Nobody expects a Spanish Inquisition...![]()



^^ "Ello ello ello! What's all this, then?"
"Nudge, Nudge, wink wink."



Last edited:
TPF may earn a commission from merchant affiliate
links, including eBay, Amazon, and others
Nobody expects a Spanish Inquisition...![]()
^^ "Ello ello ello! What's all this, then?"
"Nudge, Nudge, wink wink."
Which, I think, ties into the "guy code" I mentioned. I think that these criminals are men and, as such, are empathetic in this regard. They can put themselves in the guys' position and not want to be that guy whose stuff gets scrutinized and talked about.
Additionally, were these criminals looking specifically for female nudes or simply looking to crack some phones? Because they did crack the phones of male celebrities. The question is why aren't those nude picture being shared? The answer is not that men don't take nude pictures or that these criminals are not voluntarily looking for male nudes.
Lol I think you are thinking way too much into how a guys mind works.
They rarely over think things like women do. They are visual creatures plain and simple. They want to see boibs butts and coochie. They don't give an eff about people making remarks over a guys body. Lol.
Pretty sure if you asked a lot of men for nudes or d&!k pics they'd be happy to oblige. James Franco prolly would love to put all his on YouTube or something.
Many of the men said their everyday lives didn’t really afford them space to talk about their bodies and the pride and/or insecurity those bodies can elicit. They usually spoke about their penises with sexual partners or sometimes with guy friends, but the former conversations tended to involve (as one interviewee put it) “a biased party, trying to be kind or preserve feelings or get things going,” and locker-room-style conversation among lads was largely sexual grandstanding.
Link (has photos that are NSFW)
I cant feel bad for them as theyre dumb enough to have pics like that in the first place. There's no way i would have nudes of myself floating around if i was famous.
Yep, I was going to post about the gay market, but people are so sensitive around here, didn't want to offend anyone.Good article. Let's not forget gay men like to look at other men. If they could have found a way to market it to them, they would have.
They went with what would have the most appeal immediately IMO.
And agree @Singra..men can be just as sensitive about their bodies.
Our devices are way too adept at collecting information about us. When we take photos with GPS-enabled cameras and smartphones, they often add a geotag to mark the spot where the image was taken, which is bad news for the many high-profile individuals whose photos leaked online this weekend. On top of their bodies being exposed, many celebrities are having the location where they took nude shots revealed through the metadata in the hacked images. Security expert Ashkan Soltani notes the exif data on many of the photos reveals the coordinates where they were taken.
It’s not just nude photos celebs need to worry about — a number of the leaked images reveal their GPS location pic.twitter.com/2MhrqSq4tr
— ashkan soltani (@ashk4n) September 2, 2014
Any shots taken at a private residence — which is usually where people take revealing shots — can also reveal where a celebrity lives, aiding stalkers. Sports gossip blog Deadspin has already taken advantage of this, mapping out the geotagged location of photos stolen from Detroit Tigers pitcher Justin Verlander and matching them up with his schedule. Verlander’s photos include images of model Kate Upton, who he is dating. Deadspin notes for example that a photo of the “silhouette of someone’s penis” was taken in November outside of Richmond, Va., helpfully noting that Verlander owns a home in Goochland, Va. Unlike many other media sites, Deadspin has no compunctions about linking to the stolen and NSFW images it describes.
Many social media sites — such as Twitter, Instagram and Facebook — strip exif data from images when you post them, unless a user proactively chooses to include their location. But the original photo file on a phone will contain that information (something to keep in mind when you share photos with people via email or text message). This is yet another thing for those affected by the hack to worry about.
Meanwhile Apple admitted the obvious in a statement Tuesday, saying the images did indeed come from Apple accounts. Describing the company as “outraged,” Apple’s PR team said that after “more than 40 hours of investigation, we have discovered that certain celebrity accounts were compromised by a very targeted attack on user names, passwords and security questions, a practice that has become all too common on the Internet.” In other words, the attacker or attackers correctly guessed in which city celebs’ parents met or the model of their first car.
“Thank you iCloud,” tweeted actress Kirsten Dunst sarcastically on Monday, adding a poo emoji. She is among the celebrities affected.
Apple says that “none of the cases we have investigated has resulted from any breach in any of Apple’s systems including iCloud® or Find my iPhone.” Many experts have suggested that attackers could have figured out celebs’ passwords by brute-forcing their accounts as iCloud did not previously limit the number of passwords you could try. Andy Greenberg at Wired cites evidence that hackers were using this flaw combined with a tool designed by law enforcement to download Apple users’ iPhone backups. Apple’s phrasing suggests that the password rate limiting mistake wasn’t a factor in this massive hack, but the statement requires enough parsing that I can’t tell if it’s a full denial or simply an evasive one. Either way, Apple has since fixed the problem so that you can only try the wrong password on iCloud a limited number of times before getting locked out of the account.
Apple said it’s working with law enforcement to identify the culprit(s). A spokesperson for the FBI in Los Angeles says, “The FBI is aware of the allegations concerning computer intrusions and the unlawful release of material involving high profile individuals, and is addressing the matter.” In the meantime, Apple recommends turning on two-factor authentication for your account and “using a strong password.”
Over at the ACLU, technologist Chris Soghoian makes some excellent points about what tech giants Google and Apple should learn from this. For one, part of the reason why people have sh***y Apple passwords is that Apple makes you enter it every time you download a new app. No one wants to type a jumble of letters, numbers and %$#es every time they’re in iTunes or the App store. He recommends Apple require a short pin to do that and something stronger for protection of people’s iCloud accounts, which can grant access to their photos and iMessages. Another clever suggestion he makes is that Apple and Google give us the equivalent of “private browsing mode” for photos. Many of us want our photos backed up, so we don’t lose our vacation photos if we drop our phone in the ocean, but we don’t want our scandalous selfies going into the cloud along with our sunset selfies.
“Apple, Google and the other big tech companies should acknowledge that millions of their customers regularly use their products to engage in sensitive, intimate activities,” writes Soghoian. “These companies can and should offer a ‘private photo’ option for sensitive photos that prevents them from being uploaded to the cloud.”
Apple’s PR team said that after “more than 40 hours of investigation, we have discovered that certain celebrity accounts were compromised by a very targeted attack on user names, passwords and security questions, a practice that has become all too common on the Internet.” In other words, the attacker or attackers correctly guessed in which city celebs’ parents met or the model of their first car.
Here's another thing. From the article above:
.
But then again you are not the representation of the whole male population.
Here's another thing. From the article above:
If you're a celebrity with an active fan base and on-line biographies, those things are not hard to find. If you're an average Scmo with active social media accounts, you've probably posted those things more than once yourself.
Sooooo.......
When using security reminder questions and prompts where you supply the responses during account set-up, fake it. Use a word that wouldn't normally apply.
Q: In what city were you born?
A: Blue.
Q: What color was your first car?
A: Ocean
Q: Where was your first house?
A: Moon
It doesn't matter if the answer is valid to the question. It only matters that YOU know the response. It's simple word association; a basic If > Then statement.