SlideShare a Scribd company logo
1 of 19
Security Research Institute
Edith Cowan University
Metadata : What is Unseen
Professor Craig Valli
Security Research Institute
SIG 29th April, 2013
Security Research Institute
Edith Cowan University
What is it in this context
• Data in various forms that are embedded in a
digital artefact or stream, typically unseen by the
user. Including but not limited to
– Your email address
– Watermarks, logos etc
– Server Drive mappings
– Notes and edits (since thought to be deleted)
– Your geolocation at time of save or capture
– Cookies, web application specific data
Security Research Institute
Edith Cowan University
Why not remove?
• What do you think feeds search engines?
• It can be very useful for internal systems to
search on attributes of documents
• Can be used to prove provenance of a document
• Can be used to provide an avenue for targetted
deception
Security Research Institute
Edith Cowan University
Why remove?
• It makes good sense from a security
perspective, minimal information leakage is
optimal
• Because in some countries you are leaving
yourself open to litigation and or breaches of
law (US HIPPA, Privacy Acts, Data Protection)
distributing documents with this data in them
Security Research Institute
Edith Cowan University
TCP/IP Stacks, Operating Systems
• NMAP, p0f are network mappers that work by
looking at the flags in your TCP/IP transmissions.
They can reliably fingerprint
– Your device
– Your operating system
– Your patch level of operating system
Security Research Institute
Edith Cowan University
Browsers
• The addition of various plug-ins to a browser, in
combination with IP numbers used, platform
identifiers in the browser and the ubiquitous
cookie can make browsers easy to uniquely
identify
– Mozilla/5.0 (Linux; U; Android 2.2; en-gb; GT-P1000 Build/FROYO) AppleWebKit/533.1
(KHTML, like Gecko) Version/4.0 Mobile Safari/533.1
– Mozilla/5.0 (Linux; U; Android 2.2; en-ca; SGH-T959D Build/FROYO) AppleWebKit/533.1
(KHTML, like Gecko) Version/4.0 Mobile Safari/533.1
– Mozilla/5.0 (Linux; U; Android 2.2; en-gb; GT-P1000 Build/FROYO) AppleWebKit/533.1
(KHTML, like Gecko) Version/4.0 Mobile Safari/533.1
– Mozilla/5.0 (Linux; U; Android 2.0.1; en-us; Droid Build/ESD56) AppleWebKit/530.17
(KHTML, like Gecko) Version/4.0 Mobile Safari/530.17
Security Research Institute
Edith Cowan University
Word Document Metadata
• Comments, revision marks from tracked
changes, versions, and ink annotations
• Headers, footers, and watermarks
• Document server properties
• Email addresses
• Usernames (ADS etc)
• Hidden text (formatted as)
Security Research Institute
Edith Cowan University
PDF
• Same same as before with Word plus...
– Encryption and user access settings
– Signature tags – location, signing authority, type of
signing etc
– Lets not forget executables
– Can keep a full history of metadata in the file i.e just
changing does not erase...
Security Research Institute
Edith Cowan University
Geotagging
• The location data is typically
stored within the EXIF records for
the image using the EXIF Global
Positioning System sub-IFD that
uses the TIFF Private Tag 0x882
• Or the application generates the
data using a combination of
sources to locate e.g GPS and
Wireless access points
Security Research Institute
Edith Cowan University
EXIF
• The Exchangeable Image File format (EXIF) is a
published industry specification for the image file
format used by digital cameras
• There are over 200 plus identifiers/tags, geo-
location, device, serial number etc
Security Research Institute
Edith Cowan University
EXIF
Security Research Institute
Edith Cowan University
Social Media...
• Most of these services are “free” in exchange for
your data and metadata touch points. Just as in
real world no free lunch in cyberspace.
• Many of these services give full feeds of their
data streams to developers (anyone)
• Some of them rely on you to have turned on
GPS/geolocation to access the service i.e no geo
no service or you are just “checking in”
Security Research Institute
Edith Cowan University
Twitter – 140 characters not!
•Links to previous tweets
•Authors username
•Authors screename
•Authors biography
•Authors location
•Timezone
•PlaceID, Printable Name, URL,
Type, Bounding Box, Country of
place tweet was made
•Application that sent the tweet
Security Research Institute
Edith Cowan University
Google...
Security Research Institute
Edith Cowan University
Third Party Service Providers
• Various service
providers are now
developing services
that fingerprint your
devices and you!
• All perfectly legal
, drawn from
metadata and other
sources.
Security Research Institute
Edith Cowan University
Some analysis tools
• Metapicz – Google App - is one example of an
online based tools that allow extraction data
• Geosetter – http://www.geosetter.de/en/
Windows tool to edit/view Geo and other
attributes
• FOCA – harvester and analyser for metadata
from websites
• GeoIntelligence – home grown...
Security Research Institute
Edith Cowan University
Solutions
• Make sure you turn off geo-location on your
devices...unless you want to be tracked
• Strip out metadata using a cleanser before
sending documents in email or storing on
websites, unless you’re setting honeyfiles..
• Use your browsers in anonymous modes on all
your devices or set different browser-id strings
• Be careful what extensions in use on browsers
• Use some of the VM based anonymisers
Security Research Institute
Edith Cowan University
Software and Resources
• Office 2010+ - Document Inspector
• OpenOffice – http://oometaextractor.codeplex.com/
• Removing Sensitive Data for PDF
http://tv.adobe.com/watch/learn-acrobat-x/removing-
sensitive-information/
Security Research Institute
Edith Cowan University
References and Resources
• Official 2.3 EXIF
http://www.cipa.jp/english/hyoujunka/kikaku/pdf/DC-008-
2012_E.pdf
• EXIF Tag list
http://www.sno.phy.queensu.ca/~phil/exiftool/TagNames/EXIF.ht
ml
• Hidden Data and Metadata in Adobe PDF Files
http://www.nsa.gov/ia/_files/app/pdf_risks.pdf
• Official PDF specification -
http://www.adobe.com/devnet/pdf/pdf_reference.html

