{"id":28338,"date":"2019-08-09T08:15:06","date_gmt":"2019-08-09T08:15:06","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\/"},"modified":"2019-08-09T08:15:06","modified_gmt":"2019-08-09T08:15:06","slug":"talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\/","title":{"rendered":"Talk about unintended consequences: GDPR is an identity thief&#8217;s dream ticket to Europeans&#8217; data"},"content":{"rendered":"<p><strong class=\"trailer\">Black Hat<\/strong> When Europe introduced the <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/05\/25\/gdprmageddon_do_you_think_its_all_over_its_not\/\" rel=\"noopener noreferrer\">General Data Protection Regulation (GDPR)<\/a> it was supposed to be a major step forward in data safety, but sloppy implementation and a little social engineering can make it heaven for identity thieves.<\/p>\n<p>In a presentation at the Black Hat security conference in Las Vegas James Pavur, a PhD student at Oxford University who usually specialises in satellite hacking, explained how he was able to game the GDPR system to get all kinds of useful information on his fianc\u00e9e, including credit card and social security numbers, passwords, and even her mother&#8217;s maiden name.<\/p>\n<p>&#8220;Privacy laws, like any other infosecurity control, have exploitable vulnerabilities,&#8221; he said. &#8220;If we&#8217;d look at these vulnerabilities before the law was enacted, we could pick up on them.&#8221;<\/p>\n<p>Pavur&#8217;s research started in an unlikely place &#8211; the departure lounge of a Polish airport. After the flight he and his fianc\u00e9e were supposed to travel on was delayed, they joked about spamming the airline with GDPR requests to get revenge. They didn&#8217;t, but it sparked an idea to see what information you could get on other people and Pavur&#8217;s partner agreed to act as a guinea pig for the experiment.<\/p>\n<p>For social engineering purposes, GDPR has a number of real benefits, Pavur said. Firstly, companies only have a month to reply to requests and face fines of up to 4 per cent of revenues if they don&#8217;t comply, so fear of failure and time are strong motivating factors.<\/p>\n<p>In addition, the type of people who handle GDPR requests are usually admin or legal staff, not security people used to social engineering tactics. This makes information gathering much easier.<\/p>\n<p>Over the space of two months Pavur sent out 150 GDPR requests in his fianc\u00e9e&#8217;s name, asking for all and any data on her. In all, 72 per cent of companies replied back, and 83 companies said that they had information on her.<\/p>\n<p>Interestingly, 5 per cent of responses, mainly from large US companies, said that they weren\u2019t liable to GDPR rules. They might be in for a rude shock if that comes before the courts.<\/p>\n<p>Of the responses, 24 per cent simply accepted an email address and phone number as proof of identity and sent over any files they had on his fianc\u00e9e. A further 16 per cent requested easily forged ID information and 3 per cent took the rather extreme step of simply deleting her accounts.<\/p>\n<p>A lot of companies asked for her account login details as proof of identity, which is actually a pretty good idea, Pavur opined. But when one gaming company tried it, he simply said he&#8217;d forgotten the login and they sent it anyway.<\/p>\n<p>The range of information the companies sent in is disturbing. An educational software company sent Pavur his fianc\u00e9e&#8217;s social security number, date of birth and her mother&#8217;s maiden name. Another firm sent over 10 digits of her credit card number, the expiration date, card type and her postcode.<\/p>\n<p>A threat intelligence company &#8211; not Have I been Pwned &#8211; sent over a list of her email addresses and passwords which had already been compromised in attacks. Several of these still worked on some accounts &#8211; Pavur said he has now set her up with a password manager to avoid repetition of this.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2016\/12\/06\/shutterstock_forgetful.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"gdpr\"><\/p>\n<h2 title=\"Sprint Education plugged digit-diddling URL snafu quickly\">Marketing biz bares folks&#8217; data in the act of asking for their GDPR comms preferences<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2019\/07\/22\/sprint_education_gdpr_email_fail\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>&#8220;An organisation she had never heard of, and never interacted with, had some of the most sensitive data about her,&#8221; he said. &#8220;GDPR provided a pretext for anyone in the world to collect that information.&#8221;<\/p>\n<p>Fixing this issue is going to take action from both legislators and companies, Pavur said.<\/p>\n<p>First off, lawmakers need to set a standard for what is a legitimate form of ID for GDPR requests. One rail company was happy to send out personal information, accepting a used envelope addressed to the fianc\u00e9e as proof of identity.<\/p>\n<p>He suggested requesting account login details were a good idea, but there&#8217;s always the possibility that such accounts have been pwned. A driver&#8217;s licence would also be a good alternative, although fake IDs are rife.<\/p>\n<p>Companies should be prepared to refuse information requests unless proper proof is required, he suggested. It may come to a court case, but being seen to protect the data of customers would be no bad thing. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1842\/-7432\/balancing-consumerization-and-corporate-control?td=wptl1842\">Balancing consumerization and corporate control<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/08\/09\/gdpr_identity_thief\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Revenge plan morphs into data leak discovery Black Hat\u00a0 When Europe introduced the General Data Protection Regulation (GDPR) it was supposed to be a major step forward in data safety, but sloppy implementation and a little social engineering can make it heaven for identity thieves.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":28339,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-28338","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Talk about unintended consequences: GDPR is an identity thief&#039;s dream ticket to Europeans&#039; data 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Talk about unintended consequences: GDPR is an identity thief&#039;s dream ticket to Europeans&#039; data 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-09T08:15:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Talk about unintended consequences: GDPR is an identity thief&#8217;s dream ticket to Europeans&#8217; data\",\"datePublished\":\"2019-08-09T08:15:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\\\/\"},\"wordCount\":761,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\\\/\",\"name\":\"Talk about unintended consequences: GDPR is an identity thief's dream ticket to Europeans' data 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data.jpg\",\"datePublished\":\"2019-08-09T08:15:06+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Talk about unintended consequences: GDPR is an identity thief&#8217;s dream ticket to Europeans&#8217; data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Talk about unintended consequences: GDPR is an identity thief's dream ticket to Europeans' data 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\/","og_locale":"en_US","og_type":"article","og_title":"Talk about unintended consequences: GDPR is an identity thief's dream ticket to Europeans' data 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-08-09T08:15:06+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Talk about unintended consequences: GDPR is an identity thief&#8217;s dream ticket to Europeans&#8217; data","datePublished":"2019-08-09T08:15:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\/"},"wordCount":761,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\/","url":"https:\/\/www.threatshub.org\/blog\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\/","name":"Talk about unintended consequences: GDPR is an identity thief's dream ticket to Europeans' data 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data.jpg","datePublished":"2019-08-09T08:15:06+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/talk-about-unintended-consequences-gdpr-is-an-identity-thiefs-dream-ticket-to-europeans-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Talk about unintended consequences: GDPR is an identity thief&#8217;s dream ticket to Europeans&#8217; data"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=28338"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28338\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/28339"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=28338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=28338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=28338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}