Source code leak
   HOME

TheInfoList



OR:

An internet leak is the unauthorized release of information over the
internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
. Various types of information and data can be, and have been, "leaked" to the Internet, the most common being personal information, computer
software Software is a set of computer programs and associated software documentation, documentation and data (computing), data. This is in contrast to Computer hardware, hardware, from which the system is built and which actually performs the work. ...
and
source code In computing, source code, or simply code, is any collection of code, with or without comments, written using a human-readable programming language, usually as plain text. The source code of a program is specially designed to facilitate the w ...
, and artistic works such as books or
album An album is a collection of audio recordings issued on compact disc (CD), vinyl, audio tape, or another medium such as digital distribution. Albums of recorded sound were developed in the early 20th century as individual 78 rpm records co ...
s. For example, a musical album is leaked if it has been made available to the public on the Internet before its official release date.


Music leaks


Source code leaks

Source code leaks are usually caused by misconfiguration of software like CVS or
FTP The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and data ...
which allow people to get source files through exploits, software bugs, or employees that have access to the sources or part of them revealing the code in order to harm the company. There were many cases of source code leaks in the history of software development. *As
Fraunhofer IIS The Fraunhofer Society (german: Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V., lit=Fraunhofer Society for the Advancement of Applied Research) is a German research organization with 76institutes spread throughout Germany ...
released in 1994 only a low quality version of their
MP3 MP3 (formally MPEG-1 Audio Layer III or MPEG-2 Audio Layer III) is a coding format for digital audio developed largely by the Fraunhofer Society in Germany, with support from other digital scientists in the United States and elsewhere. Origin ...
encoding software ( l3enc), a hacker named SoloH gathered the
source code In computing, source code, or simply code, is any collection of code, with or without comments, written using a human-readable programming language, usually as plain text. The source code of a program is specially designed to facilitate the w ...
from the unprotected servers of the
University of Erlangen A university () is an institution of higher (or tertiary) education and research which awards academic degrees in several academic disciplines. Universities typically offer both undergraduate and postgraduate programs. In the United States, th ...
and developed a higher quality version, which started the MP3 revolution on the internet. *Around 1996
Electronic Arts Electronic Arts Inc. (EA) is an American video game company headquartered in Redwood City, California. Founded in May 1982 by Apple employee Trip Hawkins, the company was a pioneer of the early home computer game industry and promoted the ...
accidentally put the source code of the video game ''
FIFA 97 ''FIFA 97'' (also known as ''FIFA Soccer 97'') is a Association football, football Simulation video game, simulation video game developed by EA Canada and published by Electronic Arts. It was released for IBM PC compatible, PC on 24 June 1996 and ...
'' on a
demo Demo, usually short for demonstration, may refer to: Music and film *Demo (music), a song typically recorded for reference rather than release * ''Demo'' (Behind Crimson Eyes), a 2004 recording by the band Behind Crimson Eyes * ''Demo'' (Deafhea ...
disc. *In 2003, Axel Gembe, a German
hacker A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
, who had infiltrated
Valve A valve is a device or natural object that regulates, directs or controls the flow of a fluid (gases, liquids, fluidized solids, or slurries) by opening, closing, or partially obstructing various passageways. Valves are technically fitting ...
's internal network months earlier, exploited a security hole in
Microsoft's Microsoft Corporation is an American multinational corporation, multinational technology company, technology corporation producing Software, computer software, consumer electronics, personal computers, and related services headquartered at th ...
Outlook Outlook or The Outlook may refer to: Computing * Microsoft Outlook, an e-mail and personal information management software product from Microsoft * Outlook.com, a web mail service from Microsoft * Outlook on the web, a suite of web applications ...
to get the complete source of the video game ''
