1259:"To show industries how to use the codec, MPEG cobbled together a free sample program that converted music into MP3 files. The demonstration software created poor-quality sound, and Fraunhofer did not intend that it be used. The software's "source code"—its underlying instructions—was stored on an easily accessible computer at the University of Erlangen, from which it was downloaded by one SoloH, a hacker in the Netherlands (and, one assumes, a Star Wars fan). SoloH revamped the source code to produce software that converted compact-disc tracks into music files of acceptable quality."
744:
25:
600:. The repository reportedly contained Nissan NA mobile apps, parts of the Nissan ASIST diagnostics tool, Nissan's internal core mobile library, Dealer Business Systems and Dealer Portal, client acquisition and retention tools, market research tools and data, vehicle logistics portal, vehicle connected services, and various other back ends and internal tools, they reported.
660:
not near completion. The leak itself, however, received negative reception, with many claiming it discredited the work of several employees. Publisher TakeTwo began taking down leaks on several different websites. Rockstar issued a statement on
September 19, which stated they were "disappointed" with the leak.
2419:
In 2000 the source code of Falcon 4.0 leaked out and after that groups of volunteers were able to make fixes and enhancements that assured the longevity of this sim. Do you see the source code leak as a good or bad event? "Absolutely a good event. In fact I wish I'd known who did it so I could thank
576:
complete source code depots were leaked. The archives included all the source code from the time it was used at
Microsoft, including documentation and build tools. The leak was first dismissed as illegitimate, but it was soon clear that it was legitimate, the source code contained Windows XP specific
916:
was leaked in its entirety two weeks before its release, allowing many to play and datamine in advance. While the entire roster of characters and stages had already been officially revealed, many unrevealed collectibles, music tracks, and story elements were discovered and distributed. This prompted
659:
had a massive leak online, with 90 videos of the game being released. It was confirmed by a worker at
Rockstar Games that the leak was real. The content of the leak received mixed reviews, with many calling the game unfinished and rushed, but many criticized these complaints by stating the game was
110:
is an unauthorized release of music over the internet. Songs or albums may leak days or months before their scheduled release date. In other cases, the leaked material may be demos or scrapped work never intended for public release. Leaks often originate from hackers who gain unauthorized access to
529:
games. Later in 2020, the leaks gained more attention and grew in size, culminating into the release of Wii and
Nintendo 64 source code, and the so-called "Gigaleak", a massive release containing multiple N64 games' source code and SNES Prototypes. After July 2021, no more releases have
908:. The leak gained traction very quickly due to the screenshots mostly containing elements that the game ratings board would be interested in, such as trophies of suggestively-dressed female characters (some of which were later found to be edited or cut altogether in the final game).
524:
when a hacker obtained an alleged 2 TB of confidential material containing source codes to game consoles, games, and internal documentation. Starting in 2018, the contents of this breach slowly made their way onto the
Internet, starting with iQue Player ROMs and various
863:
as technologically competitive and a major threat for
Microsoft's dominance in the market, and they discussed strategies to combat them. The discovery caused a public controversy. The documents were also used as evidence in several court
321:"crap". The writer also noted that there were a lot of code hacks, with the "uglier" ones mostly being for compatibility with older programs and some hardware. It was feared that because of the leak, the number of security
2174:"We can confirm a breach has taken place. Our teams are working with urgency to understand the extent of this. We will update the community as soon as additional information is available. Thank you for bearing with us"
649:
successor were also found among the data. It was also reported recently that the group also infiltrated
Portuguese media conglomerate Impresa, the Ministry of Health in Brazil and Brazilian telecommunications company
634:, citing the streaming site's negative community and desire for competition and disruption of the online video streaming space. The breach was confirmed by Twitch on Twitter. The leak was distributed freely via a
1052:
to officially unveil them. The leak exacerbated criticism of a new, two-hour format for the selection broadcast, which was criticized for revealing the full tournament bracket at a slower pace than in previous
1068:
computer designs as recent as March 2021. The attackers threatened to release everything they had obtained by May 1, 2021, unless a ransom had been paid, however nothing further came out of the breach.
1123:
but screenshots were taken down by
Universal & Illumination. Only 2 descriptions of the plot leak was confirmed true, while the third was false for Edith, Agnes and Margo were going to be
645:
and reportedly obtained 1 TB of proprietary information. The group subsequently released a ~20 GB archive containing the source code for NVIDIA GPU drivers among other things. Details for a
2401:
1574:
2021:
1650:
502:
operating systems' source code was leaked onto GitHub by an Apple engineer. The code was from 2016, and by the time it was leaked, iBoot had been restructured, making it obsolete.
2574:
2121:
231:
to invite Gembe to a fake job interview, planning to have him arrested in the USA; however, police arrested him in
Germany. The complete source was soon available in various
2374:
2544:
1685:
1621:
1826:
Windows 10 source code leak is an embarrassment for
Microsoft - It's less serious than initially thought but still important, given security is high on everyone’s mind.
1095:'s cost savings effort. On July 26, 2023, it was confirmed to not be cancelled, and a trailer was released on July 27, 2023 with a release date of September 26, 2023.
1853:
2095:
1380:
2259:
904:
was afflicted in August 2014 by the "ESRB leak", where many screenshots and limited video footage of the 3DS version were leaked by a supposed member of the
2148:
1030:
958:
has been filled with lot of leaks for later seasons on scenes, leaked full song to the theme song, leaked early released episodes before they got aired on
619:(CDPR) announced hackers had targeted the company and attempted to hold it to ransom. On 6 June 2021, someone in possession of the data had leaked all of
1045:
1965:
859:
movement, who published and commented on them online. The documents revealed that internally Microsoft viewed free and open-source software such as
2405:
1988:
2355:
223:
from the source code, revealing how unfinished it was. The leaks damaged morale at Valve and slowed development. In March 2004, Gembe contacted
1578:
2240:
2070:
254:
published a critique of Diebold's products, based on an analysis of the software. They found, for example, that it would be easy to program a
78:. Various types of information and data can be, and have been, "leaked" to the Internet, the most common being personal information, computer
979:" was leaked, when it was illegally pulled from the South Park Studios servers and was posted online in its entirety without any approval by
1931:
695:
Sometimes software developers themselves will intentionally leak their source code in an effort to prevent a software product from becoming
2221:
900:
1522:
2013:
1654:
1792:
90:. For example, a musical album is leaked if it has been made available to the public on the Internet before its official release date.
1193:
2610:
2592:
923:
2378:
1152:
1879:
1501:
1331:
1301:
1168:
896:
wii.com website, revealing unconfirmed playable characters on January 28, 2008 (three days before the game's Japanese release).
