Opsec Post Part 3 - 4 By Iceland
by icelandaa - Thursday March 13, 2025 at 01:58 AM
#1
Hello all login into another account having main account problems but its all fine always lets get into the daily opsec post todays will be metdata!


A seemingly ordinary file or photo sent to a friend may contain information that the sender didn't intend to share at all. So a photo with a kitty, in addition to the information contained in the picture, can tell the recipient about where and when it was taken and even from what device. The reason we can see how dangerous it is from the alpha bay owner he had a image containing his real life email in a metadata of one of his images from a signup email he got sent to jail in Thailand and killed himself. Moral of the story? Clean your fucking images!


What is EXIF metadata?

EXIF (Exchangeable Image File Format) - is additional information encrypted in the photo which allows you to find out a lot of details from a regular photo: from the camera it was taken with to the focal length. As a rule, photographers use them to repeat successful photos: it's enough to set the right values, rather than trying to "play" with the camera settings. EXIF data exist not only inside graphic files. It can be found in videos, documents, music, etc. It's assigned automatically when the file is created.

File metadata includes:
  • Camera model
  • Date and exact time of shooting
  • Information about the copyright
  • ISO light sensitivity values
  • Camera sensor size
  • Photo orientation
  • Aperture settings
  • Frame thumbnail
  • Frame resolution
  • Geometry
  • etc.

An example of displaying EXIF metadata in the Exif Pilot app.


The Danger of Metadata.


Everything we do online: send photos, files, publish posts, create music selections, make purchases and so on, in addition to the declared information, leaves behind us the so-called digital footprints. They are formed precisely due to metadata. Often, especially by ordinary people, this fact is ignored and with it the threat of illegal actions grows. By studying, for example, photos on social networks the offender can build a standard route for the victim as well as find out his favorite places and preferences. Based on this data, you can prepare a phishing attack or use a social engineering method.

It should not be forgotten that the threat of metadata falling into the hands of cybercriminals for companies is no less or even greater than for ordinary users. Often metadata can help criminals decrypt stolen information. So, not understanding from the contents of the file what exactly it's about and how it can be used cybercriminals turn to metadata which makes it possible to quickly deal with stolen goods and sell them. Or, for example, criminals can use meta-information to find out what software is installed in the organization and prepare a more accurate attack based on this.


How to see EXIF?

The metadata cannot be seen directly in the file itself - you need to open the context menu and go to the properties section.
  • Browsers: Metadata can also be viewed online using the Exif Viewer extension (available for Google Chrome and Mozilla users).
  • Windows: Right-click on the file, select "Properties" - "Details". The window that opens will contain the metadata of the photo.
  • Android: On your smartphone or tablet you need to open the Google Photos app. The EXIF data will be located under the "i" icon.
  • MAC: Click to select the file, then press "Command + I". The "EXIF" tab will contain the data you need.

How to delete?

For Windows, you can use EXIF Purge - a small portable application to remove metadata from multiple images at once:

For Linux, there's a program Metadata Cleaner - that allows you to remove metadata from different types of files:


Conclusion.

You can remove metadata using apps, online tools, basic device settings and settings when uploading. But don't forget that metadata can be useful, especially when it comes to work moments. For example, metadata can help determine in which editor and software the file was created, it's working name and the date it was created. This can provide an opportunity to convert the file or use it on a new system. In addition, even an ordinary user needs to remember where and when a file was created or a photo was taken. But don't forget that in the absence of metadata protection the same information can be obtained by an attacker and used against you. For example, finding out the software version and other details about the devices used by the company will be very useful when selecting cyberattack tools.
Reply
#2
real @Iceland or impersonating him? Iceland

mzkzBigger

Reply
#3
(03-13-2025, 02:15 AM)mozkoz Wrote: real @Iceland or impersonating him?  Iceland

real lol you can ask @Tanaka lost access to the iceland account due to a encrypted hardrive failure i have messaged admins asking for a password reset also lost 4k in monero so very sad but i had a backup to my cleaned monero on a usb
Reply
#4
(03-13-2025, 04:47 AM)icelandaa Wrote:
(03-13-2025, 02:15 AM)mozkoz Wrote: real @Iceland or impersonating him?  Iceland

real lol you can ask @Tanaka lost access to the iceland account due to a encrypted hardrive failure i have messaged admins asking for a password reset also lost 4k in monero so very sad but i had a backup to my cleaned monero on a usb

I hope the mod resets your password for you soon.
Tox ID: 63AF3303793BB0D7DBAB10320127D656F5075CFD38AF56FEB8678365EDDA3F6CFF2DBD5DE9C7
Reply
#5
Thank You me too
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  The Ultimate OPSEC Guide for the Hyper-Vigilant Blue_Hawk 44 3,011 Yesterday, 03:40 PM
Last Post: jodjahsjdhak
  Emontions The Worst OPSEC Mistake Iceland 18 923 Yesterday, 10:32 AM
Last Post: Art10n
  The Art Of OPSEC by Zian XTN 80 6,444 08-08-2025, 01:57 PM
Last Post: jodjahsjdhak
  Basic OPSEC Tools infodump 52 2,861 08-08-2025, 01:32 PM
Last Post: n4cx
  Advanced OPSEC Persona Iceland 17 793 08-07-2025, 07:05 AM
Last Post: Masterx0x0

Forum Jump:


 Users browsing this thread: