HOME

TheInfoList



OR:

An internet leak is the unauthorized release of information over the
internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
. Various types of information and data can be, and have been, "leaked" to the Internet, the most common being personal information, computer
software Software is a set of computer programs and associated documentation and data. This is in contrast to hardware, from which the system is built and which actually performs the work. At the lowest programming level, executable code consists ...
and
source code In computing, source code, or simply code, is any collection of code, with or without comments, written using a human-readable programming language, usually as plain text. The source code of a program is specially designed to facilitate the wo ...
, and artistic works such as books or
album An album is a collection of audio recordings issued on compact disc (CD), Phonograph record, vinyl, audio tape, or another medium such as Digital distribution#Music, digital distribution. Albums of recorded sound were developed in the early ...
s. For example, a musical album is leaked if it has been made available to the public on the Internet before its official release date.


Music leaks


Source code leaks

Source code leaks are usually caused by misconfiguration of software like CVS or
FTP The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and data ...
which allow people to get source files through exploits, software bugs, or employees that have access to the sources or part of them revealing the code in order to harm the company. There were many cases of source code leaks in the history of software development. *As
Fraunhofer IIS The Fraunhofer Society (german: Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V., lit=Fraunhofer Society for the Advancement of Applied Research) is a German research organization with 76institutes spread throughout Germany ...
released in 1994 only a low quality version of their
MP3 MP3 (formally MPEG-1 Audio Layer III or MPEG-2 Audio Layer III) is a coding format for digital audio developed largely by the Fraunhofer Society in Germany, with support from other digital scientists in the United States and elsewhere. Origin ...
encoding software (
l3enc Fraunhofer l3enc was the first public software able to encode pulse-code modulation (PCM) .wav files to the MP3 format. The first public version was released on July 13, 1994. This commandline tool was shareware and limited to 112 kbit/s. It w ...
), a hacker named SoloH gathered the
source code In computing, source code, or simply code, is any collection of code, with or without comments, written using a human-readable programming language, usually as plain text. The source code of a program is specially designed to facilitate the wo ...
from the unprotected servers of the
University of Erlangen A university () is an institution of higher (or tertiary) education and research which awards academic degrees in several academic disciplines. Universities typically offer both undergraduate and postgraduate programs. In the United States, th ...
and developed a higher quality version, which started the MP3 revolution on the internet. *Around 1996
Electronic Arts Electronic Arts Inc. (EA) is an American video game company headquartered in Redwood City, California. Founded in May 1982 by Apple employee Trip Hawkins, the company was a pioneer of the early home computer game industry and promoted the d ...
accidentally put the source code of the video game ''
FIFA 97 ''FIFA 97'' (also known as ''FIFA Soccer 97'') is a Association football, football Simulation video game, simulation video game developed by EA Canada and published by Electronic Arts. It was released for IBM PC compatible, PC on 24 June 1996 and ...
'' on a
demo Demo, usually short for demonstration, may refer to: Music and film *Demo (music), a song typically recorded for reference rather than release * ''Demo'' (Behind Crimson Eyes), a 2004 recording by the band Behind Crimson Eyes * ''Demo'' (Deafhea ...
disc. *In 2003, Axel Gembe, a German
hacker A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
, who had infiltrated
Valve A valve is a device or natural object that regulates, directs or controls the flow of a fluid (gases, liquids, fluidized solids, or slurries) by opening, closing, or partially obstructing various passageways. Valves are technically fittings ...
's internal network months earlier, exploited a security hole in
Microsoft's Microsoft Corporation is an American multinational corporation, multinational technology company, technology corporation producing Software, computer software, consumer electronics, personal computers, and related services headquartered at th ...
Outlook Outlook or The Outlook may refer to: Computing * Microsoft Outlook, an e-mail and personal information management software product from Microsoft * Outlook.com, a web mail service from Microsoft * Outlook on the web, a suite of web applications ...
to get the complete source of the video game ''
Half-Life 2 ''Half-Life 2'' is a 2004 first-person shooter game developed by Valve. It was published by Valve through its distribution service Steam. Like the original ''Half-Life'' (1998), ''Half-Life 2'' combines shooting, puzzles, and storytelling, and ...
''. The source code was leaked online a week later, a playable version of Half-Life 2 was
compiled In computing, a compiler is a computer program that translates computer code written in one programming language (the ''source'' language) into another language (the ''target'' language). The name "compiler" is primarily used for programs that ...
from the source code, revealing how unfinished it was. The leaks damaged morale at Valve and slowed development. In March 2004, Gembe contacted
Gabe Newell Gabe Logan Newell (born November 3, 1962), nicknamed Gaben, is an American businessman and the president of the video game company Valve. Newell was born in Colorado and grew up in Davis, California. He attended Harvard University in the early ...