2658:
2552:
1682:
1462:
2840:
2805:
2491:
1282:
325:
would increase due to wider scrutiny of the source code. It was later discovered that the source of the leak originated from
279:
finally raided his home in 2007, seized the servers and permanently disabled the website that fronted his bootleg version of
808:
2518:
2420:
them. I honestly think this should be standard procedure for companies that decide not to continue to support a code base."
1825:
1450:
943:
937:
2780:
2303:
780:
955:
1298:
Technologies of Piracy? - Exploring the Interplay Between Commercialism and Idealism in the Development of MP3 and DivX
2885:
1838:
2323:
1904:
1667:
It looks as though someone has posted the source code for the space MMO Eve Online there. As you'd imagine, developer
1372:
359:
from the company's network. While confirmed in January 2012, it is still unclear how the hackers accessed the network.
1762:
1429:
1099:
827:
787:
484:
source code leaked to the public. The leak was of the Shared Source Kit, a small portion of the source code given to
2631:
1251:
963:
507:
336:' networking hardware was made available in the internet. The site posted two files of source code written in the
227:, CEO of Valve, and identified himself, saying he was a fan and had not acted maliciously. Newell worked with the
2434:
1349:
1021:
703:, allowing the community to continue development and support. Reasons for leaking instead of a proper release to
485:
276:
623:
code (96.02 GB of data in 7z archive) online publicly, while previously it was only available in encrypted form.
132:, or employees that have access to the sources or part of them revealing the code in order to harm the company.
1779:
794:
765:
761:
592:
server, which was left exposed online with a default username and password of admin/admin. Software engineer
313:
who noted that while the code was generally well written, it allegedly contained about "a dozen" instances of
2880:
1137:
271:
who then used it to create a bootleg version of the game, powered by his own servers. Despite warnings from
2044:
983:. The episode was heavily censored by the network when it aired in 2010 against the will of series creators
309:'s were leaked online. The Windows 2000 source code leak was analysed by a writer for (now defunct) website
2731:
1957:
1214:
712:
929:
Several high-profile books have been leaked on the Internet before their official release date, including
776:
2096:"Секреты Киберплотвы: исходный код показал, что машины в Cyberpunk 2077 — это ездовые животные с дверьми"
1163:
1034:
322:
2861:
2826:
2756:
2122:"Разбор исходного кода Cyberpunk 2077. Машины — лошади с дверями, Винни-Пух и комментарии разработчиков"
2890:
1402:
912:
121:
2045:"CD Projekt's stolen source code, console SDKs and internal dev videos reportedly being shared online"
1155:, a 2006 California case in which police photographs of a fatal automobile accident were leaked online
275:
that pirating an online game was considered illegal, he continued doing so for a few years, until the
2593:"NCAA says it's investigating the bracket leak that saved us from the two-hour Selection Sunday show"
477:
Browser engine was leaked to GitHub. The source code was shortly after taken down with a DMCA notice.
439:
258:
voting card to work with the machines and then use it to cast multiple votes inside the voting booth.
232:
2717:
611:
565:
cameras firmware that Intel worked on also leaked. The data is being distributed through a torrent.
337:
247:
239:
206:
1716:
2895:
1704:
878:
754:
554:
521:
139:
Developers may inadvertently leak source code by making mistakes when mastering. Two releases of
1530:
1158:
1092:
1016:
1008:
561:
and software simulators of their hardware. Their various BIOS source code was also leaked. The
474:
467:
171:
125:
2611:"Apple targeted in $ 50 million ransomware attack resulting in unprecedented schematic leaks"
1272:
1109:
700:
534:
1274:
Pop Idols and Pirates: Mechanisms of Consumption and the Global Circulation of Popular Music
1115:
On January 3, 2024, a Twitter user leaked the screenshots of 3 new minions and the plot for
991:, and was never formally released uncensored to the public. The episode was the second in a
145:
contained parts of the source code to Sierra's AGI game engine, and a particular release of
2683:
1552:
1297:
856:
801:
708:
389:
2841:
https://x.com/garfieldmovnews/status/1742642176105029945?s=46&t=evFrDjOz0J56cjwXHKohcA
2806:
https://x.com/garfieldmovnews/status/1742656275513499659?s=46&t=evFrDjOz0J56cjwXHKohcA
638:
and was 135.17 GB in size. As a precaution, all the stream keys have been reset by Twitch.
8:
2199:
847:
655:
573:
456:
174:
and developed a higher quality version, which started the MP3 revolution on the internet.
2337:
2173:
1064:
was hit by a ransomware attack. The attackers began posting documents and schematics of
1105:
1044:
On March 13, 2016, the full list of qualifying teams and first round match-ups for the
876:
has a history of having unconfirmed content leaked. Every game since, including 2008's
665:
344:
functionality. News of the latest source code leak appeared on a Russian security site.
155:
46:
2452:
One of Activision's last RTS games, Dark Reign 2, has gone open source under the LGPL.
2071:"Cyberpunk and Witcher hackers auction off stolen source code for millions of dollars"
630:
had its source code along with earnings reports of top streamers leaked by hackers on
2848:
2813:
2702:
2308:
2260:"'Switch Pro' Trends On Social Media After Massive Nvidia Leak Reignites Speculation"
1498:
1278:
1004:
893:
872:
593:
348:
220:
199:
2575:"Ratings for CBS's NCAA tournament selection show were almost as bad as show itself"
2278:
1958:"Intel Suffers Apparent Data Breach, 20GB of IP and Documents Leaked on to Internet"
2519:"An uncensored version of South Park's controversial Muhammad episode has surfaced"
1120:
1084:
996:
976:
959:
627:
546:
367:
195:
147:
135:
There were many cases of source code leaks in the history of software development.