Half-Life 2 ''Half-Life 2'' is a 2004 first-person shooter game developed by Valve Corporation, Valve. It was published by Valve through its distribution service Steam (service), Steam. Like the original ''Half-Life (video game), Half-Life'' (1998), ''Half- ...
''. The source code was leaked online a week later, a playable version of Half-Life 2 was compiled from the source code, revealing how unfinished it was. The leaks damaged morale at Valve and slowed development. In March 2004, Gembe contacted
Gabe Newell Gabe Logan Newell (born November 3, 1962), nicknamed Gaben, is an American businessman and the president of the video game company Valve. Newell was born in Colorado and grew up in Davis, California. He attended Harvard University in the early ...
, CEO of Valve, and identified himself, saying he was a fan and had not acted maliciously. Newell worked with the FBI to invite Gembe to a fake job interview, planning to have him arrested in the USA; however, police arrested him in Germany. The complete source was soon available in various file sharing networks. *Also in 2003, source code to Diebold Election Systems Inc.
voting machine A voting machine is a machine used to record votes in an election without paper. The first voting machines were mechanical but it is increasingly more common to use '' electronic voting machines''. Traditionally, a voting machine has been defi ...
s was leaked. Researchers at
Johns Hopkins University Johns Hopkins University (Johns Hopkins, Hopkins, or JHU) is a private research university in Baltimore, Maryland. Founded in 1876, Johns Hopkins is the oldest research university in the United States and in the western hemisphere. It consi ...
and
Rice University William Marsh Rice University (Rice University) is a private research university in Houston, Texas. It is on a 300-acre campus near the Houston Museum District and adjacent to the Texas Medical Center. Rice is ranked among the top universities ...
published a critique of Diebold's products, based on an analysis of the software. They found, for example, that it would be easy to program a counterfeit voting card to work with the machines and then use it to cast multiple votes inside the voting booth. *In 2003 a Chinese hacker acquired the source code for ''
Lineage II ''Lineage II'' is a massively multiplayer online role-playing game (MMORPG) for Microsoft Windows and the second game in the ''Lineage'' series. It is a prequel to ''Lineage'' and is set 150 years before the first game. It has become popular sinc ...
'' and sold it to someone in
California California is a state in the Western United States, located along the Pacific Coast. With nearly 39.2million residents across a total area of approximately , it is the most populous U.S. state and the 3rd largest by area. It is also the m ...
who then used it to create a bootleg version of the game, powered by his own servers. Despite warnings from NCSoft that pirating an online game was considered illegal, he continued doing so for a few years, until the
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, ...
finally raided his home in 2007, seized the servers and permanently disabled the website that fronted his bootleg version of ''Lineage II''. *In 2003, one year after 3dfx was bought by
Nvidia Nvidia CorporationOfficially written as NVIDIA and stylized in its logo as VIDIA with the lowercase "n" the same height as the uppercase "VIDIA"; formerly stylized as VIDIA with a large italicized lowercase "n" on products from the mid 1990s to ...
and support ended, the source code for their drivers leaked, resulting in
fan-made Fan labor, also called fan works, are the creative activities engaged in by fans, primarily those of various media properties or musical groups. These activities can include creation of written works (fiction, fan fiction and review literature), ...
, updated drivers. *In 2004, a large portion of Windows NT 4.0's source code and a small percentage (reportedly about 15%) of
Windows 2000 Windows 2000 is a major release of the Windows NT operating system developed by Microsoft and oriented towards businesses. It was the direct successor to Windows NT 4.0, and was released to manufacturing on December 15, 1999, and was officiall ...
's were leaked online. The Windows 2000 source code leak was analysed by a writer for (now defunct) website
Kuro5hin Kuro5hin (K5; read "corrosion") was a collaborative discussion website founded by Rusty Foster in 1999, having been inspired by Slashdot. Articles were created and submitted by users and submitted to a queue for evaluation. Site members could ...
who noted that while the code was generally well written, it allegedly contained about "a dozen" instances of
profanity Profanity, also known as cursing, cussing, swearing, bad language, foul language, obscenities, expletives or vulgarism, is a socially offensive use of language. Accordingly, profanity is language use that is sometimes deemed impolite, rud ...
