too many and not limited to 1- keys replication 2- data scrapping 3- illegal accesses 4- impersonation 5- privacy violations 6- human rights abuses etc