The Fappening, and how to protect your private photos (2024)

31 August 2014 is likely to go down in internet history as ‘the Fappening 2014’. To cut a long and very seedy story short, a member of the 4Chan website yesterday released a trove of intimate photos of almost a hundred (almost entirely female) A-list actors, singers and celebrities, including the likes of Jennifer Lawrence, Avril Lavigne, Kim Kardashian, Rihanna, Kirsten Dunst, Aubrey Plaza and Winona Ryder.

As news of the leaked photos spread like wildfire, first to Reddit and then to the wider media, a storm of interest arose. #Fappening continues to trend on Twitter, and the Fappening subedit within hours reached over 40,000 readers (with many men stylishly making crude references to jerking off over the photos).

The resultant media circus has declared outrage at the leak, but by continuing to splash the story over news headlines, has encouraged the public to seek out the photos. We ask our readers to respect the affected women’s privacy, and not to perpetuate sexist behavior or encourage the creep who obtained the photos (and who has promised to release more in return for payment), by resisting any temptation to search for and/or click on these images.

As horror movie actress Mary Elizabeth Winstead noted on Twitter,

To those of you looking at photos I took with my husband years ago in the privacy of our home, hope you feel great about yourselves.

‘Nuff said.

How were the photos obtained?

The original leaker claimed to have obtained the nude photos through an exploit which allowed him (her/them?) to access photos stored on victims’ phones through their Apple iCloud accounts, and media attention has focused mainly on this area (including Apple's Photo Stream utility and iCloud photo backups service).

However, some of the photos are ‘selfies’, and clearly show celebrities using Android devices or webcams to take the photos, and some photos have text overlaid on them that point to their being uploaded using Snapchat (a service with a record of security problems).

Given the huge number of photos featuring such a wide range of celebrities, it has also been suggested that social engineering was used to get close to the targets (perhaps by some form of collective), obtaining positions of trust, such as personal assistants or bodyguards, that would allow access to the stars intimate records. Physical theft of personal phones is also a possibility.

How to prevent this happening to you

Media attention has focused on Apple’s iCloud service, but as noted above this may be somewhat unfair to Apple, and similar services such as Dropbox and Google Drive present comparable security risksanyway. Therefore, while these notes concentrate on iCloud and iDevices, we strongly recommend users of other devices and cloud services take similar precautions.

Use strong passwords

Weak passwords are the single greatest security risk there is on the internet. Not only are passwords such as ‘123456’ and ‘password’ ridiculously common, but in the case of celebrities, where are large amount of personal information about their lives is in the public sphere, it is not difficult for attackers to guess weak passwords based on their family or pets names, where they have lived, their hobbies and interests,etc.

A strong password should contain a long string of random letters and numbers, including symbols and a mix of capital and non-caps letters. Of course, remembering even one such password is next to impossible for us mere mortals, let alone one for each and every important account, so this is where password managers come in.

Password managers randomly generate secure passwords, remember them for you, and integrate with your OS and/or browser to make using them as easy and seamless to use as possible. Although perhaps a little rougher around the edges than commercial offerings such as LastPass and 1Password, we recommend KeePass for iOS and KeePassX for OSX (both fully compatible iterations of the excellent KeePass) because they are free and open source.

Use two-factor authentication

Two factor (or step) authentication (2FA) secures an account by requiring that anyone accessing it needs not just a password and username, but a code sent to their phone, combining ‘something you know’ i.e. your username / password, with ‘something you have’ i.e. your phone.

The Fappening, and how to protect your private photos (1)

Instructions for turning on 2FA for iCloud are available here, but this feature is also available for similar services such as Dropbox, Google (including Drive) and Microsoft (SkyDrive). A more complete list of services which offer 2FA is available here.

Turn off photo auto-upload

In common with most major cloud storage services, iCloud offers a feature known as Photo Stream, which automatically backs up photos taken on an iPhone or iPad, and uploads them the cloud. This is widely regarded a security weak point (although iCloud does use at least 128-bit AES encryption), and it may be a good idea to turn any such feature off, no matter how useful it is.

Conclusion

It is likely that the celebrities’ accounts were hacked through poor security at the user-end, rather than through a fundamental flaw in technology, and following the simple steps outlined above you can vastly improve the chances of a similar thing never happening to you.

