“With this data, it is possible to then have a general public listing…and solve it back again into the [data while in the stolen databases] so you've got the title, e-mail and physical handle and cell phone number of [the vendor] and presumably, The situation of the gun,” Troy Hunt, a cybersecurity specialist who runs the popular information