and the milder euphemism "crap". The writer also noted that there were a lot of code hacks, with the "uglier" ones mostly being for compatibility with older programs and some hardware. It was feared that because of the leak, the number of security
exploit Exploit means to take advantage of something (a person, situation, etc.) for one's own end, especially unethically or unjustifiably. Exploit can mean: *Exploitation of natural resources *Exploit (computer security) * Video game exploit *Exploitat ...
s would increase due to wider scrutiny of the source code. It was later discovered that the source of the leak originated from Mainsoft. *Also in 2004, partial (800 MB) proprietary source code that drives
Cisco Systems Cisco Systems, Inc., commonly known as Cisco, is an American-based multinational digital communications technology conglomerate corporation headquartered in San Jose, California. Cisco develops, manufactures, and sells networking hardware, ...
' networking hardware was made available in the internet. The site posted two files of source code written in the C programming language, which apparently enables some next-generation
IPv6 Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPv ...
functionality. News of the latest source code leak appeared on a Russian security site. *In 2006, Anonymous hackers stole source code (about 1 GiB) for Symantec's pcAnywhere from the company's network. While confirmed in January 2012, it is still unclear how the hackers accessed the network. *In late 2007, the source code of Norton Ghost 12 and a Norton Anti-Spyware version were available via BitTorrent. *In December 2007 and January 8, a Pirate Bay user published the sources of five Idera SQL products via BitTorrent. *In January 2011 the "stolen source code" of Kaspersky Anti-Virus 2008 was published on the Pirate Bay. *On May 20, 2011, ''
EVE Online ''Eve Online'' (stylised ''EVE Online'') is a space-based, persistent world massively multiplayer online role-playing game (MMORPG) developed and published by CCP Games. Players of ''Eve Online'' can participate in a number of in-game profes ...
s
source code In computing, source code, or simply code, is any collection of code, with or without comments, written using a human-readable programming language, usually as plain text. The source code of a program is specially designed to facilitate the w ...
was published by someone on a
GitHub GitHub, Inc. () is an Internet hosting service for software development and version control using Git. It provides the distributed version control of Git plus access control, bug tracking, software feature requests, task management, continu ...
repository. After being online for four days, CCP Games issued a
DMCA The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or ...
take-down request which was followed by GitHub. *In 2011, the
source code In computing, source code, or simply code, is any collection of code, with or without comments, written using a human-readable programming language, usually as plain text. The source code of a program is specially designed to facilitate the w ...
of '' GunZ: The Duel'' v1.5 became available online. *In December 2011, the source code of the
Solaris 11 Solaris may refer to: Arts and entertainment Literature, television and film * ''Solaris'' (novel), a 1961 science fiction novel by Stanisław Lem ** ''Solaris'' (1968 film), directed by Boris Nirenburg ** ''Solaris'' (1972 film), directed by ...
operating system's kernel was leaked via BitTorrent. *In August 2014 '' S.T.A.L.K.E.R.: Clear Skys
X-Ray Engine ''S.T.A.L.K.E.R.: Shadow of Chernobyl'' is a first-person shooter survival horror video game developed by GSC Game World and published by THQ in 2007 following a long development. The game is set in an alternative reality, where a second disast ...
source code In computing, source code, or simply code, is any collection of code, with or without comments, written using a human-readable programming language, usually as plain text. The source code of a program is specially designed to facilitate the w ...
(and its successor) became available on
GitHub GitHub, Inc. () is an Internet hosting service for software development and version control using Git. It provides the distributed version control of Git plus access control, bug tracking, software feature requests, task management, continu ...
under a non-
open-source license An open-source license is a type of license for computer software and other products that allows the source code, blueprint or design to be used, modified and/or shared under defined terms and conditions. This allows end users and commercial compa ...
. *On December 29, 2015, the
AmigaOS AmigaOS is a family of proprietary native operating systems of the Amiga and AmigaOne personal computers. It was developed first by Commodore International and introduced with the launch of the first Amiga, the Amiga 1000, in 1985. Early versions ...
