew in size, culminating into the release of Wii and Nintendo 64 source code, and the so-called "Gigaleak", a massive release containing multiple N64 games' source code and SNES Prototypes. After July 2021, no more releases have occurred.
* On August 7, 2020, 20 GB of
Intellectual property
Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, cop ...
of
Intel
Intel Corporation is an American multinational corporation and technology company headquartered in Santa Clara, California, Santa Clara, California. It is the world's largest semiconductor chip manufacturer by revenue, and is one of the devel ...
, including source code (in
SystemVerilog and otherwise) of their
system on chips leaked (with preserving
git structure). That included
Intel ME
The Intel Management Engine (ME), also known as the Intel Manageability Engine, is an autonomous subsystem that has been incorporated in virtually all of Intel's processor chipsets since 2008. It is located in the Platform Controller Hub of m ...
,
Intel Microcode
Intel Corporation is an American multinational corporation and technology company headquartered in Santa Clara, California. It is the world's largest semiconductor chip manufacturer by revenue, and is one of the developers of the x86 series ...
and software simulators of their hardware. Their various BIOS source code was also leaked. The
SpaceX
Space Exploration Technologies Corp. (SpaceX) is an American spacecraft manufacturer, launcher, and a satellite communications corporation headquartered in Hawthorne, California. It was founded in 2002 by Elon Musk with the stated goal of ...
cameras firmware that Intel worked on also leaked. The data is being distributed through a torrent.
* On September 23, 2020,
Windows XP
Windows XP is a major release of Microsoft's Windows NT operating system. It was release to manufacturing, released to manufacturing on August 24, 2001, and later to retail on October 25, 2001. It is a direct upgrade to its predecessors, Wind ...
SP1 and
Windows Server 2003
Windows Server 2003 is the sixth version of Windows Server operating system produced by Microsoft. It is part of the Windows NT family of operating systems and was released to manufacturing on March 28, 2003 and generally available on April 24, ...
complete source code depots were leaked. The archives included all the source code from the time it was used at Microsoft, including documentation and build tools. The leak was first dismissed as illegitimate, but it was soon clear that it was legitimate, the source code contained Windows XP specific code and resources, later one user managed to compile the OS and pack it into an
ISO image.
*On January 4, 2021,
Nissan North America source code was leaked online due to misconfiguration of a company
Git server, which was left exposed online with a default username and password of admin/admin. Software engineer
Tillie Kottmann
maia arson crimew (formerly known as Tillie Kottmann, and also known as deletescape and antiproprietary; born August 7, 1999) is a Swiss developer and computer hacker. crimew worked in information technology as a teenager, becoming the foun ...
learned of the leak and analyzed the data, which they shared with
ZDNet
ZDNET is a business technology news website owned and operated by Red Ventures.
The brand was founded on April 1, 1991, as a general interest technology portal from Ziff Davis and evolved into an enterprise IT-focused online publication.
H ...
. The repository reportedly contained Nissan NA mobile apps, parts of the Nissan ASIST diagnostics tool, Nissan's internal core mobile library, Dealer Business Systems and Dealer Portal, client acquisition and retention tools, market research tools and data, vehicle logistics portal, vehicle connected services, and various other back ends and internal tools, they reported.
*On February 10, 2021, ''
Cyberpunk 2077'' and ''
Witcher 3'' developer
CD Projekt Red (CDPR) announced hackers had targeted the company and attempted to hold it to ransom. On 6 June 2021, someone in possession of the data had leaked all of ''Cyberpunk 2077'' code (96.02 GB of data in 7z archive) online publicly, while previously it was only available in encrypted form.
*On October 6, 2021, streaming site
Twitch had its source code along with earnings reports of top streamers leaked by hackers on
4chan
4chan is an anonymous English-language imageboard website. Launched by Christopher "moot" Poole in October 2003, the site hosts boards dedicated to a wide variety of topics, from anime and manga to video games, cooking, weapons, television, ...
