Trending
The Benefits of Lychee During Pregnancy: A Comprehensive Guide What Our Grandparents Ate: Personal Reflections, Wicked Facts and Teachings to Todays Diet What Happened When I Finally Fixed My Burpee Form? Muladhara Mudra: Meaning, Benefits, Side Effects and How To Do? Toe Cage for Bike Pedals : Benefits, Side Effects and How To Use How To Get Breasts Back After Weight Loss Leucotomy: Techniques, Treatment and Outlook Adi Mudra: Benefits, Side Effects, How To Do and Precautions What is Kundalini Sex Energy: Its origin, Effects and Its Significance in Various Spiritual Practices Archer Push Up : Benefits And How To Do? Magnificent Benefits and Side Effects of Skipping Rope Which Exercise is Best For Irritable Bowel Syndrome? How To Increase Muscle Mass For Skinny Guys : 8 Secret Tips Ankylosing Spondylitis In Females: Causes, Symptoms and Treatment What to Wear for Yoga – Comfort, Style, and Science Tabata Yoga : History, Benefits & Types Can Pregnant Women Eat Sour Cream : Know From Experts How I Discovered the Golden Lucuma Fruit — and Why It’s Now a Staple in My Kitchen What Are The Difference Between Pull-Ups And Lat Pull Down Amazing Phytolacca Berry for Rapid Weight Loss Protein Requirements By Age: Benefits and Types What is Obesity: Symptoms, Causes, Treatment and Exercises 10 Warning Signs of Mold Toxicity That You Should not Ignore Preventing Sports Injuries with Yoga Is Crying a Sign of Weakness? How Does Insulin Injections Work in Diabetes? Spirituality For Beginners: The Best Guide to Finding Your Path What Do Carrot Leaves Look Like Incredible Health Benefits and Side Effects of Coconut Seal Pose Yoga: How To Do, Benefits and Variations How To Take Care of Yourself During Summer? How Long to Hold Yoga Poses for Weight Loss: A Comprehensive Guide Paralysis Treatment: By Yoga, Exercise And Physiotherapy Vicks On Belly Button : Benefits, Side Effects and How To Apply Dairy Free Diet Plan for Breastfeeding Mothers Is Ashwagandha Safe During Early Pregnancy? How to Relieve Knee Pain Caused by Intense Workouts What’s the First Rule of Yoga? Apple Cider Vinegar on an Empty Stomach: The Experience, the Experts and the Reality. Is Alkaline Water Help To Reduce Alcohol Flush?
Workout
Nutritious
Meditation
Well-Being
Appointment
Review Board
Mood Music
Health Tracker
Social Service
Health Care
Podcast E-book
Success Stories
✓ Fact Checked

Inside the Infamous “Fappening”: The Real Story Behind the Celebrity Photo Hack

Listen to this article

One of the most invasive privacy scandals in internet history occurred in 2014, and it was to be commonly known as The Fappening. Without their permission, hundreds of personal photographs of celebrities were stolen and shared on the Internet, which caused a worldwide and emotional reaction in the world, legal proceedings, and a long-awaited discussion of the topic of digital security and Internet ethics.

Though the very images were the major headlines, less people knew how the breach occurred and who exactly was involved. This paper goes past the shock value to describe the man who has had the most direct connection with the murder, how the murder happened, and why it is still significant in modern society.

What Was “The Fappening”?

The Fappening is the name of the mass leakage of personal celebrity photos, most of which were stored on personal cloud accounts, that began to leak onto anonymous forums before going viral all over the internet.

The breach, however, was not brought about by failure in the iCloud system of Apple as had been rumored early. Rather, researchers were later able to establish that the attack was mainly caused by coordinated phishing attacks- a social engineering method used to defraud users into surrendering their login details.(1)

The Person Background of the Breach: Ryan Collins.

In 2016, the U.S. law enforcement officials named Ryan Collins, a Pennsylvania resident, as a primary suspect in the case. Collins was not a master hacker as such. He was not able to crack encryption, or use sophisticated software weaknesses. Rather, he had his way in a much easier manner–and quite alarmingly effective.