, CEO of Valve, and identified himself, saying he was a fan and had not acted maliciously. Newell worked with the
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and its principal Federal law enforcement in the United States, federal law enforcement age ...
to invite Gembe to a fake job interview, planning to have him arrested in the USA; however, police arrested him in Germany. The complete source was soon available in various file sharing networks. *Also in 2003, source code to
Diebold Election Systems Premier Election Solutions, formerly Diebold Election Systems, Inc. (DESI), was a subsidiary of Diebold that made and sold voting machines. In 2009, it was sold to competitor ES&S. In 2010, Dominion Voting Systems purchased the primary assets ...
Inc.
voting machine A voting machine is a machine used to record votes in an election without paper. The first voting machines were mechanical but it is increasingly more common to use ''electronic voting machines''. Traditionally, a voting machine has been defin ...
s was leaked. Researchers at
Johns Hopkins University Johns Hopkins University (Johns Hopkins, Hopkins, or JHU) is a private university, private research university in Baltimore, Maryland. Founded in 1876, Johns Hopkins is the oldest research university in the United States and in the western hem ...
and
Rice University William Marsh Rice University (Rice University) is a Private university, private research university in Houston, Houston, Texas. It is on a 300-acre campus near the Houston Museum District and adjacent to the Texas Medical Center. Rice is ranke ...
published a critique of Diebold's products, based on an analysis of the software. They found, for example, that it would be easy to program a
counterfeit To counterfeit means to imitate something authentic, with the intent to steal, destroy, or replace the original, for use in illegal transactions, or otherwise to deceive individuals into believing that the fake is of equal or greater value tha ...
voting card to work with the machines and then use it to cast multiple votes inside the voting booth. *In 2003 a Chinese hacker acquired the source code for ''
Lineage II ''Lineage II'' is a massively multiplayer online role-playing game (MMORPG) for Microsoft Windows and the second game in the ''Lineage'' series. It is a prequel to ''Lineage'' and is set 150 years before the first game. It has become popular sinc ...
'' and sold it to someone in
California California is a U.S. state, state in the Western United States, located along the West Coast of the United States, Pacific Coast. With nearly 39.2million residents across a total area of approximately , it is the List of states and territori ...
who then used it to create a bootleg version of the game, powered by his own servers. Despite warnings from NCSoft that pirating an online game was considered illegal, he continued doing so for a few years, until the
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, ...
finally raided his home in 2007, seized the servers and permanently disabled the website that fronted his bootleg version of ''Lineage II''. *In 2003, one year after
3dfx 3dfx Interactive was an American technology company headquartered in San Jose, California, founded in 1994, that specialized in the manufacturing of 3D graphics processing units, and later, video cards. It was a pioneer in the field from the l ...
was bought by
Nvidia Nvidia CorporationOfficially written as NVIDIA and stylized in its logo as VIDIA with the lowercase "n" the same height as the uppercase "VIDIA"; formerly stylized as VIDIA with a large italicized lowercase "n" on products from the mid 1990s to ...
and support ended, the source code for their drivers leaked, resulting in
fan-made Fan labor, also called fan works, are the creative activities engaged in by fans, primarily those of various media properties or musical groups. These activities can include creation of written works (fiction, fan fiction and review literature), ...
, updated drivers. *In 2004, a large portion of
Windows NT 4.0 Windows NT 4.0 is a major release of the Windows NT operating system developed by Microsoft and oriented towards businesses. It is the direct successor to Windows NT 3.51, which was released to manufacturing on July 31, 1996, and then to retail ...
's source code and a small percentage (reportedly about 15%) of
Windows 2000 Windows 2000 is a major release of the Windows NT operating system developed by Microsoft and oriented towards businesses. It was the direct successor to Windows NT 4.0, and was Software release life cycle#Release to manufacturing (RTM), releas ...
's were leaked online. The Windows 2000 source code leak was analysed by a writer for (now defunct) website
Kuro5hin Kuro5hin (K5; read "corrosion") was a collaborative discussion website founded by Rusty Foster in 1999, having been inspired by Slashdot. Articles were created and submitted by users and submitted to a queue for evaluation. Site members could ...
who noted that while the code was generally well written, it allegedly contained about "a dozen" instances of
profanity Profanity, also known as cursing, cussing, swearing, bad language, foul language, obscenities, expletives or vulgarism, is a socially offensive use of language. Accordingly, profanity is language use that is sometimes deemed impolite, rud ...
and the milder
euphemism A euphemism () is an innocuous word or expression used in place of one that is deemed offensive or suggests something unpleasant. Some euphemisms are intended to amuse, while others use bland, inoffensive terms for concepts that the user wishes ...
