- The hacker who leaked nude photos of Jennifer Lawrence has been sentenced to jail
- Man who leaked Jennifer Lawrence's nude photos jailed for eight months
The hacker who leaked nude photos of Jennifer Lawrence has been sentenced to jailnude
Jennifer Lawrence Nude Photos Leaked [NEW Pics!]
George Garofano , who hacked the iCloud accounts of more than people, including several Hollywood celebrities, was sentenced to eight months in prison on Wednesday.
big feet tumblr
Man who leaked Jennifer Lawrence's nude photos jailed for eight months
Naked pictures of Jennifer Lawrence were leaked on photo website 4chan on August 31 - Jennifer Lawrence.
Garofano and three others were charged with the offence.
best sex positions girl on top
Emails appeared to be from Apple security account he sent between April and Oct. Usernames and passwords, as well as the materials he stole from the victims, were also traded with other individuals. You can just be at a barbecue and somebody can just pull them up on their phone.
When you think of actress Jennifer Lawrence, you'll no doubt remember her stellar roles in Hollywood blockbusters such as X Men: First Class , mother! But, unfortunately, others will remember the year-old's devastating experience in , when her online accounts were hacked and private information including nude videos and photos were shared across the internet. In the months that followed the incident, the star later denounced the hack as a 'sex crime' and a 'flagrant violation of privacy'. Now, in a new interview with Scott Feinberg on The Hollywood Reporter 's Awards Chatter Podcast , the actress has opened up further about the leak, admitting she still hasn't come to terms with what happened. I think that I am still actually processing,' she explained. There was not one person in the world that is not capable of seeing these intimate photos of me. The Hunger Games star revealed that several women had contacted her about bringing a lawsuit against technology company Apple which later revealed hackers hadn't penetrated its systems, as was widely believed, rather targeted 'names, passwords and security questions'.