More Related Content

Viewers also liked

Aberraciones sexuales
Aberraciones sexualesAberraciones sexuales
Aberraciones sexuales
daniguzman
 
從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗
從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗
從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗
Macpaul Lin
 
Sobre la pornografía y el cine - Manuel Bláuab
Sobre la pornografía y el cine - Manuel BláuabSobre la pornografía y el cine - Manuel Bláuab
Sobre la pornografía y el cine - Manuel Bláuab
Manuel Sierra Alonso
 

Viewers also liked (19)

ssh
sshssh
ssh
 
Download Indexed Cache
Download Indexed CacheDownload Indexed Cache
Download Indexed Cache
 
TERMS THAT WOULD MAKE KINK LOOK INNOCENT
TERMS THAT WOULD MAKE KINK LOOK INNOCENTTERMS THAT WOULD MAKE KINK LOOK INNOCENT
TERMS THAT WOULD MAKE KINK LOOK INNOCENT
 
skipfish
skipfishskipfish
skipfish
 
Cómo hablar de sexualidad con los adolescentes
Cómo hablar de sexualidad con los adolescentes Cómo hablar de sexualidad con los adolescentes
Cómo hablar de sexualidad con los adolescentes
 
Aberraciones sexuales
Aberraciones sexualesAberraciones sexuales
Aberraciones sexuales
 
Sin City
Sin CitySin City
Sin City
 
BDSM
BDSMBDSM
BDSM
 
tit
tittit
tit
 
Amatorski as a 'music career' example?
Amatorski as a 'music career' example?Amatorski as a 'music career' example?
Amatorski as a 'music career' example?
 