"crap". The writer also noted that there were a lot of code hacks, with the "uglier" ones mostly being for compatibility with older programs and some hardware. It was feared that because of the leak, the number of security
exploit Exploit means to take advantage of something (a person, situation, etc.) for one's own end, especially unethically or unjustifiably. Exploit can mean: *Exploitation of natural resources *Exploit (computer security) * Video game exploit *Exploitat ...
s would increase due to wider scrutiny of the source code. It was later discovered that the source of the leak originated from Mainsoft. *Also in 2004, partial (800 MB) proprietary source code that drives
Cisco Systems Cisco Systems, Inc., commonly known as Cisco, is an American-based multinational corporation, multinational digital communications technology conglomerate (company), conglomerate corporation headquartered in San Jose, California. Cisco develo ...
' networking hardware was made available in the internet. The site posted two files of source code written in the
C programming language ''The C Programming Language'' (sometimes termed ''K&R'', after its authors' initials) is a computer programming book written by Brian Kernighan and Dennis Ritchie, the latter of whom originally designed and implemented the language, as well as ...
, which apparently enables some next-generation
IPv6 Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communication protocol, communications protocol that provides an identification and location system for computers on networks and routes traffic ...
functionality. News of the latest source code leak appeared on a Russian security site. *In 2006, Anonymous hackers stole source code (about 1 GiB) for Symantec's
pcAnywhere pcAnywhere is a discontinued suite of computer programs by Symantec which allows a user of the pcAnywhere remote program on a computer to connect to a personal computer running the pcAnywhere host if both are connected to interconnected networks ...
from the company's network. While confirmed in January 2012, it is still unclear how the hackers accessed the network. *In late 2007, the source code of Norton Ghost 12 and a Norton Anti-Spyware version were available via BitTorrent. *In December 2007 and January 8, a
Pirate Bay The Pirate Bay (sometimes abbreviated as TPB) is an online index of digital content of entertainment media and software. Founded in 2003 by Swedish think tank Piratbyrån, The Pirate Bay allows visitors to search, download, and contribute mag ...
user published the sources of five Idera SQL products via BitTorrent. *In January 2011 the "stolen source code" of Kaspersky Anti-Virus 2008 was published on the Pirate Bay. *On May 20, 2011, ''
EVE Online ''Eve Online'' (stylised ''EVE Online'') is a space-based, persistent world massively multiplayer online role-playing game (MMORPG) developed and published by CCP Games. Players of ''Eve Online'' can participate in a number of in-game profess ...
s
source code In computing, source code, or simply code, is any collection of code, with or without comments, written using a human-readable programming language, usually as plain text. The source code of a program is specially designed to facilitate the wo ...
was published by someone on a
GitHub GitHub, Inc. () is an Internet hosting service for software development and version control using Git. It provides the distributed version control of Git plus access control, bug tracking, software feature requests, task management, continuous ...
repository. After being online for four days, CCP Games issued a
DMCA The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or s ...
take-down request which was followed by GitHub. *In 2011, the
source code In computing, source code, or simply code, is any collection of code, with or without comments, written using a human-readable programming language, usually as plain text. The source code of a program is specially designed to facilitate the wo ...
of '' GunZ: The Duel'' v1.5 became available online. *In December 2011, the source code of the
Solaris 11 Solaris may refer to: Arts and entertainment Literature, television and film * ''Solaris'' (novel), a 1961 science fiction novel by Stanisław Lem ** ''Solaris'' (1968 film), directed by Boris Nirenburg ** ''Solaris'' (1972 film), directed by ...
operating system's kernel was leaked via BitTorrent. *In August 2014 '' S.T.A.L.K.E.R.: Clear Skys
X-Ray Engine ''S.T.A.L.K.E.R.: Shadow of Chernobyl'' is a first-person shooter survival horror video game developed by GSC Game World and published by THQ in 2007 following a long development. The game is set in an alternative reality, where a second disast ...
source code In computing, source code, or simply code, is any collection of code, with or without comments, written using a human-readable programming language, usually as plain text. The source code of a program is specially designed to facilitate the wo ...
(and its successor) became available on
GitHub GitHub, Inc. () is an Internet hosting service for software development and version control using Git. It provides the distributed version control of Git plus access control, bug tracking, software feature requests, task management, continuous ...
under a non-
open-source license An open-source license is a type of license for computer software and other products that allows the source code, blueprint or design to be used, modified and/or shared under defined terms and conditions. This allows end users and commercial compa ...
. *On December 29, 2015, the
AmigaOS AmigaOS is a family of proprietary native operating systems of the Amiga and AmigaOne personal computers. It was developed first by Commodore International and introduced with the launch of the first Amiga, the Amiga 1000, in 1985. Early version ...
