World Library  
Flag as Inappropriate
Email this Article

Internet leak

Article Id: WHEBN0002750352
Reproduction Date:

Title: Internet leak  
Author: World Heritage Encyclopedia
Language: English
Subject: Kevin Parker (musician), High by the Beach, 201 (South Park), Kamaal/The Abstract, Hail to the Thief
Collection: Computer Security, Intellectual Property Law, Internet Terminology
Publisher: World Heritage Encyclopedia

Internet leak

An Internet leak occurs when a party's confidential information is released to the public on the Internet. Various types of information and data can be, and have been, "leaked" to the Internet, the most common being personal information, computer software and source code, and artistic works such as books or albums. For example, a musical album is leaked if it has been made available to the public on the Internet before its official release date; and is still intended to be confidential.


  • Source code leaks 1
    • End-of-life leaks by developers 1.1
  • Other leaks 2
  • High-profile Internet leaks 3
  • See also 4
  • References 5

Source code leaks

Source code leaks are usually caused by misconfiguration of software like CVS or FTP which allow people to get source files by exploiting, by software bugs, or by employees that have access to the sources of part of them revealing the code in order to harm the company.

There were many cases of source code leaks in the history of software development. For example, in 2003 a hacker exploited a security hole in Microsoft's Outlook to get the complete source of Half-Life 2, which was under development at the time.[1][2] The complete source was soon available in various file sharing networks. This leak was rumored to be the cause of the game's delay,[3] but later was stated not to be.

Also in 2003, source code to Diebold Election Systems Inc. voting machines was leaked. Researchers at Johns Hopkins University and Rice University published a damning critique of Diebold's products, based on an analysis of the software. They found, for example, that it would be easy to program a counterfeit voting card to work with the machines and then use it to cast multiple votes inside the voting booth.

Another case involved a partial leak of the source code to Microsoft Windows 2000. Two files containing Microsoft source code were circulating on the Internet. One contains a majority of the NT4 source code and the other contains a fraction of the Windows 2000 source code, reportedly about 15% of the total. This includes some networking code including Winsock and inet; as well as some shell code. It was feared that because of the leak, the number of security exploits would increase due to wider scrutiny of the source code.

In 2004, partial (800 MB) proprietary source code that drives Cisco Systems' networking hardware was made available in the internet. The site posted two files of source code written in the C programming language, which apparently enables some next-generation IPv6 functionality. News of the latest source code leak appeared on a Russian security site.[4]

In 2006, Anonymous hackers stole source code (about 1 GiB) for Symantec's pcAnywhere from the company's network. While confirmed in January 2012, it is still unclear how the hackers accessed the network.[5]

In late 2007, the source code of Norton Ghost 12 and a Norton Anti-Spyware version were available via BitTorrent.

In December 2007 and January 8, a Pirate Bay user published the sources of five Idera SQL products via BitTorrent.

In January 2011 the "stolen source code" of Kaspersky Anti-Virus 2008 was published on the Pirate Bay.

In December 2011, the source code of the Oracle Solaris 11 operating system was available via BitTorrent.

End-of-life leaks by developers

Sometimes software developers themselves will leak their source code in an effort to prevent a software product from becoming Abandonware after it has reached its End-of-life, allowing the community to continue development and support. Reasons for leaking instead of a proper release to public domain or as open source can include scattered or lost intellectual property rights. An example is the video game Falcon 4.0[6] which became available in 2000; another one is Dark Reign 2,[7][8] which was released by an anonymous former Pandemic Studios developer in 2011.

Other leaks

  • In fall 1998, a number of confidential Microsoft documents later dubbed the Halloween documents were leaked to Eric S. Raymond, an activist in the open-source software movement, who published and commented on them on the net. The documents revealed that internally Microsoft viewed free and open-source software such as Linux as technologically competitive and a major threat for Microsoft's dominance in the market, and they discussed strategies to combat them. The discovery caused a public controversy. The documents were also used as evidence in several court cases.
  • On January 28, 2008, Nintendo's crossover fighting video game Super Smash Bros. Brawl for the Wii console had a major leak having to do with unconfirmed playable characters. The leak was unintentionally started by the Japanese language website, which released a video that included small images of not-yet confirmed characters within the game. The website fixed this mistake, but the leak still continued. Websites like YouTube contain screenshots and video gameplay of the unconfirmed characters of the game. In 2014, Super Smash Bros. for Nintendo 3DS and Wii U suffered a similar leak, where unannounced fighters and stages were shown through images taken by an ESRB member.
  • On January 31, 2014 the original uncensored version of the South Park episode "201" was leaked, when it was illegally pulled from the South Park Studios servers and was posted online in its entirety without any approval by Comedy Central. The episode was heavily censored by the network when it aired in 2010 against the will of series creators Trey Parker and Matt Stone, and was never formally released uncensored to the public. The episode was the second in a two parter and was censored after the airing of the first part as a result of death threats from Islamic extremists who were angry of the episode's storyline satirizing censorship of depictions of Muhammad.[9]

High-profile Internet leaks

See also


  1. ^ "Playable Version of Half-Life 2 Stolen". CNN Money. 2003-10-07. Retrieved February 14, 2007. 
  2. ^ Parkin, Simon (2011-02-21). "The Boy Who Stole Half-Life 2 - The story behind the $250 million robbery.". Retrieved 2013-09-05. 
  3. ^ "Half Life 2 Source-Code Leak Delays Debut". TechNewsWorld. Retrieved February 14, 2007. 
  4. ^ "SecurityLab". Retrieved 15 June 2015. 
  5. ^ "Symantec suspected source code breach back in 2006". Ars Technica. Retrieved 15 June 2015. 
  6. ^ Bertolone, Giorgio (2011-03-12). "Interview with Kevin Klemmick - Lead Software Engineer for Falcon 4.0". Cleared-To-Engage. Archived from the original on 2011-03-18. Retrieved 2014-08-31. [C2E] In 2000 the source code of Falcon 4.0 leaked out and after that groups of volunteers were able to make fixes and enhancements that assured the longevity of this sim. Do you see the source code leak as a good or bad event? [Klemmick] "Absolutely a good event. In fact I wish I’d known who did it so I could thank them. I honestly think this should be standard procedure for companies that decide not to continue to support a code base." 
  7. ^ Timothy (2012-08-07). "Dark Reign 2 Goes Open Source".  
  8. ^ "darkreign2".  
  9. ^ O'Neal, Sean. "An uncensored version of South Park's controversial Muhammad episode has surfaced".  
  10. ^ Gonzales, Dave. "Banned Aqua Teen Hunger Force Boston episode leaks online".  
  11. ^ "BBC NEWS - Technology - Half-Life 2 code leaked online". Retrieved 15 June 2015. 
  12. ^ "BBC NEWS - Technology - Q&A: Microsoft source code leaked". Retrieved 15 June 2015. 
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from World eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.