Which data-breaches (that triggered consumer interest) hapened around these dates? [closed]

Doing some research, I came across the Google Trends for “data breach”.

I noticed that there were very large spikes for September 2017 and July 2019:

Zooming in to the time-frame before those two large spikes, I noticed several smaller… Continue reading Which data-breaches (that triggered consumer interest) hapened around these dates? [closed]

If the Lorenz cipher machine was so much more advanced than the Enigma, how was it broken without having a physical machine? [closed]

The Enigma was commercially available before the war, and even during the war, they got their hands on “live” such machines, heavily helping them in breaking the encryption used by the Germans.

The Lorenz was said to be much more secure, … Continue reading If the Lorenz cipher machine was so much more advanced than the Enigma, how was it broken without having a physical machine? [closed]

Why did the national socialists in WW2 not use the far superior "Lorenz" cipher machine instead of the bad "Enigma"?

Basically, the only good thing about the “Enigma” cipher machine was its name. Other than that, it was grossly inferior to the “Lorenz” one, apparently only used by some of the main, top-ranking persons.

If they did have a much stronger c… Continue reading Why did the national socialists in WW2 not use the far superior "Lorenz" cipher machine instead of the bad "Enigma"?

How were they able to make such a small device in 1976 for keylogging an electric IBM typewriter? [closed]

Source: https://en.wikipedia.org/wiki/IBM_Selectric_typewriter

In 1984, bugs were discovered in at least 16 Selectric typewriters in
the US Embassy in Moscow and the US Consulate in Leningrad. The highly
sophisticated devices were … Continue reading How were they able to make such a small device in 1976 for keylogging an electric IBM typewriter? [closed]

Why was the Same-origin policy originally introduced (before XMLHttpRequest)?

As I understand it, the Same-origin policy (SOP) basically prevents a script in a web page from obtaining or sending information from/to a different domain.

I understand that this is important to prevent a page from grabbing private data … Continue reading Why was the Same-origin policy originally introduced (before XMLHttpRequest)?

Was there really a scary default keylogging "feature" like this in ICQ in the year 2000?

So, in early 2000, ICQ was popular here. “Every kid” with a computer seemed to have it installed. I was not a popular kid, so I probably missed most of this, but I was once invited (or perhaps invited myself) to a kind of mul… Continue reading Was there really a scary default keylogging "feature" like this in ICQ in the year 2000?