Meta Data can get you killed
Share on Facebook
Share on Twitter
Share on Google+
Share on Reddit
Share on Email

Photo Credit: Shutterstock

You may think you are more tech savvy than Wendell Smith and have scrubbed that erring author metadata from that document you want to put out there. But is that all of it? Here are some ways metadata leak out more than you think

Photo Credit: Shutterstock

Photo Credit: Shutterstock

By Stephen Igwue

Well, not really but it could put a serious halt in your plans at evading Big Brother or affect your credibility and reputation.

Recently, the Wendell Smith episode dominated the Nigerian internet scene.

What happened?

A a Microsoft Word document’s author metadata contained some incriminating information.

What is Metadata?

Metadata is data about data.

It describes the content, context and other qualities of original data thus increasing the quality and enhancing its understanding.

For example, a webpage may include metadata specifying what language it is written in, what tools were used to create it, and where to go for more on the subject, allowing browsers to automatically improve the experience of users.

You may think you are more tech savvy than Wendell Smith and have scrubbed that erring author metadata from that document you want to put out there. But is that all of it? Here are some ways metadata leak out more than you think.

Applications

Not only Microsoft Word tags its files with descriptive data. People creating PDF files tend to forget they also have author and subject metadata fields. Several papers, publications and other media in this form show improperly scrubbed identifying metadata.

Not only desktop applications tag the files they produce, mobile apps do too. Remember Oprah’s famous tweet about her love for Microsoft’s Surface from an iPad? Mobile apps such as Twitter, and Facebook tag your tweets and posts with metadata such as your phone type and location.

Websites

During the TechCabal Battlefield, before details about the tech startup contestants were posted, there was speculation that Callbase was eerily similar to Fonenode.

How did we confirm that?

whois lookup on both domains.

You may have worked around this by using different data when buying domains and forget that there are tools which can tell if two sites gather user stats via the same Google Analytics account.

Pictures

Remember John McAfee? He was on the run from a police investigation and allowed his picture to be taken by a journalist during an interview.

What he didn’t know was that the camera embedded location data in the picture.

Big Oops!

Music

A recent article on Torrentfreak was about a music group which made available for its fans, copies of their own music.

Small problem though, the tracks seemed to have been downloaded from a pirate site. How was that information gleaned? Metadata in the mp3 files.

There are many more examples which show metadata behaving like Freudian slips.

Technology really wants to tell the truth (after all, progressbars don’t lie). But before you think you are far beyond these slips and think every identifying information has been scrubbed, remember that the path to that source code you are compiling right now might be embedded somewhere in your compiler’s output.

This post was originally published on iAfrikan

Photo Credit: Shutterstock/ CSS code

Share on:Share
Share on Facebook
Share on Twitter
Share on Google+
Share on Reddit
Share on Email
iAfrikan

About iAfrikan


iAFRIKAN is an independent technology (Information & Communications Techology – ICT) analysis, news and reviews site.

We focus mainly on technology content relating to Africa and believe that technology stories and knowledge from Africa are best narrated by those in the trenches, working daily in the technology industry on the continent.

The team is led by Tefo Mohapi and comprises some of the top technically competent professionals on the continent.

We launched iAFRIKAN on March 4, 2014 and prior to that announced the publishing of our anual Technology in Africa – 2014 Digest on February 6, 2014.

More reports, publications, digital products, events and conferences are planned and in the pipeline.

More Goodies From Industry


Socially-focused startups tackle rural Mexico’s energy problems

Endless Lima traffic spawns innovative startups

New concept: Booking meeting rooms at the heart of Tel Aviv by the hour