• ricecake@sh.itjust.works
    link
    fedilink
    arrow-up
    2
    ·
    5 months ago

    Geo guessing is related to open source intelligence techniques, and it’s pretty easy to get surprisingly good at it.
    People who are good at it can take a picture of someone’s room and deduce enough about them (sometimes) to be able to get their name, address and phone number.

    It being automatic is pretty cool, but you were already leaking the information to anyone interested.

    https://www.sans.org/blog/geolocation-resources-for-osint-investigations/

    https://youtu.be/p7_2ZA1HHMo?si=O19_7LA3SoyvZEm1

  • Snot Flickerman@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    0
    ·
    5 months ago

    This Just In: Most photos uploaded to the internet are not stripped of their metadata, and one of the common things kept in metadata is… (drumroll please)… your GPS coordinates.

    This is a lot less interesting than it seems to be at first glance, imho.

    • kromem@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      5 months ago

      Literally just after talking about how people are spouting confident misinformation on another thread I see this one.

      Twitter: Twitter retains minimal EXIF data, primarily focusing on technical details, such as the camera model. GPS data is generally stripped.

      Yes, this is a privacy thing, we strip the EXIF data. As long as you’re not also adding location to your Tweet (which is optional) then there’s no location data associated with the Tweet or the media.

      People replying to a Twitter thread with photos are automatically having the location data stripped.

      God, I can’t wait for LLMs to automate calling out well intentioned total BS in every single comment on social media eventually. It’s increasing at a worrying pace.

        • Seasm0ke@lemmy.world
          link
          fedilink
          arrow-up
          0
          arrow-down
          1
          ·
          5 months ago

          Back in like 2006 or 7 steganography was used in obscure corners of the internet ( like insurgen.cc, an early anonymous holdout that got broken up by the feds) to pass around hacking tools. You’d unzip the dangerous kitten photo with winrar and extract a set of hacking tools. One I remember passed around widely was the low orbiting ion cannon the /b used to ddos scientologists.