3.1 source code leaked to the web, confirmed by the rights holder
Hyperion Entertainment Hyperion Entertainment CVBA (formerly Hyperion Entertainment VOF) is a Belgian software company which in its early years focused in porting Windows games to Amiga OS, Linux, and Mac OS. In 2001, they accepted a contract by Amiga Incorporated t ...
. *In January 2017 the source code of Opera's Presto Browser engine was leaked to GitHub. The source code was shortly after taken down with a DMCA notice. *In June 2017 a small part of Microsoft's
Windows 10 Windows 10 is a major release of Microsoft's Windows NT operating system. It is the direct successor to Windows 8.1, which was released nearly two years earlier. It was released to manufacturing on July 15, 2015, and later to retail on J ...
source code leaked to the public. The leak was of the Shared Source Kit, a small portion of the source code given to
OEMs An original equipment manufacturer (OEM) is generally perceived as a company that produces non-aftermarket parts and equipment that may be marketed by another manufacturer. It is a common industry term recognized and used by many professional or ...
to help with writing drivers. *In February 2018, the
iBoot iBoot is the stage 2 bootloader for all Apple products. It replaces the old bootloader, BootX. Compared with its predecessor, iBoot improves authentication performed in the boot chain. For x86 macOS, the boot process starts by running code stor ...
bootloader A bootloader, also spelled as boot loader or called boot manager and bootstrap loader, is a computer program that is responsible for booting a computer. When a computer is turned off, its softwareincluding operating systems, application code, an ...
for
Apple An apple is an edible fruit produced by an apple tree (''Malus domestica''). Apple fruit tree, trees are agriculture, cultivated worldwide and are the most widely grown species in the genus ''Malus''. The tree originated in Central Asia, wh ...
operating systems' source code was leaked onto GitHub by an Apple engineer. The code was from 2016, and by the time it was leaked, iBoot had been restructured, making it obsolete. *On April 22, 2020, '' Counter-Strike: Global Offensive'' and ''
Team Fortress 2 ''Team Fortress 2'' is a 2007 multiplayer first-person shooter, first-person shooter game developed and published by Valve Corporation. It is the sequel to the 1996 ''Team Fortress'' Mod (video gaming), mod for ''Quake (video game), Quake'' and ...
'' code was leaked. * Some time during March 2018, Nintendo suffered a significant leak when a hacker obtained an alleged 2 TB of confidential material containing source codes to game consoles, games, and internal documentation. Starting in 2018, the contents of this breach slowly made their way onto the Internet, starting with iQue Player ROMs and various
Pokémon (an abbreviation for in Japan) is a Japanese media franchise managed by The Pokémon Company, founded by Nintendo, Game Freak, and Creatures (company), Creatures, the owners of the trademark and copyright of the franchise. In terms of ...
games. Later in 2020, the leaks gained more attention and grew in size, culminating into the release of Wii and Nintendo 64 source code, and the so-called "Gigaleak", a massive release containing multiple N64 games' source code and SNES Prototypes. After July 2021, no more releases have occurred. * On August 7, 2020, 20 GB of
Intellectual property Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, cop ...
of
Intel Intel Corporation is an American multinational corporation and technology company headquartered in Santa Clara, California. It is the world's largest semiconductor chip manufacturer by revenue, and is one of the developers of the x86 seri ...
, including source code (in
SystemVerilog SystemVerilog, standardized as IEEE 1800, is a hardware description and hardware verification language used to model, design, simulate, test and implement electronic systems. SystemVerilog is based on Verilog and some extensions, and since 200 ...
and otherwise) of their system on chips leaked (with preserving
git Git () is a distributed version control system: tracking changes in any set of files, usually used for coordinating work among programmers collaboratively developing source code during software development. Its goals include speed, data in ...
structure). That included Intel ME, Intel Microcode and software simulators of their hardware. Their various BIOS source code was also leaked. The
SpaceX Space Exploration Technologies Corp. (SpaceX) is an American spacecraft manufacturer, launcher, and a satellite communications corporation headquartered in Hawthorne, California. It was founded in 2002 by Elon Musk with the stated goal of ...
cameras firmware that Intel worked on also leaked. The data is being distributed through a torrent. * On September 23, 2020,
Windows XP Windows XP is a major release of Microsoft's Windows NT operating system. It was released to manufacturing on August 24, 2001, and later to retail on October 25, 2001. It is a direct upgrade to its predecessors, Windows 2000 for high-end and ...
SP1 and
Windows Server 2003 Windows Server 2003 is the sixth version of Windows Server operating system produced by Microsoft. It is part of the Windows NT family of operating systems and was released to manufacturing on March 28, 2003 and generally available on April 24, 2 ...
complete source code depots were leaked. The archives included all the source code from the time it was used at Microsoft, including documentation and build tools. The leak was first dismissed as illegitimate, but it was soon clear that it was legitimate, the source code contained Windows XP specific code and resources, later one user managed to compile the OS and pack it into an
ISO image An optical disc image (or ISO image, from the ISO 9660 file system used with CD-ROM media) is a disk image that contains everything that would be written to an optical disc, disk sector by disc sector, including the optical disc file system. IS ...