382:
2492:"Climate sceptics claim leaked emails are evidence of collusion among scientists"
1989:"Windows XP leak confirmed after user compiles the leaked code into a working OS"
1724:
1689:
1505:
1116:
1061:
1025:
948:
852:
646:
588:
North America source code was leaked online due to misconfiguration of a company
577:
code and resources, later one user managed to compile the OS and pack it into an
558:
513:
251:
178:
1839:"How a Low-Level Apple Employee Leaked Some of the iPhone's Most Sensitive Code"
1806:
980:
605:
423:
352:
302:
243:
141:
2200:"Twitch Data Leaked: Here's Everything You Need To Know - Game Specifications"
2874:
2522:
1475:
Treiber-Quellcode von 3dfx im Netz aufgetaucht - Von Nvidia offenbar geduldet
1000:
704:
542:
333:
2632:"Scooby-Doo! And Krypto, Too! Animated Film Not Canceled, Trailer Announced"
1430:"The Boy Who Stole Half-Life 2 - The story behind the $ 250 million robbery"
962:, unfinished episodes, 2018–present there was leaks for the generation 5 as
1626:
1255:
726:
635:
445:
363:
306:
129:
50:
1119:
weeks before the trailer launched and was claimed that it would appear at
1048:
leaked on Twitter in the midst of a television special being broadcast by
1020:
episode "Boston" was leaked online. The episode was set to air during the
669:, and announced he would be selling both. Shortly after, he announced the
294:
and support ended, the source code for their drivers leaked, resulting in
120:
Source code leaks are usually caused by misconfiguration of software like
2469:
1854:"Valve Says 'Team Fortress 2,' 'CS:GO' Code Leak Is No Cause For Concern"
984:
931:
696:
448:
418:
403:
255:
224:
211:
167:
83:
2465:
917:
Nintendo to issue copyright strikes to many YouTube and Twitch channels.
332:
Also in 2004, partial (800 MB) proprietary source code that drives
215:. The source code was leaked online a week later, a playable version of
2659:"Full Scooby-Doo and DC Crossover Movie Leaks Online After Cancelation"
2402:"Interview with Kevin Klemmick - Lead Software Engineer for Falcon 4.0"
1932:"Massive Nintendo leak reveals early Mario, Zelda, and Pokémon secrets"
1671:
isn't too happy about this and was quick to issue the takedown request.
1335:
1239:
1142:
1076:
1057:
1049:
1038:
988:
971:
768: in this section. Unsourced material may be challenged and removed.
720:
716:
616:
569:
499:
495:
481:
431:
397:
378:
371:
356:
268:
263:
107:
100:
1748:
1474:
526:
2279:"Lapsus Ransomware Gang Ups the Ante with Impresa and NVIDIA Attacks"
1668:
1651:"Eve Online source code posted online, DMCA takedown quickly follows"
1173:
1147:
1088:
992:
842:
578:
318:
314:
203:
188:
39:
743:
2548:
2438:
1793:"Presto engine source code available on GitHub : operabrowser"
1766:
1736:
1720:
1509:
1332:
When EA Sports Accidentally Put a Game's Source Code on a Demo Disc
1007:
who were angry of the episode's storyline satirizing censorship of
867:
326:
310:
295:
79:
75:
35:
596:
learned of the leak and analyzed the data, which they shared with
466:
3.1 source code leaked to the web, confirmed by the rights holder
128:
which allow people to get source files through exploits, software
2781:"Man Begs Universal Not to Sue After Leaking Anticipated Trailer"
1523:"We Are Morons: a quick look at the Win2k source || kuro5hin.org"
1065:
463:
410:
repository. After being online for four days, CCP Games issued a
202:'s internal network months earlier, exploited a security hole in
183:
2356:"Yandex denies hack, blames source code leak on former employee"
1486:
305:'s source code and a small percentage (reportedly about 15%) of
111:
the online storage of an artist, label, producer, or journalist.
2241:"Hackers to NVIDIA: Remove mining cap or we leak hardware data"
1811:
1693:
1080:
683:
642:
585:
562:
452:
407:
291:
272:
151:
for the PC contained a deleted archive of the game source code.
673:
source code was no longer for sale, but was still selling the
860:
631:
597:
538:
492:
163:
87:
2149:"Twitch source code, creator earnings exposed in 125GB leak"
1600:
969:
On January 31, 2014, the original uncensored version of the
2545:"Banned Aqua Teen Hunger Force Boston episode leaks online"
2222:"GPU giant NVIDIA is investigating a potential cyberattack"
1880:"Hacker Who Hit Microsoft and Nintendo: Suspended Sentence"
905:
411:
341:
287:
2684:"https://twitter.com/WBHomeEnt/status/1684262384469147681"
1905:"Nintendo's iQue Player Hacked Fifteen Years After Launch"
1575:"Microsoft Updates Code Leak Statement, Mainsoft Fingered"
1098:
On May 6, 2023, a Twitter user leaked the trailer for the
682:
On January 25, 2023, leaked archive with approx. 44 GB of
677:
source code. This has been considered a form of blackmail.
2304:"Grand Theft Auto 6 leak reveals over 90 gameplay videos"
1314:
889:
663:
The hacker who got the leak also got the source code for
589:
550:
228:
159:
2014:"Nissan Source Code Leaked via Misconfigured Git Server"
1083:
was allegedly canceled, and was leaked online. It was
641:
On February 25, 2022, ransomware group LAPSUS$ hacked
1477:
by Christian Klaß on Golem.de (May 7, 2003, in German)
1300:
by HENDRIK STORSTEIN SPILKER, SVEIN HÖIER, page 2072,
261:
In 2003 a Chinese hacker acquired the source code for
2758:
Scooby-Doo! and Krypto, Too! - Official Trailer - IGN
1683:
dmca/2011-05-24-cpp-virtual-world-operations.markdown
1577:. windowsitpro.com. February 19, 2004. Archived from
941:, and an early draft of the first twelve chapters of
158:
released in 1994 only a low quality version of their
1780:
amiga-os-kickstart-and-workbench-source-coded-leaked
1622:"Symantec suspected source code breach back in 2006"
1270:
1031:
Aqua Teen Hunger Force Colon Movie Film for Theaters
434:
operating system's kernel was leaked via BitTorrent.
74:
is the unauthorized release of information over the
1763:"Hyperion Confirms Leak Of AmigaOS 3.1 Source Code"
1041:
was forced to pull it to avoid further controversy.
181:accidentally put the source code of the video game
690:
1828:by Swapna Krishna on engadget.com (June 24, 2017)
520:Some time during March 2018, Nintendo suffered a
351:hackers stole source code (about 1 GiB) for
2872:
1395:
1112:worked to have videos of the trailer taken down.
1046:2016 NCAA Men's Division I Basketball Tournament
340:, which apparently enables some next-generation
1463:CRACKING THE CODE Online IP Theft Is Not a Game
1127:. The trailer was released in January 28, 2024.
724:which became available in 2000; another one is
414:take-down request which was followed by GitHub.
