What the Fappening and the Snappening has taught us

Hackers seem to have found a new hobby. Break in to third party applications which are connected to services like SnapChat, Facebook, Twitter and Instagram.

The services are being used by people that like to share personal pictures to the internet. The problem is the fact that people think that they are only sharing their “personal pictures” to an specific service, but the reality is often different.

A lot of the services which are mentioned above, allow developers to use the service API. The API allows them to interact with the service database which holds pictures, user logins and so on.

How do they do it

Now the hackers often use a smart technique to gain personal information from their victims. They use applications / websites which can be connected to the service API. In this way the hackers are able to create a process which does the following:

  1. Allow user login
  2. Check user login with original database of the service via the API connection
  3. If connection is success, store the user login in personal hacker database
  4. Allow the user to connect and use the “promised” services

It is really that simple, the hackers are able to steal personal information via applications which they have setup.

The second method which can be used by the hackers is more aggressive. The hackers will search the third-party environment for vulnerabilities and they will eventually exploit them.

This could lead to cases like “The Fappening” and “The Snappening”.

Secure pictures with password

Now I was thinking of the following, hackers will always find a way to obtain personal information. The fact is that nothing is 100% secure, and it will never be 100% secure.

But what you can do, is to secure your pictures or personal information with a password, or encryption. This will make it harder for the hackers to “view” the leaked personal information or pictures.

Timelock on pictures

The second method, could be a timelock application. The picture is only available for “X” amount of time, and when the time has reached. The picture will be “encrypted and stored” on an offline database.

Do not use public sharing sites

The best method is NOT to share any pictures or information on the internet, but this method will kick you back to the age of NO INTERNET.

Do not use third-party applications

The Fappening and the Snappening were allowed because people were not aware of the risk their pictures might bring.

4chan and The Snappening

Now we all know 4Chan. It is the massive network which talks about EVERYTHING and shares EVERYTHING.

The /b/ page on 4Chan is often used to spread Trolls and other things which are WANTED and NEEDED by the bored people on the internet.

Now just imagine, if someone in the 4chan channel claims that it owns 200 000 leaked pictures. The /b/ page will go insane, and will try their best to make it go viral.