Internet leak

An Internet leak occurs when a party's confidential intellectual property is released to the public on the Internet. Various types of information and data can be, and have been, "leaked" to the Internet, the most common being personal information, computer software and source code, and artistic works such as albums. For example, a musical album is leaked if it has been made available to the public on the Internet before its official release date; this musical material is still intended to be confidential.

Source code leaks are usually caused by misconfiguration of software like CVS or FTP which allow people to get source files by exploiting this, by software bugs, or by employees that have access to the sources of part of them revealing the code in order to harm the company.

There were many cases of source code leaks in the history of software development. For example, in 2003 a cracker exploited a security hole in Microsoft's Outlook to get the complete source of "Half-Life 2", which was under development at the time. The complete source was soon available in various file sharing networks. This leak was rumored to be the cause of the game's delay, but later was stated not to be.

Also in 2003, source code to Diebold Election Systems Inc. voting machines has been leaked. Researchers at Johns Hopkins University and Rice University published a damning critique of Diebold's products, based on an analysis of the software. They found, for example, that it would be easy to program a counterfeit voting card to work with the machines and then use it to cast multiple votes inside the voting booth.

Another case involved a partial leak of the source code to Microsoft Windows 2000. Two files containing Microsoft source code were circulating on the Internet. One contains a majority of the NT4 source code and the other contains a fraction of the Windows 2000 source code, reportedly about 15% of the total. This includes some networking code including winsock and inet; as well as some shell code. It was feared that because of the leak, the number of security exploits would increase due to wider scrutinization of the source code.

In 2004 partial (800mb) proprietary source code that drives Cisco Systems' networking hardware was made available in the internet. The site posted two files of source code written in the C programming language, which apparently enables some next-generation Internet Protocol version 6 functionality. News of the latest source code leak appeared on a Russian security site, [http://www.SecurityLab.ru SecurityLab.ru] .

On January 28, 2008, Nintendo's crossover fighting video game "Super Smash Bros. Brawl" for the Wii console had a major leak having to do with unconfirmed playable characters. The leak was unintentionally started by the Japanese language www.wii.com website, which released a video that included small images of not-yet confirmed characters within the game. The website fixed this mistake, but the leak still continued. Websites like YouTube contain screenshots and video gameplay of the unconfirmed characters of the game.

High-profile Internet leaks

* [http://news.bbc.co.uk/2/hi/technology/3162074.stm 3 October 2003] : "Half-Life 2" source code
* [http://news.bbc.co.uk/2/hi/technology/3485545.stm 13 February 2004] : Microsoft Windows 2000/NT source code
* [http://www.theregister.co.uk/2005/02/21/paris_hacked/ 21 February 2005] : Paris Hilton's mobile phone address book

ee also

*Software release life cycle
*Release (music)


Wikimedia Foundation. 2010.

Look at other dictionaries:

  • Leak (disambiguation) — A leak is a a hole through which substances can escape or enter. It can also refer to:*Gas leak *Fuel leak *Grid leak, an operating characteristic of vacuum tubes *Internet leak, political leak, news leak, an unwanted transmission of information… …   Wikipedia

  • Leak — Der Begriff Leak (engl., Leck, Loch, undichte Stelle) bezeichnet im Allgemeinen die inoffizielle Veröffentlichung von Informationen, die nicht zu diesem Zweck vorgesehen waren. Dies können interne Dokumente von Firmen, geheime Verträge,… …   Deutsch Wikipedia

  • Internet Explorer — Windows Internet Explorer A component of Microsoft Windows Internet Explorer 9 in Wi …   Wikipedia

  • Internet Explorer 8 — Windows Internet Explorer 8 A component of Microsoft Windows Internet Explorer 8 in Windows 7 …   Wikipedia

  • Internet in Burma — The Internet in Burma (also known as Myanmar) has been available since 2000 when the first Internet connections were established. However, the military government works aggressively to limit and control Internet access through software based… …   Wikipedia

  • News leak — A news leak is a disclosure of embargoed information in advance of its official release, or the unsanctioned release of confidential information. Contents 1 Types of news leaks 2 Reasons for leaks 3 Notable news leaks 3.1 …   Wikipedia

  • United States diplomatic cables leak — This article is about the release of leaked U.S. diplomatic cables by WikiLeaks. For the contents of those cables, see Contents of the United States diplomatic cables leak. For reactions to the leak, see Reactions to the United States diplomatic… …   Wikipedia

  • CIA leak grand jury investigation — (related to the CIA leak scandal , also known as the Plame affair ) was a federal inquiry into the alleged unauthorized disclosure of a Central Intelligence Agency (CIA) employee s identity, a possible violation of criminal statutes, including… …   Wikipedia

  • CIA leak scandal criminal investigation — The CIA leak scandal is a dispute stemming from allegations that one or more White House officials revealed Central Intelligence Agency (CIA) agent Valerie Plame Wilson’s under cover status. An investigation is underway concerning the possibility …   Wikipedia

  • Trend Micro Internet Security — 2008 Developer(s) Trend Micro Stable release Internet Security 2010 (V17.50.13 …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.