2338:"Yandex source code leaked on a hacking forum"
2393:
2372:
947:. The leak of the latter prompted the author
209:to get the complete source of the video game
2567:
2510:
1207:
901:Super Smash Bros. for Nintendo 3DS and Wii U
388:In January 2011 the "stolen source code" of
2585:
1717:Oracle Solaris 11 Kernel Source-Code Leaked
1553:"Mainsoft Eyed as Windows Source Code Leak"
473:In January 2017 the source code of Opera's
2516:
2276:
16:Unauthorized release of information online
2399:
1929:
1648:
1315:"Online.nl | Internet, TV en Bellen"
995:and was censored after the airing of the
882:has been affected by leaks in some form:
828:Learn how and when to remove this message
480:In June 2017 a small part of Microsoft's
430:In December 2011, the source code of the
2324:"GTA 6: Gameplay Videos Reportedly Leak"
1451:fbi-shuts-down-lineage-ii-private-server
1403:"Playable Version of Half-Life 2 Stolen"
1194:"The Space Quest II Master Disk Blunder"
870:'s crossover fighting video game series
686:services has been published on Torrents.
451:(and its successor) became available on
2432:
2126:iXBT.games - санитары игровой индустрии
1760:
1277:. Ashgate Publishing, Ltd. p. 75.
1153:Nikki Catsouras photographs controversy
841:In late 1998, a number of confidential
2873:
2257:
2219:
2197:
2146:
1968:from the original on September 1, 2024
1427:
1383:from the original on November 28, 2019
1370:
1302:International Journal of Communication
1215:"Double Dragon II: The Revenge Trivia"
1169:War Thunder classified documents leaks
1071:On March 6, 2023, the unreleased film
86:, and artistic works such as books or
2778:
2626:
2624:
2400:Bertolone, Giorgio (March 12, 2011).
2238:
2068:
1955:
1930:Hernandez, Patricia (July 26, 2020).
1191:
166:), a hacker named SoloH gathered the
2656:
2542:
2220:Gatlan, Sergiu (February 25, 2022).
2042:
2024:from the original on January 7, 2021
1877:
1761:Larabel, Michael (January 5, 2016).
1555:. internetnews.co. February 13, 2004
1347:
938:Harry Potter and the Deathly Hallows
766:adding citations to reliable sources
737:
170:from the unprotected servers of the
115:
18:
2404:. Cleared-To-Engage. Archived from
2375:"Diehard pilots keep Falcon flying"
2239:Ionut, Ilascu (February 28, 2022).
2198:Mathan, Gayatri (October 7, 2021).
1986:
1707:on ragezone.com (November 20, 2011)
1649:Humphries, Matthew (May 25, 2011).
1428:Parkin, Simon (February 21, 2011).
1185:
956:My Little Pony: Friendship Is Magic
626:On October 6, 2021, streaming site
381:user published the sources of five
13:
2621:
2373:Hiawatha Bray (January 21, 2004).
1364:
377:In December 2007 and January 8, a
14:
2907:
2517:O'Neal, Sean (January 31, 2014).
2069:Statt, Nick (February 10, 2021).
1851:
1035:that occurred in the titular city
1024:as a response to a controversial
924:Climatic Research Unit email leak
362:In late 2007, the source code of
1350:"The Final Hours of Half-Life 2"
964:My Little Pony: A New Generation
742:
508:Counter-Strike: Global Offensive
392:was published on the Pirate Bay.
99:This section is an excerpt from
23:
2833:
2798:
2772:
2749:
2724:
2676:
2657:Lund, Anthony (March 6, 2023).
2650:
2603:
2536:
2484:
2458:
2435:"Dark Reign 2 Goes Open Source"
2426:
2366:
2348:
2330:
2316:
2296:
2270:
2251:
2232:
2213:
2191:
2166:
2140:
2114:
2088:
2062:
2036:
2006:
1980:
1949:
1923:
1897:
1871:
1845:
1831:
1819:
1799:
1785:
1773:
1754:
1742:
1730:
1710:
1698:
1676:
1642:
1614:
1593:
1567:
1545:
1515:
1492:
1480:
1468:
1456:
1444:
1421:
1373:"The boy who stole Half-Life 2"
753:needs additional citations for
691:End-of-life leaks by developers
277:Federal Bureau of Investigation
2732:"Scooby-Doo! and Krypto, Too!"
2258:Doolan, Liam (March 1, 2022).
2147:Sharma, Ax (October 6, 2021).
1956:Smith, Ryan (August 6, 2020).
1705:Gunz 1.5 Source Code released.
1512:by Joris Evers (February 2004)
1371:Parkin, Simon (May 25, 2014).
1341:
1325:
1307:
1291:
1264:
1245:
1233:
733:
711:can include scattered or lost
406:was published by someone on a
194:In 2003, Axel Gembe, a German
38:format but may read better as
1:
2100:3DNews - Daily Digital Digest
1271:Dr Charles Fairchild (2013).
1192:Ewing, Lance (May 22, 2024).
1179:
1138:Distributed Denial of Secrets
951:to suspend work on the novel.
892:was leaked by a video on the
488:to help with writing drivers.
427:v1.5 became available online.
238:Also in 2003, source code to
93:
2377:. Boston.com. Archived from
2277:titanadmin (March 4, 2022).
1073:Scooby-Doo! and Krypto, Too!
713:intellectual property rights
541:, including source code (in
533:On August 7, 2020, 20 GB of
301:In 2004, a large portion of
7:
2779:James, Adam (May 7, 2023).
2043:Kent, Emma (June 4, 2021).
1739:on github.com (August 2014)
1164:Software release life cycle
1131:
845:documents later dubbed the
370:version were available via
246:was leaked. Researchers at
10:
2912:
2433:Timothy (August 7, 2012).
1653:. geek.com. Archived from
1499:Windows Code May Be Stolen
913:Super Smash Bros. Ultimate
553:structure). That included
462:On December 29, 2015, the
267:and sold it to someone in
98:
2886:Intellectual property law
1688:November 8, 2015, at the
699:after it has reached its
440:S.T.A.L.K.E.R.: Clear Sky
390:Kaspersky Anti-Virus 2008
1075:, a crossover involving
549:leaked (with preserving
545:and otherwise) of their
286:In 2003, one year after
248:Johns Hopkins University
240:Diebold Election Systems
1807:"github.com/prestocore"
1465:on FBI.gov (02/01/2007)
1101:Five Nights at Freddy’s
1085:alleged to be cancelled
886:Super Smash Bros. Brawl
879:Super Smash Bros. Brawl
653:On September 18, 2022,
603:On February 10, 2021,
568:On September 23, 2020,
47:converting this article
1727:(on December 19, 2011)
1504:July 31, 2013, at the
1159:royaldutchshellplc.com
1093:Warner Bros. Discovery
1017:Aqua Teen Hunger Force
1009:depictions of Muhammad
491:In February 2018, the
468:Hyperion Entertainment
338:C programming language
198:, who had infiltrated
172:University of Erlangen
2326:. September 18, 2022.