. *On January 4, 2021,
Nissan , trade name, trading as Nissan Motor Corporation and often shortened to Nissan, is a Japanese multinational corporation, multinational Automotive industry, automobile manufacturer headquartered in Nishi-ku, Yokohama, Japan. The company sells ...
North America source code was leaked online due to misconfiguration of a company
Git Git () is a distributed version control system: tracking changes in any set of files, usually used for coordinating work among programmers collaboratively developing source code during software development. Its goals include speed, data in ...
server, which was left exposed online with a default username and password of admin/admin. Software engineer Tillie Kottmann learned of the leak and analyzed the data, which they shared with
ZDNet ZDNET is a business technology news website owned and operated by Red Ventures. The brand was founded on April 1, 1991, as a general interest technology portal from Ziff Davis and evolved into an enterprise IT-focused online publication. Hist ...
. The repository reportedly contained Nissan NA mobile apps, parts of the Nissan ASIST diagnostics tool, Nissan's internal core mobile library, Dealer Business Systems and Dealer Portal, client acquisition and retention tools, market research tools and data, vehicle logistics portal, vehicle connected services, and various other back ends and internal tools, they reported. *On February 10, 2021, ''
Cyberpunk 2077 ''Cyberpunk 2077'' is a 2020 action role-playing video game developed by CD Projekt Red and published by CD Projekt. Set in Night City, an open world set in the ''Cyberpunk'' universe, players assume the role of a customisable mercenary know ...
'' and '' Witcher 3'' developer
CD Projekt Red CD Projekt S.A. () is a Polish video game developer, publisher and distributor based in Warsaw, founded in May 1994 by Marcin Iwiński and Michał Kiciński. Iwiński and Kiciński were video game retailers before they founded the company, whi ...
(CDPR) announced hackers had targeted the company and attempted to hold it to ransom. On 6 June 2021, someone in possession of the data had leaked all of ''Cyberpunk 2077'' code (96.02 GB of data in 7z archive) online publicly, while previously it was only available in encrypted form. *On October 6, 2021, streaming site
Twitch Twitch may refer to: Biology * Muscle contraction ** Convulsion, rapid and repeated muscle contraction and relaxation ** Fasciculation, a small, local, involuntary muscle contraction ** Myoclonic twitch, a jerk usually caused by sudden muscle co ...
had its source code along with earnings reports of top streamers leaked by hackers on
4chan 4chan is an anonymous English-language imageboard website. Launched by Christopher "moot" Poole in October 2003, the site hosts boards dedicated to a wide variety of topics, from anime and manga to video games, cooking, weapons, television, ...
, citing the streaming site's negative community and desire for competition and disruption of the online video streaming space. The breach was confirmed by Twitch on Twitter. The leak was distributed freely via a
torrent file In the BitTorrent file distribution system, a torrent file or meta-info file is a computer file that contains metadata about files and folders to be distributed, and usually also a list of the network locations of trackers, which are compute ...
and was 135.17 GB in size. As a precaution, all the stream keys have been reset by Twitch. *On February 25, 2022, ransomware group LAPSUS$ hacked
NVIDIA Nvidia CorporationOfficially written as NVIDIA and stylized in its logo as VIDIA with the lowercase "n" the same height as the uppercase "VIDIA"; formerly stylized as VIDIA with a large italicized lowercase "n" on products from the mid 1990s to ...
and reportedly obtained 1 terabyte of proprietary information. The group subsequently released a ~20 GB archive containing the source code for NVIDIA GPU drivers among other things. Details for a
Nintendo Switch The is a hybrid video game console developed by Nintendo and released worldwide in most regions on March 3, 2017. The console itself is a Tablet computer#Gaming tablet, tablet that can either be docking station, docked for use as a home video ...
successor were also found among the data. It was also reported recently that the group also infiltrated Portuguese media conglomerate Impresa, the Ministry of Health in Brazil and Brazilian telecommunications company Claro. *On September 18, 2022, an Untitled Grand Theft Auto game had a massive leak online, with 90 videos of the game being released. It was confirmed by a worker at Rockstar Games that the leak was real. The content of the leak received mixed reviews, with many calling the game unfinished and rushed, but many criticized these complaints by stating the game was not near completion. The leak itself, however, received negative reception, with many claiming it discredited the work of several employees. Publisher TakeTwo began taking down leaks on several different websites. Rockstar issued a statement on September 19, which stated they were "disappointed" with the leak. ** The hacker who got the leak also got the source code for
Grand Theft Auto V ''Grand Theft Auto V'' is a 2013 action-adventure game developed by Rockstar North and published by Rockstar Games. It is the seventh main entry in the Grand Theft Auto, ''Grand Theft Auto'' series, following 2008's ''Grand Theft Auto IV'', and ...
