The Post-Hack Period