2312:. September 18, 2022.
855:, an activist in the
584:On January 4, 2021,
535:Intellectual property
233:file sharing networks
2881:Internet terminology
2688:X (formerly Twitter)
1878:Schwartz, Mathew J.
1841:. February 12, 2018.
1782:on December 29, 2015
1657:on November 18, 2015
1533:on September 9, 2016
1453:on mmorpg.com (2007)
1334:by Luke Plunkett on
1252:The heavenly jukebox
1014:In 2015 the unaired
857:open-source software
762:improve this article
715:. An example is the
2636:Yahoo Entertainment
2498:. November 20, 2009
2472:. September 1, 2011
2362:. January 26, 2023.
2344:. January 26, 2023.
2020:. January 7, 2021.
1795:. January 12, 2017.
1581:on February 1, 2010
1487:NuAngel.net Drivers
1091:for parent company
1081:Krypto the Superdog
1056:On April 20, 2021,
848:Halloween documents
656:Grand Theft Auto VI
574:Windows Server 2003
505:On April 22, 2020,
457:open-source license
368:Norton Anti-Spyware
162:encoding software (
1987:Cimpanu, Catalin.
1630:. January 26, 2012
1527:atdt.freeshell.org
1106:Universal Pictures
1005:Islamic extremists
666:Grand Theft Auto V
383:Idera SQL products
298:, updated drivers.
49:, if appropriate.
2891:Internet trolling
2856:Missing or empty
2821:Missing or empty
2738:, October 9, 2023
2710:External link in
2617:. April 21, 2021.
2599:. March 14, 2016.
2597:Los Angeles Times
2581:. March 14, 2016.
2555:on April 19, 2015
2408:on March 18, 2011
2360:Bleeping Computer
1962:www.anandtech.com
1409:. October 7, 2003
1348:Keighley, Geoff.
1284:978-1-4094-9381-5
926:, aka Climategate
894:Japanese language
873:Super Smash Bros.
838:
837:
830:
812:
594:maia arson crimew
395:On May 20, 2011,
116:Source code leaks
68:
67:
2903:
2866:
2865:
2859:
2854:
2852:
2844:
2837:
2831:
2830:
2824:
2819:
2817:
2809:
2802:
2796:
2795:
2793:
2791:
2785:Inside the Magic
2776:
2770:
2769:
2768:
2766:
2753:
2747:
2746:
2745:
2743:
2728:
2722:
2721:
2715:
2714:
2708:
2706:
2698:
2696:
2694:
2680:
2674:
2673:
2671:
2669:
2654:
2648:
2647:
2645:
2643:
2628:
2619:
2618:
2607:
2601:
2600:
2589:
2583:
2582:
2571:
2565:
2564:
2562:
2560:
2551:. Archived from
2543:Gonzales, Dave.
2540:
2534:
2533:
2531:
2529:
2514:
2508:
2507:
2505:
2503:
2488:
2482:
2481:
2479:
2477:
2462:
2456:
2455:
2448:
2446:
2430:
2424:
2423:
2415:
2413:
2397:
2391:
2390:
2388:
2386:
2381:on April 8, 2004
2370:
2364:
2363:
2352:
2346:
2345:
2334:
2328:
2327:
2320:
2314:
2313:
2300:
2294:
2293:
2291:
2289:
2274:
2268:
2267:
2255:
2249:
2248:
2245:BleepingComputer
2236:
2230:
2229:
2226:BleepingComputer
2217:
2211:
2210:
2208:
2206:
2195:
2189:
2188:
2186:
2184:
2170:
2164:
2163:
2161:
2159:
2144:
2138:
2137:
2135:
2133:
2118:
2112:
2111:
2109:
2107:
2092:
2086:
2085:
2083:
2081:
2066:
2060:
2059:
2057:
2055:
2040:
2034:
2033:
2031:
2029:
2010:
2004:
2003:
2001:
1999:
1984:
1978:
1977:
1975:
1973:
1953:
1947:
1946:
1944:
1942:
1927:
1921:
1920:
1918:
1916:
1911:. April 29, 2018
1909:NintendoSoup.com
1901:
1895:
1894:
1892:
1890:
1884:BankInfoSecurity
1875:
1869:
1868:
1866:
1864:
1849:
1843:
1842:
1835:
1829:
1823:
1817:
1816:
1803:
1797:
1796:
1789:
1783:
1777:
1771:
1770:
1758:
1752:
1746:
1740:
1734:
1728:
1714:
1708:
1702:
1696:
1680:
1674:
1673:
1664:
1662:
1646:
1640:
1639:
1637:
1635:
1618:
1612:
1611:
1609:
1607:
1597:
1591:
1590:
1588:
1586:
1571:
1565:
1564:
1562:
1560:
1549:
1543:
1542:
1540:
1538:
1529:. Archived from
1519:
1513:
1496:
1490:
1484:
1478:
1472:
1466:
1460:
1454:
1448:
1442:
1441:
1439:
1437:
1425:
1419:
1418:
1416:
1414:
1399:
1393:
1392:
1390:
1388:
1368:
1362:
1361:
1359:
1357:
1345:
1339:
1329:
1323:
1322:
1311:
1305:
1295:
1289:
1288:
1268:
1262:
1249:
1243:
1237:
1231:
1230:
1228:
1226:
1211:
1205:
1204:
1202:
1200:
1189:
1121:Super Bowl LVIII
960:Discovery Family
833:
826:
822:
819:
813:
811:
770:
746:
738:
522:significant leak
517:code was leaked.