, and announced he would be selling both. Shortly after, he announced the GTA VI source code was no longer for sale, but was still selling the GTA V source code. This has been considered a form of blackmail.


End-of-life leaks by developers

Sometimes software developers themselves will intentionally leak their source code in an effort to prevent a software product from becoming
abandonware Abandonware is a product, typically software, ignored by its owner and manufacturer, and for which no official support is available. Within an intellectual rights contextual background, abandonware is a software (or hardware) sub-case of the g ...
after it has reached its end-of-life, allowing the community to continue development and support. Reasons for leaking instead of a proper release to
public domain The public domain (PD) consists of all the creative work A creative work is a manifestation of creative effort including fine artwork (sculpture, paintings, drawing, sketching, performance art), dance, writing (literature), filmmaking, ...
or as
open-source Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use the source code, design documents, or content of the product. The open-source model is a decentralized sof ...
can include scattered or lost
intellectual property rights Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, cop ...
. An example is the
video game Video games, also known as computer games, are electronic games that involves interaction with a user interface or input device such as a joystick, controller, keyboard, or motion sensing device to generate visual feedback. This fee ...
''
Falcon 4.0 ''Falcon 4.0'' is a combat flight simulation video game developed by MicroProse and published by Hasbro Interactive in 1998. The game is based around a realistic simulation of the Block 50/52 F-16 Fighting Falcon jet fighter in a full-scale mod ...
'' which became available in 2000; another one is ''
Dark Reign 2 ''Dark Reign 2'' is a 3D real-time strategy video game developed by Pandemic Studios and released by Activision on July 3, 2000, for Microsoft Windows. A prequel to '' Dark Reign: The Future of War'' and its expansion pack, ''Dark Reign 2''s s ...
''.


Other leaks

* In late 1998, a number of confidential
Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washing ...
documents later dubbed the ''
Halloween documents The Halloween documents comprise a series of confidential Microsoft memoranda on potential strategies relating to free software, open-source software, and to Linux in particular, and a series of media responses to these memoranda. Both the leaked ...
'' were leaked to
Eric S. Raymond Eric Steven Raymond (born December 4, 1957), often referred to as ESR, is an American software developer, open-source software advocate, and author of the 1997 essay and 1999 book ''The Cathedral and the Bazaar''. He wrote a guidebook for the ...
, an activist in the
open-source software Open-source software (OSS) is computer software that is released under a license in which the copyright holder grants users the rights to use, study, change, and distribute the software and its source code to anyone and for any purpose. Op ...
movement, who published and commented on them online. The documents revealed that internally Microsoft viewed free and open-source software such as
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which ...
as technologically competitive and a major threat for Microsoft's dominance in the market, and they discussed strategies to combat them. The discovery caused a public controversy. The documents were also used as evidence in several court cases. *
Nintendo is a Japanese Multinational corporation, multinational video game company headquartered in Kyoto, Japan. It develops video games and video game consoles. Nintendo was founded in 1889 as by craftsman Fusajiro Yamauchi and originally produce ...
's crossover fighting video game series '' Super Smash Bros.'' has a history of having unconfirmed content leaked. Every game since, including 2008's ''
Super Smash Bros. Brawl ''Super Smash Bros. Brawl'' is a 2008 List of crossovers in video games, crossover fighting game, fighting video game developed by Sora Ltd. and published by Nintendo for the Wii. The third installment in the Super Smash Bros., ''Super Smash ...
'' has been affected by leaks in some form: **''Super Smash Bros. Brawl'' for the
Wii The Wii ( ) is a home video game console developed and marketed by Nintendo. It was released on November 19, 2006, in North America and in December 2006 for most other Regional lockout, regions of the world. It is Nintendo's fifth major ho ...
was leaked by a video on the
Japanese language is spoken natively by about 128 million people, primarily by Japanese people and primarily in Japan, the only country where it is the national language. Japanese belongs to the Japonic or Japanese- Ryukyuan language family. There have been ma ...
wii.com website, revealing unconfirmed playable characters on January 28, 2008 (three days before the game's Japanese release). **''
Super Smash Bros. for Nintendo 3DS and Wii U and (colloquially and collectively referred to as ''Super Smash Bros. 4'' or ''Smash 4'') is a group of two 2014 crossover fighting video games developed by Bandai Namco Studios and Sora Ltd. and published by Nintendo for the Nintendo 3DS ...
