Adult friend finder similar
What's often not highlighted in these cases is the monetary value of such a breach.Many would argue that having an email address and the associated data might be of little value.The source IP addresses collected can even provide pinpoint street locations for attacks.
He wanted his friend to get paid, so he went public.
That is, if Adult Friend Finder were using a solution that provided visibility into network traffic.
Ziften ZFlow™ enables network visibility into the cloud to catch aberrant data transfers and attribute to specific executing processes.
It may sound devious or somehow over the line, but would you buy a lock from a lock manufacturer that professed to know nothing about how a lock is picked? Anyway, with my limited talents I could easily have walked into the Friend Finder database and collected the same thing that ROR[RG] collected and, using it for analysis, written my story. Instead I went to ROR[RG]’s area where he had placed the data.
As usual, being a day late and a dollar short, by the time I knocked on the door he was selling incomplete segments of the database for non-exclusive use for ,000.