I was listening to a Bazzell podcast where he mentions his company self hosting and maintaining a database of personal data and credentials for use in OSINT investigations. Some acquired through public sources but others acquired through leaks. Then of course there are data aggregate companies that do the same but are going on to sell this data for a profit.

What is the legality of this? Obviously acquiring publicly available data is legal, but how are these companies able to hold on to leaked usernames, passwords, and other confidential personal information. Especially those that were initially acquired through illegal means?

  • SomeAmateur@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    9
    ·
    edit-2
    3 months ago

    It would potentially fall under “fruit of the poisonous tree doctrine” that would make it inadmissable for actual court cases but otherwise there’s nothing to stop people from gathering information that is available to the public

    • Em Adespoton@lemmy.ca
      link
      fedilink
      arrow-up
      12
      ·
      3 months ago

      And this is why it is important to poison the PII databases.

      I feel like someone needs to set up a project with scrambled PII mixed with totally fictitious PII and then “leak” it in chunks such that overall confidence in these databases approaches zero over time.