3.1 source code leaked to the web, confirmed by the rights holder Hyperion Entertainment. *In January 2017 the source code of Opera's Presto Browser engine was leaked to GitHub. The source code was shortly after taken down with a DMCA notice. *In June 2017 a small part of Microsoft's
Windows 10 Windows 10 is a major release of Microsoft's Windows NT operating system. It is the direct successor to Windows 8.1, which was released nearly two years earlier. It was released to manufacturing on July 15, 2015, and later to retail on J ...
source code leaked to the public. The leak was of the Shared Source Kit, a small portion of the source code given to
OEMs An original equipment manufacturer (OEM) is generally perceived as a company that produces non-aftermarket parts and equipment that may be marketed by another manufacturer. It is a common industry term recognized and used by many professional or ...
to help with writing drivers. *In February 2018, the iBoot
bootloader A bootloader, also spelled as boot loader or called boot manager and bootstrap loader, is a computer program that is responsible for booting a computer. When a computer is turned off, its softwareincluding operating systems, application code, an ...
for
Apple An apple is an edible fruit produced by an apple tree (''Malus domestica''). Apple trees are cultivated worldwide and are the most widely grown species in the genus ''Malus''. The tree originated in Central Asia, where its wild ancestor, ' ...
operating systems' source code was leaked onto GitHub by an Apple engineer. The code was from 2016, and by the time it was leaked, iBoot had been restructured, making it obsolete. *On April 22, 2020, '' Counter-Strike: Global Offensive'' and '' Team Fortress 2'' code was leaked. * Some time during March 2018, Nintendo suffered a significant leak when a hacker obtained an alleged 2 TB of confidential material containing source codes to game consoles, games, and internal documentation. Starting in 2018, the contents of this breach slowly made their way onto the Internet, starting with iQue Player ROMs and various Pokémon games. Later in 2020, the leaks gained more attention and grew in size, culminating into the release of Wii and Nintendo 64 source code, and the so-called "Gigaleak", a massive release containing multiple N64 games' source code and SNES Prototypes. After July 2021, no more releases have occurred. * On August 7, 2020, 20 GB of
Intellectual property Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, cop ...
of
Intel Intel Corporation is an American multinational corporation and technology company headquartered in Santa Clara, California. It is the world's largest semiconductor chip manufacturer by revenue, and is one of the developers of the x86 seri ...
, including source code (in
SystemVerilog SystemVerilog, standardized as IEEE 1800, is a hardware description and hardware verification language used to model, design, simulate, test and implement electronic systems. SystemVerilog is based on Verilog and some extensions, and since ...
and otherwise) of their system on chips leaked (with preserving
git Git () is a distributed version control system: tracking changes in any set of files, usually used for coordinating work among programmers collaboratively developing source code during software development. Its goals include speed, data in ...
structure). That included Intel ME, Intel Microcode and software simulators of their hardware. Their various BIOS source code was also leaked. The SpaceX cameras firmware that Intel worked on also leaked. The data is being distributed through a torrent. * On September 23, 2020,
Windows XP Windows XP is a major release of Microsoft's Windows NT operating system. It was released to manufacturing on August 24, 2001, and later to retail on October 25, 2001. It is a direct upgrade to its predecessors, Windows 2000 for high-end and ...
SP1 and
Windows Server 2003 Windows Server 2003 is the sixth version of Windows Server operating system produced by Microsoft. It is part of the Windows NT family of operating systems and was released to manufacturing on March 28, 2003 and generally available on April 24, 2 ...
complete source code depots were leaked. The archives included all the source code from the time it was used at Microsoft, including documentation and build tools. The leak was first dismissed as illegitimate, but it was soon clear that it was legitimate, the source code contained Windows XP specific code and resources, later one user managed to compile the OS and pack it into an
ISO image An optical disc image (or ISO image, from the ISO 9660 file system used with CD-ROM media) is a disk image that contains everything that would be written to an optical disc, disk sector by disc sector, including the optical disc file system. ...