The Fappening, and how to protect your private photos (2024)

FAQs

How do I keep my photos private and safe? ›

Important: The first time you try to move photos and videos to Locked Folder, you'll be prompted to set it up.
  1. Open the Google Photos app .
  2. Tap Library. Locked.
  3. Select Set up Locked Folder. You can also choose to turn on backup for Locked Folder at this time.
  4. Follow the on-screen instructions to unlock your device.

What is the safest place to keep private photos? ›

Google Photos keeps your private photos & videos safe. Encryption keeps data private and secure while in transit.

How can I legally protect my photos? ›

9 Steps to Protect Your Photos From Unauthorized Use
  1. Never Share High-Resolution Files. ...
  2. Compress Your Images to Lower the Quality. ...
  3. Watermark Your Images. ...
  4. Register an Official Copyright. ...
  5. Add a Copyright Notice. ...
  6. Create a Digital Signature. ...
  7. Disable Right Click and Copy. ...
  8. Block Screenshots.
Jun 15, 2023

Top Articles
Baldur's Gate 3: Best Daggers, Ranked
How Does The Martial Arts Community Positively Impact Mental Health?
Craigslist Livingston Montana
Worcester Weather Underground
Asian Feels Login
Shs Games 1V1 Lol
Kobold Beast Tribe Guide and Rewards
Richard Sambade Obituary
Gameday Red Sox
Www Movieswood Com
New Day Usa Blonde Spokeswoman 2022
South Ms Farm Trader
4156303136
Nashville Predators Wiki
Chris Hipkins Fue Juramentado Como El Nuevo Primer Ministro De...
Wilmot Science Training Program for Deaf High School Students Expands Across the U.S.
Lancasterfire Live Incidents
25Cc To Tbsp
Gentle Dental Northpointe
Kcwi Tv Schedule
Never Give Up Quotes to Keep You Going
Craigslistodessa
Bill Remini Obituary
Sherburne Refuge Bulldogs
Kitchen Exhaust Cleaning Companies Clearwater
Xxn Abbreviation List 2017 Pdf
Pacman Video Guatemala
Fuse Box Diagram Honda Accord (2013-2017)
Superhot Free Online Game Unblocked
Opsahl Kostel Funeral Home & Crematory Yankton
Minecraft Jar Google Drive
Litter-Robot 3 Pinch Contact & DFI Kit
Covalen hiring Ai Annotator - Dutch , Finnish, Japanese , Polish , Swedish in Dublin, County Dublin, Ireland | LinkedIn
Scanning the Airwaves
The Closest Walmart From My Location
Indio Mall Eye Doctor
Wrigley Rooftops Promo Code
How Many Dogs Can You Have in Idaho | GetJerry.com
M Life Insider
RECAP: Resilient Football rallies to claim rollercoaster 24-21 victory over Clarion - Shippensburg University Athletics
Weather Underground Cedar Rapids
Rush Copley Swim Lessons
Petra Gorski Obituary (2024)
Goats For Sale On Craigslist
Tìm x , y , z :a, \(\frac{x+z+1}{x}=\frac{z+x+2}{y}=\frac{x+y-3}{z}=\)\(\frac{1}{x+y+z}\)b, 10x = 6y và \(2x^2\)\(-\) \(...
Rétrospective 2023 : une année culturelle de renaissances et de mutations
Publix Store 840
Jovan Pulitzer Telegram
WHAT WE CAN DO | Arizona Tile
Bunbrat
Latest Posts
Article information

Author: Otha Schamberger

Last Updated:

Views: 5295

Rating: 4.4 / 5 (75 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Otha Schamberger

Birthday: 1999-08-15

Address: Suite 490 606 Hammes Ferry, Carterhaven, IL 62290

Phone: +8557035444877

Job: Forward IT Agent

Hobby: Fishing, Flying, Jewelry making, Digital arts, Sand art, Parkour, tabletop games

Introduction: My name is Otha Schamberger, I am a vast, good, healthy, cheerful, energetic, gorgeous, magnificent person who loves writing and wants to share my knowledge and understanding with you.