The infamous hacking collective known as Antisec has created one of the largest privacy disasters yet --  they've obtained 1,000,001 Apple Unique Device Identifiers (UDIDs) from an FBI breach. To make matters worse, this is only part of a larger list of 12 million UDIDs that they also managed to get their hands on.

Plus, not only did the list contain the UDIDs, but they also had the user's cell phone number, email address and street address on the file as well.

While it's frightening to think of the government having that sort of information on Apple users, most people are probably wondering how Antisec hacked the FBI in the first place. According to the group, back in March 2011 they breached a Special Agent's Dell notebook using the program AtomicReferenceArmy vulnerability for Java, spotted a file called "NCFTA_iOS_devices_intel.csv" and upon opening it, saw that it was a list of over 12, 367, 232 Apple iOS devices, which included the UDIDs previously mentioned.

It's possible that the NCFTA refers to the National Cyber-Forensics and Training Alliance, which is a non-profit organization that teaches both the public and private sectors how to fight off and lessen the possibility of cyber crimes, but it's still chilling to think of this kind of knowledge in the hands of the government.

If you're worried, an enterprising young man named Sean MacGuire has created a tool that you can use to see if your name is on the released list. Just be warned that there's a larger list that AntiSec hasn't released yet so even if your name doesn't appear now, it may appear if they make the second list public.