

Those records also contained users’ non-public email addresses. The exposed data also included records that connected all of a user’s activity on the site, including their username, blog posts, followers and locations. The data also contained details of the site’s 19.7 million photos. The database contained what appeared to be the site’s entire back-end database, including more than 235,000 albums, 30,000 user blog posts and 900 videos. “We will be reaching out to any compromised users to warn them about the potential exposure of their private email addresses,” said the site owner. Only after we published, the site’s owner responded to our emails and confirmed the security lapse. We passed on a message to the site’s web host, which took action to block access to the database, allowing us to publish.
#Yaoi comic registration#
We sent the owner a note through the site’s contact form, through Facebook Messenger and over a LinkedIn contact request, and we sent several text messages based off the site’s historical registration data. We emailed the owner - whose email address was found in the very first user record - to disclose the security lapse, but we did not hear back after several follow-ups. But our efforts to reach the site owner over the past week to get the database secured were unsuccessful.
