Spoofs of the Trojan Room coffee machine ranged from the Hyper Text Coffee Pot Control Protocol, a 1998 April Fools' Day specification for a communication protocol, to the 2002 video game Hitman 2: Silent Assassin, in which the player can destroy a decoy "coffee camera" in a kitchen.
Related: Pennsylvania Man Is Charged in Celebrity Hack, Reaches Plea Deal He is one of three men who have been convicted of leaking private celebrity photos, and is personally responsible for illegally accessing more than 100 accounts, prosecutors said.
But when it comes to staying safe, there's one place where being guarded is not guaranteed whether you’re a grandma or a gazillionaire: cyber security.
The internet went nuts earlier this year when someone on Twitter noticed Facebook co-founder Mark Zuckerberg applies a piece of tape over his web cam — a low-key security trick to act as the last line of defense against potential cyber spies.
Sure, it's "fundamentally safer" to store something on a physical device behind a password, he said, but there isn't anything "inherently less secure about the cloud." "Companies like Apple and Google put a lot of effort to make sure they are not vulnerable to security issues.
The issue is that if your password itself is something someone can access, they can bypass all that security and get that sensitive data," he said.