從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗
從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗
從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗
 
Sobre la pornografía y el cine - Manuel Bláuab
Sobre la pornografía y el cine - Manuel BláuabSobre la pornografía y el cine - Manuel Bláuab
Sobre la pornografía y el cine - Manuel Bláuab
 
La Pornografía se Parece Al Fin Del Mundo - Art. Chris Hedges - Truthdig Feb...
La Pornografía se Parece Al Fin Del Mundo - Art. Chris Hedges - Truthdig  Feb...La Pornografía se Parece Al Fin Del Mundo - Art. Chris Hedges - Truthdig  Feb...
La Pornografía se Parece Al Fin Del Mundo - Art. Chris Hedges - Truthdig Feb...
 
부천오피, 목동오피,안양오피@(다솜넷)수원오피
부천오피, 목동오피,안양오피@(다솜넷)수원오피부천오피, 목동오피,안양오피@(다솜넷)수원오피
부천오피, 목동오피,안양오피@(다솜넷)수원오피
 
Bdsm intro PART II/2/B
Bdsm intro PART II/2/BBdsm intro PART II/2/B
Bdsm intro PART II/2/B
 
Bdsm intro
Bdsm introBdsm intro
Bdsm intro
 
SpeakerText Pres
SpeakerText PresSpeakerText Pres
SpeakerText Pres
 
Cuadernos BDSM 1
Cuadernos BDSM 1Cuadernos BDSM 1
Cuadernos BDSM 1
 
Magazines download. magazines online. pdf magazines
Magazines download. magazines online. pdf magazines Magazines download. magazines online. pdf magazines
Magazines download. magazines online. pdf magazines
 

Similar to Metadata - What is Unseen

Digital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slidesDigital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slides
moanasherrill
 
Digital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slidesDigital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slides
Cindy Douglas
 
Digital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slidesDigital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slides
Ellen Pittleman
 
Thick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash CourseThick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash Course
NetSPI
 

Similar to Metadata - What is Unseen (20)

Blue Teaming On A Budget
Blue Teaming On A BudgetBlue Teaming On A Budget
Blue Teaming On A Budget
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
 
Automation In Android & iOS Application Review
Automation In Android & iOS 	Application Review�Automation In Android & iOS 	Application Review�
Automation In Android & iOS Application Review
 
DataSploit - BlackHat Asia 2017
DataSploit - BlackHat Asia 2017 DataSploit - BlackHat Asia 2017
DataSploit - BlackHat Asia 2017
 
Digital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slidesDigital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slides
 
Digital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slidesDigital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slides
 
Digital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slidesDigital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slides
 
Privacy in private browsing mode
Privacy in private browsing modePrivacy in private browsing mode
Privacy in private browsing mode
 
Cyberscout Corporate Security
Cyberscout   Corporate SecurityCyberscout   Corporate Security
Cyberscout Corporate Security
 
Thick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash CourseThick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash Course
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan Braganza
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
 
Goans-Helms-IT Security at Georgia Tech Library
Goans-Helms-IT Security at Georgia Tech LibraryGoans-Helms-IT Security at Georgia Tech Library
Goans-Helms-IT Security at Georgia Tech Library
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptx
 
Autopsy Digital forensics tool
Autopsy Digital forensics toolAutopsy Digital forensics tool
Autopsy Digital forensics tool
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
 
Hem second presentation
Hem second presentationHem second presentation
Hem second presentation
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