148:Double Dragon II
63:
60:
54:
45:You can help by
27:
26:
19:
2911:
2910:
2906:
2905:
2904:
2902:
2901:
2900:
2871:
2870:
2869:
2857:
2855:
2846:
2845:
2839:
2838:
2834:
2822:
2820:
2811:
2810:
2804:
2803:
2799:
2789:
2787:
2777:
2773:
2764:
2762:
2761:, July 28, 2023
2755:
2754:
2750:
2741:
2739:
2730:
2729:
2725:
2712:
2711:
2709:
2700:
2699:
2692:
2690:
2682:
2681:
2677:
2667:
2665:
2655:
2651:
2641:
2639:
2638:. July 27, 2023
2630:
2629:
2622:
2609:
2608:
2604:
2591:
2590:
2586:
2579:Washington Post
2573:
2572:
2568:
2558:
2556:
2541:
2537:
2527:
2525:
2515:
2511:
2501:
2499:
2490:
2489:
2485:
2475:
2473:
2464:
2463:
2459:
2444:
2442:
2431:
2427:
2411:
2409:
2398:
2394:
2384:
2382:
2371:
2367:
2354:
2353:
2349:
2336:
2335:
2331:
2322:
2321:
2317:
2302:
2301:
2297:
2287:
2285:
2275:
2271:
2256:
2252:
2237:
2233:
2218:
2214:
2204:
2202:
2196:
2192:
2182:
2180:
2172:
2171:
2167:
2157:
2155:
2145:
2141:
2131:
2129:
2120:
2119:
2115:
2105:
2103:
2094:
2093:
2089:
2079:
2077:
2067:
2063:
2053:
2051:
2041:
2037:
2027:
2025:
2012:
2011:
2007:
1997:
1995:
1985:
1981:
1971:
1969:
1954:
1950:
1940:
1938:
1928:
1924:
1914:
1912:
1903:
1902:
1898:
1888:
1886:
1876:
1872:
1862:
1860:
1850:
1846:
1837:
1836:
1832:
1824:
1820:
1805:
1804:
1800:
1791:
1790:
1786:
1778:
1774:
1759:
1755:
1747:
1743:
1735:
1731:
1725:Michael Larabel
1715:
1711:
1703:
1699:
1690:Wayback Machine
1681:
1677:
1660:
1658:
1647:
1643:
1633:
1631:
1620:
1619:
1615:
1605:
1603:
1599:
1598:
1594:
1584:
1582:
1573:
1572:
1568:
1558:
1556:
1551:
1550:
1546:
1536:
1534:
1521:
1520:
1516:
1506:Wayback Machine
1497:
1493:
1485:
1481:
1473:
1469:
1461:
1457:
1449:
1445:
1435:
1433:
1432:. eurogamer.net
1426:
1422:
1412:
1410:
1401:
1400:
1396:
1386:
1384:
1369:
1365:
1355:
1353:
1346:
1342:
1330:
1326:
1313:
1312:
1308:
1296:
1292:
1285:
1269:
1265:
1250:
1246:
1238:
1234:
1224:
1222:
1213:
1212:
1208:
1198:
1196:
1190:
1186:
1182:
1134:
1117:Despicable Me 4
1062:Quanta Computer
1026:publicity stunt
999:as a result of
949:Stephenie Meyer
922:November 2009:
853:Eric S. Raymond
851:were leaked to
834:
823:
817:
814:
777:"Internet leak"
771:
769:
759:
747:
736:
693:
647:Nintendo Switch
559:Intel Microcode
547:system on chips
514:Team Fortress 2
437:In August 2014
385:via BitTorrent.
364:Norton Ghost 12
317:and the milder
252:Rice University
244:voting machines
179:Electronic Arts
118:
113:
112:
104:
96:
64:
58:
55:
44:
28:
24:
17:
12:
11:
5:
2909:
2899:
2898:
2896:Internet leaks
2893:
2888:
2883:
2868:
2867:
2832:
2797:
2771:
2748:
2723:
2675:
2649:
2620:
2602:
2584:
2566:
2535:
2509:
2483:
2457:
2425:
2392:
2365:
2347:
2329:
2315:
2295:
2269:
2250:
2231:
2212:
2190:
2165:
2139:
2113:
2087:
2061:
2035:
2005:
1979:
1948:
1922:
1896:
1870:
1844:
1830:
1818:
1798:
1784:
1772:
1753:
1741:
1729:
1709:
1697:
1675:
1641:
1613:
1592:
1566:
1544:
1514:
1491:
1489:on nuangel.net
1479:
1467:
1455:
1443:
1420:
1394:
1363:
1340:
1324:
1306:
1290:
1283:
1263:
1244:
1242:on archive.org
1232:
1221:. July 1, 2019
1206:
1183:
1181:
1178:
1177:
1176:
1171:
1166:
1161:
1156:
1150:
1145:
1140:
1133:
1130:
1129:
1128:
1113:
1096:
1069:
1054:
1042:
1012:
981:Comedy Central
967:
966:was the start.
952:
927:
920:
919:
918:
909:
897:
865:
836:
835:
750:
748:
741:
735:
732:
692:
689:
688:
687:
680:
679:
678:
651:
639:
624:
621:Cyberpunk 2077
617:CD Projekt Red
606:Cyberpunk 2077
601:
582:
566:
531:
518:
503:
489:
478:
471:
460:
435:
428:
424:GunZ: The Duel
415:
393:
386:
375:
360:
345:
330:
303:Windows NT 4.0
299:
290:was bought by
284:
259:
236:
192:
175:
156:Fraunhofer IIS
152:
142:Space Quest II
117:
114:
105:
97:
95:
92:
66:
65:
31:
29:
22:
15:
9:
6:
4:
3:
2:
2908:
2897:
2894:
2892:
2889:
2887:
2884:
2882:
2879:
2878:
2876:
2863:
2850:
2842:
2836:
2828:
2815:
2807:
2801:
2786:
2782:
2775:
2760:
2759:
2752:
2737:
2733:
2727:
2719:
2704:
2689:
2685:
2679:
2664:
2660:
2653:
2637:
2633:
2627:
2625:
2616:
2612:
2606:
2598:
2594:
2588:
2580:
2576:
2570:
2554:
2550:
2546:
2539:
2524:
2523:The A.V. Club
2520:
2513:
2497:
2493:
2487:
2471:
2467:
2461:
2454:
2453:
2440:
2436:
2429:
2422:
2421:
2407:
2403:
2396:
2380:
2376:
2369:
2361:
2357:
2351:
2343:
2339:
2333:
2325:
2319:
2311:
2310:
2305:
2299:
2284:
2280:
2273:
2265:
2264:Nintendo Life
2261:
2254:
2246:
2242:
2235:
2227:
2223:
2216:
2201:
2194:
2179:
2175:
2169:
2154:
2150:
2143:
2127:
2123:
2117:
2101:
2097:
2091:
2076:
2072:
2065:
2050:
2046:
2039:
2023:
2019:
2015:
2009:
1994:
1990:
1983:
1967:
1963:
1959:
1952:
1937:
1933:
1926:
1910:
1906:
1900:
1885:
1881:
1874:
1859:
1855:
1852:Tassi, Paul.
