Exploiting unintended data leakage