'' was afflicted in August 2014 by the "ESRB leak", where many screenshots and limited video footage of the 3DS version were leaked by a supposed member of the
ESRB The Entertainment Software Rating Board (ESRB) is a self-regulatory organization that assigns age and content ratings to consumer video games in the United States and Canada. The ESRB was established in 1994 by the Entertainment Software Asso ...
. The leak gained traction very quickly due to the screenshots mostly containing elements that the game ratings board would be interested in, such as trophies of suggestively-dressed female characters (some of which were later found to be edited or cut altogether in the final game). **''
Super Smash Bros. Ultimate ''Super Smash Bros. Ultimate'' is a 2018 crossover fighting video game developed by Bandai Namco Studios and Sora Ltd. and published by Nintendo for the Nintendo Switch. It is the fifth installment in the '' Super Smash Bros.'' series, succeed ...
'' was leaked in its entirety two weeks before its release, allowing many to play and datamine in advance. While the entire roster of characters and stages had already been officially revealed, many unrevealed collectibles, music tracks, and story elements were discovered and distributed. This prompted Nintendo to issue copyright strikes to many YouTube and Twitch channels. *November 2009: Climatic Research Unit email leak, aka Climategate * Several high-profile books have been leaked on the Internet before their official release date, including ''
If I Did It ''If I Did It'' is a book by O. J. Simpson and Pablo Fenjves, in which Simpson puts forth a “hypothetical” description of the murders of Nicole Brown Simpson and Ron Goldman. Simpson's former manager, Norman Pardo, claimed that Simpson was ...
'', ''
Harry Potter and the Deathly Hallows ''Harry Potter and the Deathly Hallows'' is a fantasy novel written by British author J. K. Rowling and the seventh and final novel of the main ''Harry Potter'' series. It was released on 21 July 2007 in the United Kingdom by Bloomsbury Publi ...
'', and an early draft of the first twelve chapters of ''
Midnight Sun The midnight sun is a natural phenomenon that occurs in the summer months in places north of the Arctic Circle or south of the Antarctic Circle, when the Sun remains visible at the local midnight. When the midnight sun is seen in the Arctic, t ...
''. The leak of the latter prompted the author
Stephenie Meyer Stephenie Meyer (; née Morgan; born December 24, 1973) is an American novelist and film producer. She is best known for writing the vampire literature, vampire romance series ''Twilight (novel series), Twilight'', which has sold over 100 mill ...
to suspend work on the novel. * 2010 My Little Pony: Friendship Is Magic has been filled with lot of leaks for later seasons on scenes, leaked full song to the theme song, leaked early released episodes before they got aired on
Discovery Family Discovery Family is an American cable television channel co-owned by Warner Bros. Discovery and Hasbro Entertainment. The channel was originally launched by Discovery Communications on October 7, 1996 as Discovery Kids, a spin-off of Discover ...
, unfinished episodes, 2018–present there was leaks for the generation 5 as My Little Pony: A New Generation was the start. * On January 31, 2014, the original uncensored version of the ''
South Park ''South Park'' is an American animated sitcom created by Trey Parker and Matt Stone and developed by Brian Graden for Comedy Central. The series revolves around four boys Stan Marsh, Kyle Broflovski, Eric Cartman, and Kenny McCormickand th ...
'' episode "
201 Year 201 ( CCI) was a common year starting on Thursday (link will display the full calendar) of the Julian calendar. At the time, it was known as the Year of the Consulship of Fabianus and Arrius (or, less frequently, year 954 '' Ab urbe condi ...
" was leaked, when it was illegally pulled from the South Park Studios servers and was posted online in its entirety without any approval by
Comedy Central Comedy Central is an American basic cable channel owned by Paramount Global through its network division's MTV Entertainment Group unit, based in Manhattan. The channel is geared towards young adults aged 18–34 and carries comedy programming ...
. The episode was heavily censored by the network when it aired in 2010 against the will of series creators
Trey Parker Randolph Severn "Trey" Parker III (born October 19, 1969) is an American actor, animator, filmmaker, and composer. He is known for co-creating ''South Park'' (since 1997) and '' The Book of Mormon'' (2011) with his creative partner Matt Stone. ...
and
Matt Stone Matthew Richard Stone (born May 26, 1971) is an American actor, animator, filmmaker, and composer. He is known for co-creating ''South Park'' (since 1997) and ''The Book of Mormon'' (2011) with his creative partner Trey Parker. Stone was interes ...
, and was never formally released uncensored to the public. The episode was the second in a two parter and was censored after the airing of the first part as a result of
death threats A death threat is a threat, often made anonymously, by one person or a group of people to kill another person or group of people. These threats are often designed to intimidate victims in order to manipulate their behaviour, in which case a deat ...
from
Islamic extremists Islamic extremism, Islamist extremism, or radical Islam, is used in reference to extremist beliefs and behaviors which are associated with the Islamic religion. These are controversial terms with varying definitions, ranging from academic unde ...
who were angry of the episode's storyline satirizing censorship of
depictions of Muhammad The permissibility of depictions of Muhammad in Islam has been a contentious issue. Oral and written descriptions of Muhammad are readily accepted by all traditions of Islam, but there is disagreement about visual depictions. The Quran does not ...
