Today is the first anniversary of the huge naked celebrity picture leak known as The Fappening, but cops have still not managed to arrest the pervy perpetrator.
On this day last year, hundreds of graphic sexual pictures of stars including Jennifer Lawrence and Kate Upton were leaked online, prompting condemnation and curiosity in equal measure.
While millions of men rushed to get a glimpse of the astonishing pictures, lawyers acting for the stars launched a frantic bid to wipe them off the internet, with Lawrence describing the hack as a “sex crime”.
Now it is very difficult to find The Fappening photos, which can only be found on dark web forums or in the internet’s most shadowy corners.
American police have searched addresses in a bid to find the criminal, but have so far failed to press charges.
To get at the pictures, hackers targeted an estimated 500 people’s iCloud accounts using a technique called brute force hacking, which involves using a program to essentially guess victims’ passwords.
Since The Fappening, Apple has taken steps to boost the security of its cloud services.
So can off-duty celebs safely snap images of their divine, unclothed bodies, or is every naughty nude still ripe for the hacking?
Jonathan Sander, an internet security expert, said Apple’s iCloud security was rock solid – but humans were not.
“The cloud isn’t insecure, Apple’s cloud isn’t any more or less secure than any other, and those photos weren’t any more or less locked down than others,” he warned.
“The problem is any system is only as strong as its weakest password. The password that a human must use will almost always be the weakest link.
“It’s widely believed that the thieves simply targeted well-known accounts and hacked away at the passwords until they got in.”
Apple has now taken steps to boost security so that celebs can take intimate pics without them getting into the grubby hands of some horny hacker.
But wherever people go, mistakes are bound to follow, and it could only be a matter of time before we see some other celebs spread eagled across the internet – and not getting paid for it.
“If users keep using their dog’s name for a password, [it will] ultimately mean these attacks will continue to succeed.”