But this is the nature of modern hacks. An inscrutable data dump draws in helpful technologists who want everyone to have access to information, not just sophisticated computer users. Their tools, in turn, attract rubberneckers who can’t help but peek. In the future, other big hacks will almost certainly follow the same pattern. First comes the leak. Then, the tools to parse it. Then, the panic.

— Kashmir Hill