. *On January 4, 2021, Nissan North America source code was leaked online due to misconfiguration of a company
Git Git () is a distributed version control system: tracking changes in any set of files, usually used for coordinating work among programmers collaboratively developing source code during software development. Its goals include speed, data in ...
server, which was left exposed online with a default username and password of admin/admin. Software engineer Tillie Kottmann learned of the leak and analyzed the data, which they shared with
ZDNet ZDNET is a business technology news website owned and operated by Red Ventures. The brand was founded on April 1, 1991, as a general interest technology portal from Ziff Davis and evolved into an enterprise IT-focused online publication. His ...
. The repository reportedly contained Nissan NA mobile apps, parts of the Nissan ASIST diagnostics tool, Nissan's internal core mobile library, Dealer Business Systems and Dealer Portal, client acquisition and retention tools, market research tools and data, vehicle logistics portal, vehicle connected services, and various other back ends and internal tools, they reported. *On February 10, 2021, ''
Cyberpunk 2077 ''Cyberpunk 2077'' is a 2020 action role-playing video game developed by CD Projekt Red and published by CD Projekt. Set in Night City, an open world set in the ''Cyberpunk'' universe, players assume the role of a customisable mercenary kn ...
'' and '' Witcher 3'' developer
CD Projekt Red CD Projekt S.A. () is a Polish video game developer, publisher and distributor based in Warsaw, founded in May 1994 by Marcin Iwiński and Michał Kiciński. Iwiński and Kiciński were video game retailers before they founded the company, whi ...
(CDPR) announced hackers had targeted the company and attempted to hold it to ransom. On 6 June 2021, someone in possession of the data had leaked all of ''Cyberpunk 2077'' code (96.02 GB of data in 7z archive) online publicly, while previously it was only available in encrypted form. *On October 6, 2021, streaming site
Twitch Twitch may refer to: Biology * Muscle contraction ** Convulsion, rapid and repeated muscle contraction and relaxation ** Fasciculation, a small, local, involuntary muscle contraction ** Myoclonic twitch, a jerk usually caused by sudden muscle co ...
had its source code along with earnings reports of top streamers leaked by hackers on
4chan 4chan is an anonymous English-language imageboard website. Launched by Christopher "moot" Poole in October 2003, the site hosts boards dedicated to a wide variety of topics, from anime and manga to video games, cooking, weapons, television, ...
, citing the streaming site's negative community and desire for competition and disruption of the online video streaming space. The breach was confirmed by Twitch on Twitter. The leak was distributed freely via a
torrent file In the BitTorrent file distribution system, a torrent file or meta-info file is a computer file that contains metadata about files and folders to be distributed, and usually also a list of the network locations of trackers, which are compute ...
and was 135.17 GB in size. As a precaution, all the stream keys have been reset by Twitch. *On February 25, 2022, ransomware group LAPSUS$ hacked
NVIDIA Nvidia CorporationOfficially written as NVIDIA and stylized in its logo as VIDIA with the lowercase "n" the same height as the uppercase "VIDIA"; formerly stylized as VIDIA with a large italicized lowercase "n" on products from the mid 1990s to ...
and reportedly obtained 1 terabyte of proprietary information. The group subsequently released a ~20 GB archive containing the source code for NVIDIA GPU drivers among other things. Details for a Nintendo Switch successor were also found among the data. It was also reported recently that the group also infiltrated Portuguese media conglomerate Impresa, the Ministry of Health in Brazil and Brazilian telecommunications company Claro. *On September 18, 2022, an Untitled Grand Theft Auto game had a massive leak online, with 90 videos of the game being released. It was confirmed by a worker at Rockstar Games that the leak was real. The content of the leak received mixed reviews, with many calling the game unfinished and rushed, but many criticized these complaints by stating the game was not near completion. The leak itself, however, received negative reception, with many claiming it discredited the work of several employees. Publisher TakeTwo began taking down leaks on several different websites. Rockstar issued a statement on September 19, which stated they were "disappointed" with the leak. ** The hacker who got the leak also got the source code for Grand Theft Auto V, and announced he would be selling both. Shortly after, he announced the GTA VI source code was no longer for sale, but was still selling the GTA V source code. This has been considered a form of blackmail.