, citing the streaming site's negative community and desire for competition and disruption of the online video streaming space. The breach was confirmed by Twitch on Twitter. The leak was distributed freely via a
torrent file and was 135.17 GB in size. As a precaution, all the stream keys have been reset by Twitch.
*On February 25, 2022, ransomware group LAPSUS$ hacked
NVIDIA
Nvidia CorporationOfficially written as NVIDIA and stylized in its logo as VIDIA with the lowercase "n" the same height as the uppercase "VIDIA"; formerly stylized as VIDIA with a large italicized lowercase "n" on products from the mid 1990s to ...
and reportedly obtained 1 terabyte of proprietary information. The group subsequently released a ~20 GB archive containing the source code for NVIDIA GPU drivers among other things. Details for a
Nintendo Switch
The is a hybrid video game console developed by Nintendo and released worldwide in most regions on March 3, 2017. The console itself is a tablet that can either be docked for use as a home console or used as a portable device, making it a ...
successor were also found among the data. It was also reported recently that the group also infiltrated Portuguese media conglomerate Impresa, the Ministry of Health in Brazil and Brazilian telecommunications company Claro.
*On September 18, 2022, an
Untitled Grand Theft Auto game had a massive leak online, with 90 videos of the game being released. It was confirmed by a worker at Rockstar Games that the leak was real. The content of the leak received mixed reviews, with many calling the game unfinished and rushed, but many criticized these complaints by stating the game was not near completion. The leak itself, however, received negative reception, with many claiming it discredited the work of several employees. Publisher TakeTwo began taking down leaks on several different websites. Rockstar issued a statement on September 19, which stated they were "disappointed" with the leak.
** The hacker who got the leak also got the source code for
Grand Theft Auto V
''Grand Theft Auto V'' is a 2013 action-adventure game developed by Rockstar North and published by Rockstar Games. It is the seventh main entry in the Grand Theft Auto, ''Grand Theft Auto'' series, following 2008's ''Grand Theft Auto IV'', and ...
, and announced he would be selling both. Shortly after, he announced the GTA VI source code was no longer for sale, but was still selling the GTA V source code. This has been considered a form of blackmail.
End-of-life leaks by developers
Sometimes software developers themselves will intentionally leak their source code in an effort to prevent a software product from becoming
abandonware
Abandonware is a product, typically software, ignored by its owner and manufacturer, and for which no official support is available.
Within an intellectual rights contextual background, abandonware is a software (or hardware) sub-case of the ...
after it has reached its
end-of-life, allowing the community to continue development and support. Reasons for leaking instead of a proper release to
public domain
The public domain (PD) consists of all the creative work to which no exclusive intellectual property rights apply. Those rights may have expired, been forfeited, expressly waived, or may be inapplicable. Because those rights have expired, ...
or as
open-source can include scattered or lost
intellectual property rights
Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, cop ...
. An example is the
video game
Video games, also known as computer games, are electronic games that involves interaction with a user interface or input device such as a joystick, game controller, controller, computer keyboard, keyboard, or motion sensing device to gener ...
''
Falcon 4.0''
which became available in 2000; another one is ''
Dark Reign 2''.
Other leaks
* In late 1998, a number of confidential
Microsoft
Microsoft Corporation is an American multinational corporation, multinational technology company, technology corporation producing Software, computer software, consumer electronics, personal computers, and related services headquartered at th ...
documents later dubbed the ''
Halloween documents
The Halloween documents comprise a series of confidential Microsoft memoranda on potential strategies relating to free software, open-source software, and to Linux in particular, and a series of media responses to these memoranda. Both the leaked ...
'' were leaked to
Eric S. Raymond, an activist in the
open-source software
Open-source software (OSS) is computer software that is released under a license in which the copyright holder grants users the rights to use, study, change, and distribute the software and its source code to anyone and for any purpose. Ope ...
movement, who published and commented on them online. The documents revealed that internally Microsoft viewed free and open-source software such as
Linux
Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which i ...
as technologically competitive and a major threat for Microsoft's dominance in the market, and they discussed strategies to combat them. The discovery caused a public controversy. The documents were also used as evidence in several court cases.