How He Did It?

Collins also sent forged emails that were supposed to appear as official messages of Apple and Google.

Victims were redirected to fake that are related to fraudulent logins after these emails and usernames and passwords were entered without their knowledge.

After accessing the account, Collins downloaded personal photos and backups that were stored in his cloud accounts.(2)

This approach enabled him to access the personal information of over 100 individuals between 2012 and 2014, with most of them being prominent individuals.

study
Cyberattacks and Security of Cloud Computing

Legal Consequences.

Ryan Collins later admitted of gaining unauthorized access to safeguarded computers. He was convicted in 2016 to 18 months imprisonment and restitution on federal prison.

What Was “The Fappening”

Notably, the records in court confirmed that Collins was not the one to propagate the pictures in the public. But in doing so, he has illegally accessed and gathered them and this action initiated a sequence of events that has exposed them to large numbers.

The Fappening: Why it was a Breaking Point.

The scandal compelled the world to reckon on a number of fronts:

1. Digital Privacy Is Fragile.

The incident demonstrated that even well-known people that have resources are susceptible to simple social-engineering attacks.

2. Blaming of Victims was Common.

The first significant discussion in society was not about the wrongfulness of stealing and sharing photos but about the reasons why celebrities had to take personal photos in the first place. This attitude was subsequently greatly condemned.

3. Better Defensive Security Measures Came Up.

Following the incident, technology businesses advocated more:

  • Two-factor authentication.
  • Suspicious logins security alerts.
  • Increased phishing education to users.

The role of Media, Ethics and the Internet.

The speed with which stolen content diffused was one of the saddest parts of the Fappening, as was the number of sites that earned money off it. The incident raised some grave ethical concerns regarding:

  • Liability of the internet-based platforms.
  • Consent in the digital age.
  • The irreversibility of information after it has been leaked.

With time, numerous platforms revised the policies to prohibit non-consent intimacy material, with the damage already inflicted.

The Legacy of the Fappening.

Over ten years after the Fappening, it is still a lesson. It was not only a celebrity scandal, it was a wake-up call concerning cybersecurity, consent, and the human cost of being exploited online.

It is not an anonymous person executing the breach anymore, but the lessons gained by him are much more important than a name. At a time when our personal information is stored online, the incident is a wakeup call that we cannot expect to be given privacy, but we are obliged to work towards it, and any breach of it should not be underestimated.

+2 Sources

FreakToFit has strict sourcing guidelines and relies on peer-reviewed studies, educational research institutes, and medical organizations. We avoid using tertiary references. You can learn more about how we ensure our content is accurate and up-to-date by reading our editorial policy.

  1. Phishing Attacks: A Recent Comprehensive Study and a New Anatomy; https://www.frontiersin.org/journals/computer-science/articles/10.3389/fcomp.2021.563060/full
  2. Cyberattacks and Security of Cloud Computing: A Complete Guideline; https://www.mdpi.com/2073-8994/15/11/1981

Last reviewed on

Leave a Comment

SUBSCRIBE TO GET LATEST FITNESS AND NUTRITION UPDATES!

We don’t spam! Read more in our privacy policy

The FreakToFit News team takes pride in providing readers with accurate, properly sourced, and objectively analyzed content. Each news piece is stringently fact-checked by our Integrity Network, and any form of plagiarism or malicious behavior from our authors and contributors is strictly forbidden.

Our articles follow a number of key standards:

  • Each cited research and studies should come from renowned peer-reviewed journals or educational bodies. Additionally, any quoted data and figures must be traceable to its origin, while also detailing their significance.

  • Content related to treatment, medicine, and procedure must plainly specify availability, cost, possible side effects, targets, possible interactions, and unapproved usage (if relevant).

  • Every news article should have inputs from at least two authorized professionals, with corresponding qualifications and ties to appropriate associations or works.

  • The reader must be made aware of any potential conflict of interest relating to the source or study.

  • Finally, all news pieces should be supplied with enough background and context regarding the relevant topic or condition.

Index

✋ Wait A Second…

×
You May Like This