Skip to main content

John McAfee: Why the hacking of Ashley Madison will go down in history

John McAfee Calls Ashley Madison the Most Interesting Hack
The day will come when we look back at the major cyber security incidents of 2015. There is little doubt that the Ashley Madison incident will be the most fascinating in many minds for some time to come. At every level, the matter exposed breaks in trust, lies, deceit, and most impressively, very little actual sex.

Call this all an amazing trick, a hoax, a scandal, or whatever; the bottom line is that many people were coaxed into freely trading data in exchange for the perception that they would have sex, no-strings attached. In its wake, lives were completely destroyed, as well as the company that built it all.

Recommended Videos

Married and committed men and their profiles were exposed for the world to see.

We have become accustomed to the average breach, which seems to come at a monthly pace. Weak security practices are constantly exposed every time a story like this comes out. In a way, we have become numb to the implications of these things. Free credit reporting, monitoring, and other bandages offered in the wake of these incidents are just not valid solutions for what is happening to us. We accept these online services for convenience. We accept the ease of signing up and sharing information. It’s fast and it’s easy. Life is short, I get it. Security is hard. Being secure in your own life, in your own behavior, that’s even harder.

The level of trust that was broken in the Ashley Madison hack was obvious, and for many, the most hurtful. Married and committed men and their profiles, which were designed to lure strange women into sexual escapades, were exposed for the world to see. The ramifications of this exposure tells of irreparably broken marriages (which were arguably already in some kind of peril); it tells stories of people that committed suicide; and somewhere, I’m sure divorce lawyers are reaping the benefits of it all.

Ashley Madison’s parent company, Avid Life Media, weaved the next web of lies in this tragedy. It offered services predicated on the imagery of sex and trust at the same time. The company encouraged men to sign up, ensuring that everything would be a secret. How wrong many were to assume that was the case. Ashley Madison even capitalized on this Potemkin secrecy by selling a more secured service at a premium, so that info would be permanently removed. Of course, it wasn’t removed at all.

The women, they just plain didn’t exist. Brilliant programming and outsourced tasks made sure that the perception of active female profiles kept men coming in the door.

When the hack emerged, it was obvious that, regardless of the demands, the data would eventually be released, somehow. The motivation behind the hack, a thinly veiled disdain for particular people within the organization and the business itself, showed the telltale footprint of a disgruntled insider.

Dating, alternative lifestyles, and philandering have been on the Web since it started. Dating scams go back even farther than that. What made Ashley Madison so significant was the loss of innocence and potential future awareness that it caused. Perhaps it takes a very personal breach like this for many people to become aware of their information online, what they are sharing, and who they are sharing it with.

It is true that there were other major incidents that emerged this year, such as the Office of Personnel Management hack that exposed details of many prospective, current, and former government employees. The specter of that incident is a true horror. The significance of Ashley Madison, however, is that it has reached the public consciousness. With a little luck, some good may come from it.

John McAfee
Former Digital Trends Contributor
Who is John McAfee? John McAfee is one of the most influential commentators on cybersecurity anywhere in the world. His…
PayPal vs. Venmo vs. Cash App vs. Apple Cash: which app should you use?
PayPal, Venmo, Cash App, and Apple Wallet apps on an iPhone.

We’re getting closer every day to an entirely cashless society. While some folks may still carry around a few bucks for emergencies, electronic payments are accepted nearly everywhere, and as mobile wallets expand, even traditional credit and debit cards are starting to fall by the wayside.

That means many of us are past the days of tossing a few bills onto the table to pay our share of a restaurant tab or slipping our pal a couple of bucks to help them out. Now, even those things are more easily doable from our smartphones than our physical wallets.

Read more
How to change margins in Google Docs
Laptop Working from Home

When you create a document in Google Docs, you may need to adjust the space between the edge of the page and the content --- the margins. For instance, many professors have requirements for the margin sizes you must use for college papers.

You can easily change the left, right, top, and bottom margins in Google Docs and have a few different ways to do it.

Read more
What is Microsoft Teams? How to use the collaboration app
A close-up of someone using Microsoft Teams on a laptop for a videoconference.

Online team collaboration is the new norm as companies spread their workforce across the globe. Gone are the days of primarily relying on group emails, as teams can now work together in real time using an instant chat-style interface, no matter where they are.

Using Microsoft Teams affords video conferencing, real-time discussions, document sharing and editing, and more for companies and corporations. It's one of many collaboration tools designed to bring company workers together in an online space. It’s not designed for communicating with family and friends, but for colleagues and clients.

Read more