*
Nintendo's crossover fighting video game series ''
Super Smash Bros.
''Super Smash Bros.'' is a Crossover (fiction), crossover fighting game series published by Nintendo. The series was created by Masahiro Sakurai, who has directed every game in the series. The series is known for its unique gameplay objectiv ...
'' has a history of having unconfirmed content leaked. Every game since, including 2008's ''
Super Smash Bros. Brawl'' has been affected by leaks in some form:
**''Super Smash Bros. Brawl'' for the
Wii was leaked by a video on the
Japanese language
is spoken natively by about 128 million people, primarily by Japanese people and primarily in Japan, the only country where it is the national language. Japanese belongs to the Japonic or Japanese- Ryukyuan language family. There have been ...
wii.com website, revealing unconfirmed playable characters on January 28, 2008 (three days before the game's Japanese release).
**''
Super Smash Bros. for Nintendo 3DS and Wii U'' was afflicted in August 2014 by the "ESRB leak", where many screenshots and limited video footage of the 3DS version were leaked by a supposed member of the
ESRB. The leak gained traction very quickly due to the screenshots mostly containing elements that the game ratings board would be interested in, such as trophies of suggestively-dressed female characters (some of which were later found to be edited or cut altogether in the final game).
**''
Super Smash Bros. Ultimate'' was leaked in its entirety two weeks before its release, allowing many to play and datamine in advance. While the entire roster of characters and stages had already been officially revealed, many unrevealed collectibles, music tracks, and story elements were discovered and distributed. This prompted Nintendo to issue copyright strikes to many YouTube and Twitch channels.
*November 2009:
Climatic Research Unit email leak, aka Climategate
* Several high-profile books have been leaked on the Internet before their official release date, including ''
If I Did It'', ''
Harry Potter and the Deathly Hallows'', and an early draft of the first twelve chapters of ''
Midnight Sun
The midnight sun is a natural phenomenon that occurs in the summer months in places north of the Arctic Circle or south of the Antarctic Circle, when the Sun remains visible at the local midnight. When the midnight sun is seen in the Arctic, ...
''. The leak of the latter prompted the author
Stephenie Meyer
Stephenie Meyer (; née Morgan; born December 24, 1973) is an American novelist and film producer. She is best known for writing the vampire romance series ''Twilight'', which has sold over 100 million copies, with translations into 37 differ ...
to suspend work on the novel.
* 2010
My Little Pony: Friendship Is Magic
''My Little Pony: Friendship Is Magic'' is an animated children's television series based on the fourth incarnation of Hasbro's ''My Little Pony'' franchise. The series follows a studious unicorn (later an alicorn) pony named Twilight Spark ...
has been filled with lot of leaks for later seasons on scenes, leaked full song to the theme song, leaked early released episodes before they got aired on
Discovery Family, unfinished episodes, 2018–present there was leaks for the generation 5 as
My Little Pony: A New Generation was the start.
* On January 31, 2014, the original uncensored version of the ''
South Park'' episode "
201" was leaked, when it was illegally pulled from the South Park Studios servers and was posted online in its entirety without any approval by
Comedy Central
Comedy Central is an American basic cable channel owned by Paramount Global through its network division's MTV Entertainment Group unit, based in Manhattan. The channel is geared towards young adults aged 18–34 and carries comedy program ...
. The episode was heavily censored by the network when it aired in 2010 against the will of series creators
Trey Parker
Randolph Severn "Trey" Parker III (born October 19, 1969) is an American actor, animator, filmmaker, and composer. He is known for co-creating ''South Park'' (since 1997) and ''The Book of Mormon'' (2011) with his creative partner Matt Stone. P ...
and
Matt Stone
Matthew Richard Stone (born May 26, 1971) is an American actor, animator, filmmaker, and composer. He is known for co-creating '' South Park'' (since 1997) and '' The Book of Mormon'' (2011) with his creative partner Trey Parker. Stone was inte ...
