All of the following are examples of real security and privacy risks EXCEPT?