1848:
1840:
1834:
1827:
1822:
1814:
1813:
1808:
1802:
1794:
1788:
1781:
1776:
1768:
1764:
1757:
1751:on github.com
1750:
1745:
1738:
1733:
1726:
1722:
1718:
1713:
1706:
1701:
1695:
1691:
1687:
1684:
1679:
1672:
1670:
1656:
1652:
1645:
1629:
1628:
1623:
1617:
1602:
1601:"SecurityLab"
1596:
1580:
1576:
1570:
1554:
1548:
1537:September 30,
1532:
1528:
1524:
1518:
1511:
1507:
1503:
1500:
1495:
1488:
1483:
1476:
1471:
1464:
1459:
1452:
1447:
1431:
1424:
1408:
1404:
1398:
1382:
1378:
1374:
1367:
1351:
1344:
1338:(May 2, 2012)
1337:
1333:
1328:
1320:
1319:www.online.nl
1316:
1310:
1303:
1299:
1294:
1286:
1280:
1276:
1275:
1267:
1260:
1257:
1253:
1248:
1241:
1236:
1220:
1216:
1210:
1195:
1188:
1184:
1175:
1172:
1170:
1167:
1165:
1162:
1160:
1157:
1154:
1151:
1149:
1146:
1144:
1141:
1139:
1136:
1135:
1126:
1122:
1118:
1114:
1111:
1107:
1103:
1102:
1097:
1094:
1090:
1089:tax write-off
1086:
1082:
1078:
1074:
1070:
1067:
1063:
1059:
1055:
1051:
1047:
1043:
1040:
1036:
1033:
1032:
1027:
1023:
1019:
1018:
1013:
1010:
1006:
1002:
1001:death threats
998:
994:
990:
986:
982:
978:
974:
973:
968:
965:
961:
957:
953:
950:
946:
945:
940:
939:
934:
933:
928:
925:
921:
915:
914:
910:
907:
903:
902:
898:
895:
891:
887:
884:
883:
881:
880:
875:
874:
869:
866:
862:
858:
854:
850:
849:
844:
840:
839:
832:
829:
821:
810:
807:
803:
800:
796:
793:
789:
786:
782:
779: –
778:
774:
773:Find sources:
767:
763:
757:
756:
751:This section
749:
745:
740:
739:
731:
729:
728:
723:
722:
718:
714:
710:
706:
705:public domain
702:
698:
685:
681:
676:
672:
668:
667:
662:
661:
658:
657:
652:
648:
644:
640:
637:
633:
629:
625:
622:
618:
614:
613:
608:
607:
602:
599:
595:
591:
587:
583:
580:
575:
571:
567:
564:
560:
556:
552:
548:
544:
543:SystemVerilog
540:
536:
532:
528:
523:
519:
516:
515:
510:
509:
504:
501:
497:
494:
490:
487:
483:
479:
476:
472:
469:
465:
461:
458:
454:
450:
447:
443:
441:
436:
433:
429:
426:
425:
420:
417:In 2011, the
416:
413:
409:
405:
401:
399:
394:
391:
387:
384:
380:
376:
373:
369:
365:
361:
358:
354:
350:
346:
343:
339:
335:
334:Cisco Systems
331:
328:
324:
320:
316:
312:
308:
304:
300:
297:
293:
289:
285:
282:
278:
274:
270:
266:
265:
260:
257:
253:
249:
245:
241:
237:
234:
230:
226:
222:
218:
214:
213:
208:
205:
201:
197:
193:
190:
186:
185:
180:
176:
173:
169:
165:
161:
157:
153:
150:
149:
144:
143:
138:
137:
136:
133:
131:
127:
123:
109:
102:
91:
89:
85:
81:
77:
73:
72:internet leak
62:
53:is available.
52:
48:
42:
41:
37:
32:This article
30:
21:
20:
2858:|title=
2835:
2823:|title=
2800:
2790:November 27,
2788:. Retrieved
2784:
2774:
2763:, retrieved
2757:
2751:
2740:, retrieved
2735:
2726:
2713:|title=
2691:. Retrieved
2687:
2678:
2666:. Retrieved
2662:
2652:
2640:. Retrieved
2635:
2614:
2605:
2596:
2587:
2578:
2569:
2557:. Retrieved
2553:the original
2538:
2526:. Retrieved
2512:
2500:. Retrieved
2496:the Guardian
2495:
2486:
2474:. Retrieved
2466:"darkreign2"
2460:
2451:
2450:
2443:. Retrieved
2428:
2418:
2417:
2410:. Retrieved
2406:the original
2395:
2383:. Retrieved
2379:the original
2368:
2359:
2350:
2341:
2332:
2318:
2307:
2298:
2286:. Retrieved
2282:
2272:
2263:
2253:
2244:
2234:
2225:
2215:
2205:February 28,
2203:. Retrieved
2193:
2181:. Retrieved
2177:
2168:
2156:. Retrieved
2153:Ars Technica
2152:
2142:
2130:. Retrieved
2128:(in Russian)
2125:
2116:
2104:. Retrieved
2102:(in Russian)
2099:
2090:
2080:February 15,
2078:. Retrieved
2074:
2064:
2052:. Retrieved
2048:
2038:
2026:. Retrieved
2018:Dark Reading
2017:
2008:
1996:. Retrieved
1992:
1982:
1970:. Retrieved
1961:
1951:
1939:. Retrieved
1935:
1925:
1913:. Retrieved
1908:
1899:
1887:. Retrieved
1883:
1873:
1861:. Retrieved
1857:
1847:
1833:
1821:
1810:
1801:
1787:
1775:
1756:
1744:
1732:
1712:
1700:
1678:
1666:
1659:. Retrieved
1655:the original
1644:
1632:. Retrieved
1627:Ars Technica
1625:
1616:
1604:. Retrieved
1595:
1583:. Retrieved
1579:the original
1569:
1557:. Retrieved
1547:
1535:. Retrieved
1531:the original
1526:
1517:
1494:
1482:
1470:
1458:
1446:
1436:September 5,
1434:. Retrieved
1423:
1413:February 14,
1411:. Retrieved
1406:
1397:
1385:. Retrieved
1376:
1366:
1354:. Retrieved
1343:
1327:
1318:
1309:
1293:
1273:
1266:
1258:
1256:The Atlantic
1247:
1235:
1223:. Retrieved
1218:
1209:
1197:. Retrieved
1187:
1124:
1100:
1072:
1029:
1022:fifth season
1015:
970:
944:Midnight Sun
942:
936:
930:
911:
899:
885:
877:
871:
846:
824:
815:
805:
798:
791:
784:
772:
760:Please help
755:verification
752:
727:Dark Reign 2
725:
719:
694:
674:
670:
664:
654:
636:torrent file
620:
610:
604:
512:
506:
455:under a non-
446:X-Ray Engine
438:
422:
396:
307:Windows 2000
280:
262:
216:
210:
182:
177:Around 1996
146:
140:
134:
119:
71:
69:
56:
51:Editing help
33:
2502:October 28,
2470:Google Code
1998:October 25,
1941:October 25,
1915:October 25,
1889:October 25,
1661:November 7,
1387:December 1,
1356:October 20,
985:Trey Parker
932:If I Did It
818:August 2020
734:Other leaks
709:open-source
701:end-of-life
697:abandonware
449:source code
419:source code
404:source code
256:counterfeit
225:Gabe Newell
217:Half-Life 2
212:Half-Life 2
204:Microsoft's
168:source code
84:source code
2875:Categories
2765:October 9,
2742:October 9,
2693:October 9,
2668:October 9,
2642:October 9,
2476:August 19,
2445:August 13,
2412:August 31,
2183:October 7,
2158:October 7,
2028:January 7,
1352:. Gamespot
1336:kotaku.com
1225:August 20,
1199:August 20,
1180:References
1143:GlobaLeaks
1077:Scooby-Doo
1039:Adult Swim
997:first part
993:two parter
989:Matt Stone
972:South Park
788:newspapers
721:Falcon 4.0
717:video game
615:developer
570:Windows XP
496:bootloader
482:Windows 10
432:Solaris 11
398:EVE Online
379:Pirate Bay
372:BitTorrent
357:pcAnywhere
281:Lineage II
269:California
264:Lineage II
108:music leak
101:Music leak
94:Music leak
2736:Knowledge
2615:The Verge
2559:April 19,
2342:Cybernews
2288:March 10,
2283:SpamTitan
2075:The Verge
2049:Eurogamer
1993:ZDNet.com
1972:August 7,
1863:April 24,
1407:CNN Money
1377:Eurogamer
1219:MobyGames
1174:WikiLeaks
1148:News leak
1125:teenagers
1110:Blumhouse
1060:supplier
975:episode "
843:Microsoft
612:Witcher 3
579:ISO image
530:occurred.
