This article is republished from The Conversation under a Creative Commons license. Read the original article here. It is common to hear news reports about large data breaches, but what happens once your personal data is stolen? Our research shows that, like most legal commodities, stolen data products flow through a supply chain consisting of…

Read More