-
Hacking into others system and finding out what they do
-
Internet service provider collecting personal information of it clients and giving it to third parties
-
hacking others mobile to find call logs information
-
Browsers collecting information about popular site from users clicks