Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Read a little about the book here:

Employees are allies, not the adversary

--OR--

Check out the Kickstarter here (click)
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

Photo Safety

You ever watch CSI or NCIS? In one episode there was a missing girl that they needed to find, but all they had to go on was a single photo. They zoomed in on her eye and in the reflection of her eye is the porthole of the boat she was being kept on. A mile away is another boat blocking a roadsign so they digitally move it away so they can see what's behind it.

Of course, they're pushing the limits of fantasy, but there's a lot of truth in it too. I once asked a girl that was selling some furniture to send me a picture. When she did, I looked at the furniture, but also the reflections in the glass where I saw the flash from her camera and her standing in her underwear below that.

While I never told her that I saw her in her underwear, I've told literally thousands of people since then! Unless you want to be in her position of being immortalized forever in a simple mistake, you should learn a little about photo safety.

Backgrounds and Reflections

Here's a nice photo of your house. No worries right?

Well what about your poor neighbor who was minding her business only for you to post a photo of her in the shower.

How about the fact that your state, street, and house number are visible leading them right to your house? Or that the fancy stuff in your garage gives them good reason to target you.

Reflecting street name with house number and state plate visible

Here are several other examples where people didn't pay much attention and ended up embarrassing themselves (WARNING! Adult oriented and probably NSFW).

Screenshots

When creating manuals, help guides, or when looking for help, people post pictures of their screen online, but often don't think about the consequences. Take this example I found in a forum where a guy was asking for help trying to figure out why all his shortcuts looked odd. Of course, this exposes the names of his files, programs, and links. Chances are he didn't want anyone to know just how much he loves the girly twilight phenomenon!

Twilight fan? Really?

Companies don't want hackers to know what operating systems and programs they're using, but a simple screenshot can give that away in seconds. Not only that but many screenshots I've seen have e-mail or calendars open in the background which gives away important dates, names, accounts, etc.

If you can get rid of the sensitive information by cropping out unnecessary parts, do so. Otherwise, you might have to abandon posting the photo at all (unless you're sure there's nothing at all sensitive in the photo).

Reflecto-Porn

I already told you the story of the girl who flashed me without meaning to in her photo. What I didn't tell you yet was how common this actually is! So common that they named it Reflectoporn. Here's one example:

Makes you want to check more carefully before uploading huh?

Meta-Data

If you take a look at this photo, nothing seems wrong. It's a cute girl catching some sun and not much more. Nothing in the background, nothing in the reflections. But what about the EXIF data?

EXIF is a set of data items that are added to a photo and go everywhere the photo goes (it's part of the file). If you put your name into your computer as the user or whenever software asks you, that data could be loaded into the camera and thus the photos.

Example of EXIF data from Flickr

How to know for sure

File properties in Windows

You can check by right-clicking a photo you've taken and clicking on "Properties" then clicking the "Details" tab. Alternatively if you use any real photo editor (not MS Paint) one of the options should be to view and modify EXIF data. Also if you have an account with a photo sharing site like Flickr, you can also just upload a photo there and click the "this photo was taken with [model of camera]" link to see all available data.

But wait. It gets worse. Did you know that some cameras and a LOT of camera phones (iPhones for example) geotag photos? That means that part of the EXIF data is the GPS coordinates where the photo was taken. That allows nifty features like this Google map overlay with tons of persona photos people uploaded pinned to the location they were taken! Neat right?

Photos pinned to where they were taken. Supported with geotagging features.

Why this is bad

So now you can know where any pictures are taken. Remember that photo of the cute girl up there? Maybe some creep decides he'd like to know where she lives and now, with a click or two, he can. Just put the GPS data into Google maps!

What about our soldiers out protecting us the best they can wherever they are. It's kind of important that people not know where they are or the camp they're in or the boat they're on. As soon as someone takes a candid shot and uploads it, they may give away their position and literally be dead by morning.

1: Snap. 2: Upload. 3: Dead? We hope not!

Whether you're a relative of the military, a supporter, or military yourself, don't underestimate the dangers of giving your position away!

What to do

Photo editors can remove EXIF data and you can click on individual data items in the Windows property screen and delete them as well (though this takes time). In Windows 7, you can click a link in the properties window labeled "Remove Properties and Personal Information". Another simpler method is to disable geotagging in your camera/phone in the first place!


Share This

Have a Comment or Question?

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

computer security Tutorial
|INDEX|next: Spyware Scanners

Security Software

Make sure you have a up-to-date Anti-Virus Program to protect you against bad websites or files.
Sometimes spyware gets in your computer and the anti-virus won't stop it. Use a spyware scanner to find and remove spyware and adware.
Use a software firewall to detect bad code on your computer when it tries to connect to the Internet.
Always keep your system up to date with security patches or none of the rest of your security software will matter.
Use an encryption tool to protect your important data when storing or transmitting it.
Switch to Firefox for your web browsing and you'll be better protected from Internet threats.

Safe Computing Practices

Don't get tricked by fake alerts or clever webpages into downloading viruses or spyware!

... or check out any of my other guides and tutorials by clicking here!

Anti-Virus

A virus can come from files, e-mails, web pages, or even devices you plug in (like thumbdrives or printers) and destroy your files or your computer once they get in. An anti-virus is software designed to detect and prevent that from happening.

[Click for full description]

Spyware Scanners

Learn how to detect and remove spyware and adware using a free scanning tool.

[Click for full description]

Software Firewall

Learn what a firewall is and why you want one on your computer.

[Click for full description]

Operating System Updates

Make sure to keep your operating system up-to-date with security patches or else none of the rest of your security software will be able to protect you.

[Click for full description]

File Encryption

Learn how to protect your important files on your computer or when transmitting them with free tools for file encryption.

[Click for full description]

Mozilla Firefox - Internet Browser

There are many browser choices out there. Read why I think Firefox is one of the best.

[Click for full description]

Fake Alerts

Maybe you've done everything right and you're computer is sufficiently fortress-like, but then you or someone in your family falls for a simple scam that tricks them into directly installing the bad guy's virus! Learn how to spot and ignore fakes!

[Click for full description]