A good reminder that leaks from unsuspecting apps can be used to cross-reference data and find valuable intel