. * In 2015 the unaired ''
Aqua Teen Hunger Force ''Aqua Teen Hunger Force'' (also known by various alternative titles), sometimes abbreviated as ''ATHF'' or ''Aqua Teen'', is an American adult animated television series created by Dave Willis and Matt Maiellaro for Cartoon Network's late ni ...
'' episode "Boston" was leaked online. The episode was set to air during the fifth season as a response to a controversial
publicity stunt In marketing, a publicity stunt is a planned event designed to attract the public's attention to the event's organizers or their cause. Publicity stunts can be professionally organized, or set up by amateurs. Such events are frequently utilize ...
for ''
Aqua Teen Hunger Force Colon Movie Film for Theaters ''Aqua Teen Hunger Force Colon Movie Film for Theaters'' (also known as ''Aqua Teen Hunger Force: Movie Film for Theaters'') is a 2007 American adult animated surreal black comedy film based on the Adult Swim animated series ''Aqua Teen Hunger Fo ...
'' that occurred in the titular city, but
Adult Swim Adult Swim (AS; stylized as
dult swim Dult is a village in Batala in Gurdaspur district of Punjab State, India. It is located from sub district headquarter, from district headquarter and from Sri Hargobindpur. The village is administrated by Sarpanch an elected representati ...
and often abbreviated as s is an American adult-oriented night-time cable television Television channel, channel that shares channel space with the basic cable network Cartoon Network and is programme ...
was forced to pull it to avoid further controversy. * On March 13, 2016, the full list of qualifying teams and first round match-ups for the 2016 NCAA Men's Division I Basketball Tournament leaked on Twitter in the midst of a television special being broadcast by
CBS CBS Broadcasting Inc., commonly shortened to CBS, the abbreviation of its former legal name Columbia Broadcasting System, is an American commercial broadcast television and radio network serving as the flagship property of the CBS Entertainm ...
to officially unveil them. The leak exacerbated criticism of a new, two-hour format for the selection broadcast, which was criticized for revealing the full tournament bracket at a slower pace than in previous years. * On April 20, 2021,
Apple An apple is an edible fruit produced by an apple tree (''Malus domestica''). Apple fruit tree, trees are agriculture, cultivated worldwide and are the most widely grown species in the genus ''Malus''. The tree originated in Central Asia, wh ...
supplier
Quanta Computer Quanta Computer Incorporated () () is a Taiwan-based manufacturer of notebook computers and other electronic hardware. Its customers include Apple Inc., Dell, Hewlett-Packard Inc., Acer Inc., Alienware, Amazon.com, Cisco, Fujitsu, Gericom, Lenov ...
was hit by a ransomware attack. The attackers began posting documents and schematics of MacBook computer designs as recent as March 2021. The attackers threatened to release everything they had obtained by May 1, 2021, unless a ransom had been paid, however nothing further came out of the breach.


See also

*
Distributed Denial of Secrets Distributed Denial of Secrets, abbreviated DDoSecrets, is a non-profit whistleblower site for news leaks founded in 2018. Sometimes referred to as a successor to WikiLeaks, it is best known for its June 2020 publication of a large collection of ...
*
GlobaLeaks GlobaLeaks is an open-source, free software intended to enable secure and anonymous whistleblowing initiatives. History The project started on 15 December 2010 and the first software prototype was announced on 6 September 2011. Relevant figure ...
*
News leak A news leak is the unsanctioned release of confidential information to news media. It can also be the premature publication of information by a news outlet, of information that it has agreed not to release before a specified time, in violation of ...
*
Nikki Catsouras photographs controversy The Nikki Catsouras photographs controversy concerns the leaked photographs of Nicole "Nikki" Catsouras (March 4, 1988 – October 31, 2006), who died at the age of 18 in a high speed car crash after losing control of her father's Porsche 911 Ca ...
, a 2006 California case in which police photographs of a fatal automobile accident were leaked online * royaldutchshellplc.com *
Software release life cycle A software release life cycle is the sum of the stages of development and maturity for a piece of computer software ranging from its initial development to its eventual release, and including updated versions of the released version to help impro ...
*
WikiLeaks WikiLeaks () is an international Nonprofit organization, non-profit organisation that published news leaks and classified media provided by anonymous Source (journalism), sources. Julian Assange, an Australian Internet activism, Internet acti ...


References

{{Reflist, 30em Internet terminology Intellectual property law Internet trolling Internet leaks