From SIM-Swaps to Home-Invasion Threats, Ledger Leak Has Cascading Consequences

The incident shows the variety of ways data can be used to hurt people, and raises questions about how and if certain data should be retained at all.


Posted

in

by

Tags:

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.