End-of-life leaks by developers

Sometimes software developers themselves will intentionally leak their source code in an effort to prevent a software product from becoming
abandonware Abandonware is a product, typically software, ignored by its owner and manufacturer, and for which no official support is available. Within an intellectual rights contextual background, abandonware is a software (or hardware) sub-case of the ...
after it has reached its end-of-life, allowing the community to continue development and support. Reasons for leaking instead of a proper release to
public domain The public domain (PD) consists of all the creative work to which no exclusive intellectual property rights apply. Those rights may have expired, been forfeited, expressly waived, or may be inapplicable. Because those rights have expired, ...
or as open-source can include scattered or lost
intellectual property rights Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, cop ...
. An example is the
video game Video games, also known as computer games, are electronic games that involves interaction with a user interface or input device such as a joystick, controller, keyboard, or motion sensing device to generate visual feedback. This fee ...
''
Falcon 4.0 ''Falcon 4.0'' is a combat flight simulation video game developed by MicroProse and published by Hasbro Interactive in 1998. The game is based around a realistic simulation of the Block 50/52 F-16 Fighting Falcon jet fighter in a full-scale mod ...
'' which became available in 2000; another one is '' Dark Reign 2''.


Other leaks

* In late 1998, a number of confidential
Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washin ...
documents later dubbed the '' Halloween documents'' were leaked to Eric S. Raymond, an activist in the
open-source software Open-source software (OSS) is computer software that is released under a license in which the copyright holder grants users the rights to use, study, change, and distribute the software and its source code to anyone and for any purpose. Op ...
movement, who published and commented on them online. The documents revealed that internally Microsoft viewed free and open-source software such as
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, w ...
as technologically competitive and a major threat for Microsoft's dominance in the market, and they discussed strategies to combat them. The discovery caused a public controversy. The documents were also used as evidence in several court cases. * Nintendo's crossover fighting video game series '' Super Smash Bros.'' has a history of having unconfirmed content leaked. Every game since, including 2008's ''
Super Smash Bros. Brawl ''Super Smash Bros. Brawl'' is a 2008 crossover fighting video game developed by Sora Ltd. and published by Nintendo for the Wii. The third installment in the ''Super Smash Bros.'' series, it was announced at a pre-E3 2005 press conferenc ...
'' has been affected by leaks in some form: **''Super Smash Bros. Brawl'' for the Wii was leaked by a video on the
Japanese language is spoken natively by about 128 million people, primarily by Japanese people and primarily in Japan, the only country where it is the national language. Japanese belongs to the Japonic or Japanese- Ryukyuan language family. There have been ...
wii.com website, revealing unconfirmed playable characters on January 28, 2008 (three days before the game's Japanese release). **''
Super Smash Bros. for Nintendo 3DS and Wii U and (colloquially and collectively referred to as ''Super Smash Bros. 4'' or ''Smash 4'') is a group of two 2014 crossover fighting video games developed by Bandai Namco Studios and Sora Ltd. and published by Nintendo for the Nintendo 3DS ...
'' was afflicted in August 2014 by the "ESRB leak", where many screenshots and limited video footage of the 3DS version were leaked by a supposed member of the
ESRB The Entertainment Software Rating Board (ESRB) is a self-regulatory organization that assigns age and content ratings to consumer video games in the United States and Canada. The ESRB was established in 1994 by the Entertainment Software Asso ...
. The leak gained traction very quickly due to the screenshots mostly containing elements that the game ratings board would be interested in, such as trophies of suggestively-dressed female characters (some of which were later found to be edited or cut altogether in the final game). **''
Super Smash Bros. Ultimate ''Super Smash Bros. Ultimate'' is a 2018 crossover fighting video game developed by Bandai Namco Studios and Sora Ltd. and published by Nintendo for the Nintendo Switch. It is the fifth installment in the '' Super Smash Bros.'' series, succeed ...
'' was leaked in its entirety two weeks before its release, allowing many to play and datamine in advance. While the entire roster of characters and stages had already been officially revealed, many unrevealed collectibles, music tracks, and story elements were discovered and distributed. This prompted Nintendo to issue copyright strikes to many YouTube and Twitch channels. *November 2009: Climatic Research Unit email leak, aka Climategate * Several high-profile books have been leaked on the Internet before their official release date, including ''
If I Did It ''If I Did It'' is a book by O. J. Simpson and Pablo Fenjves, in which Simpson puts forth a “hypothetical” description of the murders of Nicole Brown Simpson and Ron Goldman. Simpson's former manager, Norman Pardo, claimed that Simpson was ...
'', '' Harry Potter and the Deathly Hallows'', and an early draft of the first twelve chapters of ''
Midnight Sun The midnight sun is a natural phenomenon that occurs in the summer months in places north of the Arctic Circle or south of the Antarctic Circle, when the Sun remains visible at the local midnight. When the midnight sun is seen in the Arctic, ...
''. The leak of the latter prompted the author
Stephenie Meyer Stephenie Meyer (; née Morgan; born December 24, 1973) is an American novelist and film producer. She is best known for writing the vampire romance series ''Twilight'', which has sold over 100 million copies, with translations into 37 differ ...