, and was never formally released uncensored to the public. The episode was the second in a
two parter and was censored after the airing of the
first part as a result of
death threats from
Islamic extremists
Islamic extremism, Islamist extremism, or radical Islam, is used in reference to extremist beliefs and behaviors which are associated with the Islamic religion. These are controversial terms with varying definitions, ranging from academic und ...
who were angry of the episode's storyline satirizing censorship of
depictions of Muhammad
The permissibility of depictions of Muhammad in Islam has been a contentious issue. Oral and written descriptions of Muhammad are readily accepted by all traditions of Islam, but there is disagreement about visual depictions. The Quran does not ...
.
* In 2015 the unaired ''
Aqua Teen Hunger Force'' episode "Boston" was leaked online. The episode was set to air during the
fifth season as a response to a controversial
publicity stunt
In marketing, a publicity stunt is a planned event designed to attract the public's attention to the event's organizers or their cause. Publicity stunts can be professionally organized, or set up by amateurs. Such events are frequently utilize ...
for ''
Aqua Teen Hunger Force Colon Movie Film for Theaters
''Aqua Teen Hunger Force Colon Movie Film for Theaters'' (also known as ''Aqua Teen Hunger Force: Movie Film for Theaters'') is a 2007 American adult animated surreal black comedy film based on the Adult Swim animated series '' Aqua Teen Hunge ...
''
that occurred in the titular city, but
Adult Swim
Adult Swim (AS; stylized as dult swim'' and often abbreviated as s'') is an American adult-oriented night-time cable television channel that shares channel space with the basic cable network Cartoon Network and is programmed by its in-house ...
was forced to pull it to avoid further controversy.
* On March 13, 2016, the full list of qualifying teams and first round match-ups for the
2016 NCAA Men's Division I Basketball Tournament leaked on Twitter in the midst of a television special being broadcast by
CBS to officially unveil them. The leak exacerbated criticism of a new, two-hour format for the selection broadcast, which was criticized for revealing the full tournament bracket at a slower pace than in previous years.
* On April 20, 2021,
Apple
An apple is an edible fruit produced by an apple tree (''Malus domestica''). Apple trees are cultivated worldwide and are the most widely grown species in the genus '' Malus''. The tree originated in Central Asia, where its wild ances ...
supplier
Quanta Computer was hit by a ransomware attack. The attackers began posting documents and schematics of
MacBook computer designs as recent as March 2021. The attackers threatened to release everything they had obtained by May 1, 2021, unless a ransom had been paid, however nothing further came out of the breach.
See also
*
Distributed Denial of Secrets
*
GlobaLeaks
GlobaLeaks is an open-source, free software intended to enable secure and anonymous whistleblowing initiatives.
History
The project started on 15 December 2010 and the first software prototype was announced on 6 September 2011.
Relevant figure ...
*
News leak
*
Nikki Catsouras photographs controversy, a 2006 California case in which police photographs of a fatal automobile accident were leaked online
*
royaldutchshellplc.com
Shell plc is a British multinational oil and gas company headquartered in London, England. Shell is a public limited company with a primary listing on the London Stock Exchange (LSE) and secondary listings on Euronext Amsterdam and the N ...
*
Software release life cycle
A software release life cycle is the sum of the stages of development and maturity for a piece of computer software ranging from its initial development to its eventual release, and including updated versions of the released version to help impro ...
*
WikiLeaks
WikiLeaks () is an international non-profit organisation that published news leaks and classified media provided by anonymous sources. Julian Assange, an Australian Internet activist, is generally described as its founder and director and ...
References
{{Reflist, 30em
Internet terminology
Intellectual property law
Internet trolling
Internet leaks