In Breakroom, WeBreakTech staffers chat about the last couple of weeks in tech. What’s new? What’s broken? What are we working on? What makes us want to hurl things into traffic? Sarcasm, salty language, and strong opinions abound. _____________________________________________________________________________________________ Trevor.Pott: “WikiLeaks publishes cryptic UFO emails sent to Clinton campaign from former Blink 182 singer.” So. WikiLeaks. Josh.Folland: This only confirms my suspicions that politicians and celebrities are lizard people. Trevor.Pott: The WikiLeaks thing has some potential implications for real-world IT. Putting the politics aside, let’s look at what’s happened here. Somehow, WikiLeaks got hold of a bunch of stuff they shouldn’t have. In some cases, we know the source (such as Chelsea Manning). In others, we don’t (such as the DNC leaks). But in each case, the information has been leaked not only with the intention of making information known, but with theater: the intention of causing the maximum possible amount of hype around the leaks. I think this adds a dimension to any data security discussion. We’re beyond simply “your data may go walkabout” and well into “people may use leaked data as part of a coordinated smear campaign that can hurt far more than a simple data dump.” Do we think this new approach by WikiLeaks will change the dynamics of data protection for corporations and/or governments? Josh.Folland: Is this really anything new, though? People have been digging up dirt and using it against one another forever. The mechanics of how you get said data are all that’s changing. Trevor.Pott: That’s an interesting question, and I think that goes down two paths: 1) is the danger of a leak only from the people leaking it, and 2) does timing make a leak more sensitive, and maybe there is a call for...