ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

What is Wrong with the Ashley Madison Leak?

Updated on June 8, 2017
Public Domain Via Wikimedia Commons
Public Domain Via Wikimedia Commons | Source

On August 18th, the profiles of 30 million accounts on the popular dating and self described adultery website Ashley Madison were leaked by a hacker group called the Impact Team. Within hours, various sites had made the leaked information accessible to the public. Today, someone could conveniently search a database to see if their spouse, family member, friend, or a popular celebrity was within the list of cheaters released. In addition, several articles were written by news outlets on where to look to find the information along with popular figures in society who were outed with the hack.

With this hack and release, there has come much praise for the information release which has ousted many cheating or would be cheating individuals. Even I have to admit, there is a small amount of satisfaction in some people being caught. Plus to some extent, this is a good wake up call on how secure any of our data really is.

But in all honesty, that satisfaction is overshadowed with a little bit for guilt but also a fair amount of worry about "righteous hacking". This was somebody else's personal, intimate information. It was taken from them illegally. I should never have seen it and yet I can see it if I want to and it is ok for this stolen information to be broadcasted on the news and internet.

Scarlet Letter
Scarlet Letter | Source

What's Wrong With That?

I can understand that it feels good when people that do bad things get what's coming. However, this went way beyond someone finding out their friend is cheating and then confronting them or their friend's spouse. This leak is visible to the PTA, the church, their kids, their friends, their boss, their co-workers, and everyone else. While there is some shred of sympathy in me for the person using the site, there is a whole lot for the family that is now caught in a whirlwind they did not ask for. Plus, all we get is a list that comes off as black and white when really in some cases it may not be. None of us really know the true circumstances of a lot of these people's marriages. Even if we choose to accept things as black and white is the cost of human life worth the price.

At least 2 suicides have taken place since the leak. One of which was in response to fake leak where a man who did not use the website was listed to be a user by an erroneous report and in response he took his life in a church parking lot after his reputation was destroyed. Furthermore, in some countries adultery and homosexuality are criminal offenses with some penalties ranging all the way to death and people are in hiding. While it is a catchy article and there is arguably some good it is not with out its cost. Some families are going to be torn apart, some have lost jobs, and other have and may die because of this release. What we must decide is if this invasion of privacy is OK because "they had it coming".


It is a Dangerous Precedent

The system of shame hacking worries me. Someone's legal and private personal information can be taken from the internet and then broadcast to the public. When naked photos of Jennifer Lawrence, Kate Upton, and others were posted during the Apple Cloud hack some felt that it was the girls' fault for having nude photos in the first place and storing them on their computer or in their cloud. While, I can agree that it is an inherent risk and not the best approach with the current cyber climate; these were their pictures on their private account for their personal use. It was within their legal rights to take them and I do not believe that the general public has the right to treat pictures of their bodies as public domain because someone is crafty enough to breach their firewalls.

To be honest the fact that someone can hack anyone's information is not the scariest thing to me. The bigger issue is that everyone knows when these hacks occur that these photos, videos, accounts, and etc were stolen, however, you can still easily find them with a Google search on major websites. Rather than holding the people who leak the information accountable we put the blame on the people who put their information online. While the Impact Team stole the information they still sent the information to websites and news outlets who then distributed and profited from information that was illegally obtained. While I understand that there is a need for whistle blowers, who so and so is sleeping with is not a matter of national security or safety.

Do you think the Ashley Madison hack was a good thing?

See results

If we choose to distribute illegally obtained information in the media, where is the line. If a proponent for Planned Parenthood hacked an abortion clinic website and posted the information of everyone that had an abortion would that be acceptable? If someone hacked a pornographic website and posted the credit card information of all its members would that be fair game too? What about medical records about STD's or plastic surgery or sexual history?

All and all, the implications of accepting this form of privacy breach and mass distribution are far reaching. We must decide where our balance is between privacy and publicity and what we or anybody else really needs to know about somebody else. Not everyone's values are the same and no one is perfect and we must be careful how much validation we give these "righteous" leaks that seek to expose and shame.


    0 of 8192 characters used
    Post Comment

    • Daniel Gottlob profile imageAUTHOR

      Daniel Gottlob 

      2 years ago from Texas

      Thanks MizBejabbers! I think the thing that worries me the most is the mentality that when it comes to the internet, if you can find it, its yours. I think people can take themselves out of other people's shoes when leaks come up and don't empathize the way you would if somethings was being stolen or invaded in the flesh.

      I agree lawsuits are a pain. However, I do contend that there has to be some sort of protections and repercussions to prevent mass dissemination of stolen information for an individual. Conversely, bans on releasing information of any sort do open a slippy slope in themselves.

    • MizBejabbers profile image

      Doris James-MizBejabbers 

      2 years ago

      Daniel, you said a mouth full. I like the points you bring up. People deserve the right to privacy, and they should be able to have their privacy respected. I don't know what kind of hooligans we are raising today. My friend's son, a very Christian young man, got a degree in computer science, and it bothered him very much that he was taught to hack. His hacking class was told that they had to "know their enemy." They had to know how to hack in order to prevent it or to clean up after a hacker. Did you know that today third graders are being taught to hack? All this is probably contributing to the problem because some people can resist anything but temptation.

      Suing for this kind of breach of privacy is time-consuming, expensive, nasty, and another invasion of privacy, so unless you are already rich, forget it.

    • Daniel Gottlob profile imageAUTHOR

      Daniel Gottlob 

      2 years ago from Texas

      Hi peachpurple. I agree that hackers are directly the reason there is a leak. I do worry though that trying to eliminate hackers is going to be extremely difficult. However, I do believe where a major impact can be made is what leaked information is shared by websites and news outlets once illegally obtained information is released by hackers.

    • profile image


      2 years ago

      HI there

    • peachpurple profile image


      2 years ago from Home Sweet Home

      there are many hackers around, maybe that is the cause


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)