Goatse Security
Goatse Security exposed the vulnerability, and one of its members, Andrew Auernheimer, aka "weev," posted information about the exploit on Encyclopedia Dramatica.[19][20][21] In March 2010, Goatse Security discovered an integer overflow vulnerability within Apple's web browser, Safari, and posted an exploit on Encyclopedia Dramatica.[22][29] Goatse Security claimed that a hacker could exploit the mobile Safari flaw in order to gain access and cause harm to the Apple iPad.[30][33] On June 5, 2010, Daniel Spitler, aka "JacksonBrown", began discussing this vulnerability and possible ways to exploit it, including phishing, on an IRC channel.[37] Contrary to what it first claimed, the group initially revealed the security flaw to Gawker Media before notifying AT&T[37] and also exposed the data of 114,000 iPad users, including those of celebrities, the government and the military.[45] After his release on bail, he broke a gag order to protest and to dispute the legality of the search of his house and denial of access to a public defender.[56] In May 2011, a DoS vulnerability affecting several Linux distributions was disclosed by Goatse Security, after the group discovered that a lengthy Advanced Packaging Tool URL would cause compiz to crash.