What they're not telling you: # Trump Mobile Exposed Thousands of customers-personal-data-to-hike-air-fares.html" title="JetBlue Sued For Allegedly Using Customers' Personal Data To Hike Air Fares" style="color:#1a1a1a;text-decoration:underline;text-decoration-style:dotted;font-weight:500;">Customers' Personal Data—and Still Won't Name the Company Responsible Trump Mobile confirmed it left the names, email addresses, mailing addresses, phone numbers, and order identifiers of thousands of customers publicly accessible on the internet with no password protection, no encryption, and no apparent security controls—then refused to identify which third-party company caused the breach. The exposure came to light when two content creators, Coffeezilla and penguinz0, received alerts from a researcher that their personal information was discoverable through a simple web search. Both men attempted to notify Trump Mobile of the vulnerability.
What the Documents Show
Their warnings were ignored. Only after the exposure reached social media did Chris Walker, Trump Mobile's spokesperson, confirm to TechCrunch that customer data had indeed been exposed. Walker's statement contained a critical evasion: he claimed the exposure was "linked to a third-party platform provider that supports certain Trump Mobile operations" but refused to name the company. This refusal matters. It means the public cannot assess which vendor failed, whether other companies use the same vendor, or whether regulators should investigate that specific third party's security practices across its entire customer base.
Follow the Money
Walker also attempted narrative containment by asserting there was "no breach of Trump Mobile's network, systems, or infrastructure." This distinction is meaningless to customers. Whether data leaked because Trump Mobile's own systems failed or because they negligently entrusted a third party with unencrypted customer records makes no difference to the people exposed. The data was accessible. The company knew or should have known it was accessible. And they did not disclose it until forced to. Most striking is Trump Mobile's stated uncertainty about whether they even need to notify affected customers.
What Else We Know
Walker said the company is "evaluating whether it needs to notify customers of the exposure of their personal data." This is a question with a known answer under multiple state laws. California's Consumer Privacy Act, for instance, mandates notification when unencrypted personal information is breached or exposed. Other states have similar requirements. That Trump Mobile is still "evaluating" this legal obligation suggests either incompetence or a deliberate delay tactic while they calculate their legal exposure. The researchers and content creators who discovered this exposure did what regulatory agencies should do routinely. They found the vulnerability, reported it responsibly, and escalated when ignored.
Primary Sources
- Source: Hacker News
- Category: Government Secrets
- Cross-reference independently — don't take our word for it.
Disclosure: NewsAnarchist aggregates from public records, API feeds (Federal Register, CourtListener, MuckRock, Hacker News), and independent media. AI-assisted synthesis. Always verify primary sources linked above.