{"id":25257,"date":"2018-02-22T00:50:20","date_gmt":"2018-02-22T00:50:20","guid":{"rendered":"https:\/\/www.smartdatacollective.com\/?p=25257"},"modified":"2018-02-24T11:47:03","modified_gmt":"2018-02-24T11:47:03","slug":"big-data-small-details-metadata-creates-security-risks","status":"publish","type":"post","link":"https:\/\/www.smartdatacollective.com\/big-data-small-details-metadata-creates-security-risks\/","title":{"rendered":"Big Data, Small Details: How Metadata Creates Security Risks"},"content":{"rendered":"<p>What happens when you put a photograph online? In most cases, not much happens at all. It simply exists in cyberspace \u2013 permanently \u2013 with the trillions of other user-generated images. And the fact is that, besides there being an overwhelming number of photos on the web, most of them don\u2019t contain any valuable information. What information there is, though, is hidden in the metadata.<\/p>\n<p>With the rise of big data, that metadata is suddenly becoming valuable. If a picture is worth a thousand words, the metadata is infinitely more so. And now it could pose a security risk.<\/p>\n<h2><strong>What\u2019s In The Metadata?<\/strong><\/h2>\n<p>There are many kinds of information tucked into your photos\u2019 metadata. One of the primary pieces of information, though, is a <a href=\"http:\/\/photometadata.org\/META-101-metadata-types\" data-wpel-link=\"external\" rel=\"external noopener noreferrer ugc\">GPS position as found in the Exif file<\/a>. Whenever you take a picture with your phone, it embeds your location data into the file. If you upload that photo immediately \u2013 or regularly upload from a private location such as your home \u2013 then you reveal your whereabouts. It\u2019s why actress Emma Watson doesn\u2019t take photos with fans anymore; the security risk is too great.<\/p>\n<p>Photo metadata typically becomes more complex over time as users modify them. There are fields for titles, photographer name, copyright information, and more. The more you do with a photo before you upload it, the more information that goes with it.<\/p>\n<h2><strong>A Growing Risk<\/strong><\/h2>\n<p>New technologies like facial recognition software have only increased the dangers associated with photo metadata \u2013 and the risks of photo mining and app breaches more generally. We\u2019ve seen this happen before with shifts in all kinds of technology. User technology takes a step forward, but hackers and data analysts move even more quickly. 110 million people were affected by Target\u2019s 2014 security breach, and we can expect worse. The growth of <a href=\"https:\/\/www.smartdatacollective.com\/big-data-privacy-issues-worry-every-internet-user\/\" data-wpel-link=\"internal\">big data comes with bigger security risks<\/a>, but with everything it\u2019s capable of, we\u2019re compelled to keep moving forward. Our role, then, is to identify the greatest risks and minimize them.<\/p>\n<h2><strong>Identifying Trouble Points<\/strong><\/h2>\n<p>The easiest way to identify image-based security risks is to ask where we use, manipulate, and store images. The average person, for example, might upload their images to Facebook and Instagram, but also to printing sites to <a href=\"https:\/\/www.dinkleboo.com\/photo-products\/photo-books.html\" data-wpel-link=\"external\" rel=\"external noopener noreferrer ugc\">make family photo albums<\/a> or create holiday cards. All of these platforms have the potential to be easy targets for data theft, but for the most part, they\u2019re interested in metadata for use in targeted marketing.<\/p>\n<p>Another place people commonly upload their photos to is cloud storage, such as Google Drive, Box, and or Microsoft OneDrive. We want to believe these systems are secure, and for the most part they are. But each has its own agenda. Box, for example, recently partnered with Google Cloud Vision to <a href=\"http:\/\/www.cloudpro.co.uk\/saas\/6989\/box-intros-image-recognition-to-cloud-service-with-google\" data-wpel-link=\"external\" rel=\"external noopener noreferrer ugc\">apply image recognition to photo uploads<\/a>. Their aim is to streamline workflows by extracting relevant business data across in-company user uploads. But what\u2019s to stop them from analyzing your private images? What would they learn about your family and friends?<\/p>\n<p>Data analysis gets smarter every day. Facebook has a patent on technology that identifies people who may know each other by analyzing photo metadata <a href=\"https:\/\/gizmodo.com\/facebook-knows-how-to-track-you-using-the-dust-on-your-1821030620\" data-wpel-link=\"external\" rel=\"external noopener noreferrer ugc\">and comparing dust and scratches on the camera lens<\/a>. People who upload pictures with similar file names and matching lens patterns may be connected socially \u2013 or maybe they\u2019ve never met or were at the same public event. Facebook may still try to connect them.<\/p>\n<p>The worst-case scenario in metadata mining involves stalking and harassment \u2013 and it\u2019s already happened. Want to find someone at home? Look at the Exif data on their personal photos and you can be outside their house or job in no time. The fact is, unless upload platforms automatically erase Exif and other data, or users begin to aggressively eliminate it before posting their images, then that information is out there. And you can\u2019t erase lens dust or scratch patterns. Data miners will always find a way to learn more about you. The best we can do is erase what we have access to. That\u2019s security first.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What happens when you put a photograph online? In most cases, not much happens at all. It simply exists in cyberspace \u2013 permanently \u2013 with the trillions of other user-generated images. And the fact is that, besides there being an overwhelming number of photos on the web, most of them don\u2019t contain any valuable information. [&hellip;]<\/p>\n","protected":false},"author":518,"featured_media":25374,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"Big Data, Small Details: How Metadata Creates Security Risks","_seopress_titles_desc":"With the rise of big data, that metadata is suddenly becoming valuable. If a picture is worth a thousand words, the metadata is infinitely more so. And now it could pose a security risk.","_seopress_robots_index":"","footnotes":""},"categories":[48,13],"tags":[252,1676,425,2636],"class_list":{"0":"post-25257","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-big-data","8":"category-security","9":"tag-big-data","10":"tag-meta-data","11":"tag-metadata","12":"tag-security-risks"},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.smartdatacollective.com\/wp-json\/wp\/v2\/posts\/25257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.smartdatacollective.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.smartdatacollective.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.smartdatacollective.com\/wp-json\/wp\/v2\/users\/518"}],"replies":[{"embeddable":true,"href":"https:\/\/www.smartdatacollective.com\/wp-json\/wp\/v2\/comments?post=25257"}],"version-history":[{"count":2,"href":"https:\/\/www.smartdatacollective.com\/wp-json\/wp\/v2\/posts\/25257\/revisions"}],"predecessor-version":[{"id":25375,"href":"https:\/\/www.smartdatacollective.com\/wp-json\/wp\/v2\/posts\/25257\/revisions\/25375"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.smartdatacollective.com\/wp-json\/wp\/v2\/media\/25374"}],"wp:attachment":[{"href":"https:\/\/www.smartdatacollective.com\/wp-json\/wp\/v2\/media?parent=25257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.smartdatacollective.com\/wp-json\/wp\/v2\/categories?post=25257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.smartdatacollective.com\/wp-json\/wp\/v2\/tags?post=25257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}