to suspend work on the novel. * 2010 My Little Pony: Friendship Is Magic has been filled with lot of leaks for later seasons on scenes, leaked full song to the theme song, leaked early released episodes before they got aired on Discovery Family, unfinished episodes, 2018–present there was leaks for the generation 5 as My Little Pony: A New Generation was the start. * On January 31, 2014, the original uncensored version of the '' South Park'' episode "
201 Year 201 ( CCI) was a common year starting on Thursday (link will display the full calendar) of the Julian calendar. At the time, it was known as the Year of the Consulship of Fabianus and Arrius (or, less frequently, year 954 ''Ab urbe condit ...
" was leaked, when it was illegally pulled from the South Park Studios servers and was posted online in its entirety without any approval by
Comedy Central Comedy Central is an American basic cable channel owned by Paramount Global through its network division's MTV Entertainment Group unit, based in Manhattan. The channel is geared towards young adults aged 18–34 and carries comedy programmin ...
. The episode was heavily censored by the network when it aired in 2010 against the will of series creators
Trey Parker Randolph Severn "Trey" Parker III (born October 19, 1969) is an American actor, animator, filmmaker, and composer. He is known for co-creating ''South Park'' (since 1997) and '' The Book of Mormon'' (2011) with his creative partner Matt Stone. ...
and
Matt Stone Matthew Richard Stone (born May 26, 1971) is an American actor, animator, filmmaker, and composer. He is known for co-creating ''South Park'' (since 1997) and ''The Book of Mormon'' (2011) with his creative partner Trey Parker. Stone was interes ...
, and was never formally released uncensored to the public. The episode was the second in a two parter and was censored after the airing of the first part as a result of
death threats A death threat is a threat, often made anonymously, by one person or a group of people to kill another person or group of people. These threats are often designed to intimidate victims in order to manipulate their behaviour, in which case a deat ...
from Islamic extremists who were angry of the episode's storyline satirizing censorship of depictions of Muhammad. * In 2015 the unaired ''
Aqua Teen Hunger Force ''Aqua Teen Hunger Force'' (also known by various alternative titles), sometimes abbreviated as ''ATHF'' or ''Aqua Teen'', is an American adult animated television series created by Dave Willis and Matt Maiellaro for Cartoon Network's late ni ...
'' episode "Boston" was leaked online. The episode was set to air during the fifth season as a response to a controversial
publicity stunt In marketing, a publicity stunt is a planned event designed to attract the public's attention to the event's organizers or their cause. Publicity stunts can be professionally organized, or set up by amateurs. Such events are frequently utilize ...
for ''
Aqua Teen Hunger Force Colon Movie Film for Theaters ''Aqua Teen Hunger Force Colon Movie Film for Theaters'' (also known as ''Aqua Teen Hunger Force: Movie Film for Theaters'') is a 2007 American adult animated surreal black comedy film based on the Adult Swim animated series ''Aqua Teen Hunger Fo ...
'' that occurred in the titular city, but
Adult Swim Adult Swim (AS; stylized as dult swim'' and often abbreviated as s'') is an American adult-oriented night-time cable television channel that shares channel space with the basic cable network Cartoon Network and is programmed by its in-house ...
was forced to pull it to avoid further controversy. * On March 13, 2016, the full list of qualifying teams and first round match-ups for the
2016 NCAA Men's Division I Basketball Tournament The 2016 NCAA Division I men's basketball tournament involved 68 teams playing in a single-elimination tournament to determine the men's National Collegiate Athletic Association (NCAA) Division I college basketball national champion for the 20 ...
leaked on Twitter in the midst of a television special being broadcast by
CBS CBS Broadcasting Inc., commonly shortened to CBS, the abbreviation of its former legal name Columbia Broadcasting System, is an American commercial broadcast television and radio network serving as the flagship property of the CBS Entertainm ...
to officially unveil them. The leak exacerbated criticism of a new, two-hour format for the selection broadcast, which was criticized for revealing the full tournament bracket at a slower pace than in previous years. * On April 20, 2021,
Apple An apple is an edible fruit produced by an apple tree (''Malus domestica''). Apple trees are cultivated worldwide and are the most widely grown species in the genus ''Malus''. The tree originated in Central Asia, where its wild ancestor, ' ...
supplier Quanta Computer was hit by a ransomware attack. The attackers began posting documents and schematics of MacBook computer designs as recent as March 2021. The attackers threatened to release everything they had obtained by May 1, 2021, unless a ransom had been paid, however nothing further came out of the breach.


See also

*
Distributed Denial of Secrets Distributed Denial of Secrets, abbreviated DDoSecrets, is a non-profit whistleblower site for news leaks founded in 2018. Sometimes referred to as a successor to WikiLeaks, it is best known for its June 2020 publication of a large collection of ...
* GlobaLeaks *
News leak A news leak is the unsanctioned release of confidential information to news media. It can also be the premature publication of information by a news outlet, of information that it has agreed not to release before a specified time, in violation of ...
* Nikki Catsouras photographs controversy, a 2006 California case in which police photographs of a fatal automobile accident were leaked online * royaldutchshellplc.com *
Software release life cycle A software release life cycle is the sum of the stages of development and maturity for a piece of computer software ranging from its initial development to its eventual release, and including updated versions of the released version to help impro ...
*
WikiLeaks WikiLeaks () is an international non-profit organisation that published news leaks and classified media provided by anonymous sources. Julian Assange, an Australian Internet activist, is generally described as its founder and director and ...


References

{{Reflist, 30em Internet terminology Intellectual property law Internet trolling Internet leaks