349:Anonymous
347:In 2006,
319:euphemism
315:profanity
59:July 2021
2849:cite web
2814:cite web
2703:cite web
2663:MovieWeb
2549:Geek.com
2528:April 3,
2439:slashdot
2385:June 28,
2022:Archived
1966:Archived
1767:Phoronix
1721:Phoronix
1686:Archived
1634:June 15,
1606:June 15,
1510:PC World
1502:Archived
1381:Archived
1304:7 (2013)
1240:DragonII
1132:See also
888:for the
868:Nintendo
572:SP1 and
555:Intel ME
353:Symantec
327:Mainsoft
323:exploits
311:Kuro5hin
296:fan-made
221:compiled
80:software
76:internet
2309:Polygon
2178:Twitter
2132:June 7,
2106:June 7,
2054:June 7,
1936:Polygon
1749:xray-16
1585:July 3,
1559:July 3,
1066:MacBook
802:scholar
527:Pokémon
464:AmigaOS
207:Outlook
184:FIFA 97
1858:Forbes
1812:GitHub
1694:GitHub
1281:
1261:(2000)
1104:film.
1053:years.
1037:, but
864:cases.
804:
797:
790:
783:
775:
707:or as
684:Yandex
671:GTA VI
650:Claro.
643:NVIDIA
628:Twitch
586:Nissan
563:SpaceX
475:Presto
453:GitHub
408:GitHub
366:and a
292:Nvidia
273:NCSoft
196:hacker
88:albums
34:is in
1058:Apple
1003:from
954:2010
861:Linux
809:JSTOR
795:books
675:GTA V
632:4chan
598:ZDNet
539:Intel
500:Apple
493:iBoot
242:Inc.
200:Valve
191:disc.
187:on a
164:l3enc
40:prose
2862:help
2827:help
2792:2023
2767:2023
2744:2023
2718:help
2695:2023
2670:2023
2644:2023
2561:2015
2530:2014
2504:2020
2478:2013
2447:2013
2441:.org
2414:2014
2387:2016
2290:2022
2207:2022
2185:2021
2160:2021
2134:2021
2108:2021
2082:2021
2056:2021
2030:2021
2000:2020
1974:2020
1943:2020
1917:2020
1891:2020
1865:2020
1737:xray
1663:2015
1636:2015
1608:2015
1587:2009
1561:2009
1539:2018
1438:2013
1415:2007
1389:2019
1358:2021
1279:ISBN
1227:2024
1201:2024
1108:and
1079:and
1028:for
987:and
906:ESRB
781:news
609:and
511:and
498:for
486:OEMs
412:DMCA
342:IPv6
288:3dfx
250:and
219:was
189:demo
130:bugs
82:and
36:list
1723:by
1719:on
1692:on
1669:CCP
1508:on
1254:on
1087:as
1050:CBS
977:201
890:Wii
764:by
590:Git
551:git
537:of
421:of
355:'s
229:FBI
160:MP3
154:As
126:FTP
124:or
122:CVS
70:An
2877::
2853::
2851:}}
2847:{{
2818::
2816:}}
2812:{{
2783:.
2734:,
2707::
2705:}}
2701:{{
2686:.
2661:.
2634:.
2623:^
2613:.
2595:.
2577:.
2547:.
2521:.
2494:.
2468:.
2449:.
2437:.
2416:.
2358:.
2340:.
2306:.
2281:.
2262:.
2243:.
2224:.
2176:.
2151:.
2124:.
2098:.
2073:.
2047:.
2016:.
1991:.
1964:.
1960:.
1934:.
1907:.
1882:.
1856:.
1809:.
1765:.
1665:.
1624:.
1525:.
1405:.
1379:.
1375:.
1317:.
1217:.
935:,
730:.
557:,
444:s
402:s
106:A
2864:)
2860:(
2843:.
2829:)
2825:(
2808:.
2794:.
2720:)
2716:(
2697:.
2672:.
2646:.
2563:.
2532:.
2506:.
2480:.
2389:.
2292:.
2266:.
2247:.
2228:.
2209:.
2187:.
2162:.
2136:.
2110:.
2084:.
2058:.
2032:.
2002:.
1976:.
1945:.
1919:.
1893:.
1867:.
1815:.
1769:.
1638:.
1610:.
1589:.
1563:.
1541:.
1440:.
1417:.
1391:.
1360:.
1321:.
1287:.
1229:.
1203:.
1011:.
831:)
825:(
820:)
816:(
806:·
799:·
792:·
785:·
758:.
581:.
470:.
459:.
442:'
400:'
374:.
329:.
283:.
235:.
103:.
61:)
57:(
43:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.