Metadata - What is Unseen

  • 1. Security Research Institute Edith Cowan University Metadata : What is Unseen Professor Craig Valli Security Research Institute SIG 29th April, 2013
  • 2. Security Research Institute Edith Cowan University What is it in this context • Data in various forms that are embedded in a digital artefact or stream, typically unseen by the user. Including but not limited to – Your email address – Watermarks, logos etc – Server Drive mappings – Notes and edits (since thought to be deleted) – Your geolocation at time of save or capture – Cookies, web application specific data
  • 3. Security Research Institute Edith Cowan University Why not remove? • What do you think feeds search engines? • It can be very useful for internal systems to search on attributes of documents • Can be used to prove provenance of a document • Can be used to provide an avenue for targetted deception
  • 4. Security Research Institute Edith Cowan University Why remove? • It makes good sense from a security perspective, minimal information leakage is optimal • Because in some countries you are leaving yourself open to litigation and or breaches of law (US HIPPA, Privacy Acts, Data Protection) distributing documents with this data in them
  • 5. Security Research Institute Edith Cowan University TCP/IP Stacks, Operating Systems • NMAP, p0f are network mappers that work by looking at the flags in your TCP/IP transmissions. They can reliably fingerprint – Your device – Your operating system – Your patch level of operating system
  • 6. Security Research Institute Edith Cowan University Browsers • The addition of various plug-ins to a browser, in combination with IP numbers used, platform identifiers in the browser and the ubiquitous cookie can make browsers easy to uniquely identify – Mozilla/5.0 (Linux; U; Android 2.2; en-gb; GT-P1000 Build/FROYO) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1 – Mozilla/5.0 (Linux; U; Android 2.2; en-ca; SGH-T959D Build/FROYO) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1 – Mozilla/5.0 (Linux; U; Android 2.2; en-gb; GT-P1000 Build/FROYO) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1 – Mozilla/5.0 (Linux; U; Android 2.0.1; en-us; Droid Build/ESD56) AppleWebKit/530.17 (KHTML, like Gecko) Version/4.0 Mobile Safari/530.17
  • 7. Security Research Institute Edith Cowan University Word Document Metadata • Comments, revision marks from tracked changes, versions, and ink annotations • Headers, footers, and watermarks • Document server properties • Email addresses • Usernames (ADS etc) • Hidden text (formatted as)
  • 8. Security Research Institute Edith Cowan University PDF • Same same as before with Word plus... – Encryption and user access settings – Signature tags – location, signing authority, type of signing etc – Lets not forget executables – Can keep a full history of metadata in the file i.e just changing does not erase...
  • 9. Security Research Institute Edith Cowan University Geotagging • The location data is typically stored within the EXIF records for the image using the EXIF Global Positioning System sub-IFD that uses the TIFF Private Tag 0x882 • Or the application generates the data using a combination of sources to locate e.g GPS and Wireless access points
  • 10. Security Research Institute Edith Cowan University EXIF • The Exchangeable Image File format (EXIF) is a published industry specification for the image file format used by digital cameras • There are over 200 plus identifiers/tags, geo- location, device, serial number etc
  • 11. Security Research Institute Edith Cowan University EXIF
  • 12. Security Research Institute Edith Cowan University Social Media... • Most of these services are “free” in exchange for your data and metadata touch points. Just as in real world no free lunch in cyberspace. • Many of these services give full feeds of their data streams to developers (anyone) • Some of them rely on you to have turned on GPS/geolocation to access the service i.e no geo no service or you are just “checking in”
  • 13. Security Research Institute Edith Cowan University Twitter – 140 characters not! •Links to previous tweets •Authors username •Authors screename •Authors biography •Authors location •Timezone •PlaceID, Printable Name, URL, Type, Bounding Box, Country of place tweet was made •Application that sent the tweet
  • 14. Security Research Institute Edith Cowan University Google...
  • 15. Security Research Institute Edith Cowan University Third Party Service Providers • Various service providers are now developing services that fingerprint your devices and you! • All perfectly legal , drawn from metadata and other sources.
  • 16. Security Research Institute Edith Cowan University Some analysis tools • Metapicz – Google App - is one example of an online based tools that allow extraction data • Geosetter – http://www.geosetter.de/en/ Windows tool to edit/view Geo and other attributes • FOCA – harvester and analyser for metadata from websites • GeoIntelligence – home grown...
  • 17. Security Research Institute Edith Cowan University Solutions • Make sure you turn off geo-location on your devices...unless you want to be tracked • Strip out metadata using a cleanser before sending documents in email or storing on websites, unless you’re setting honeyfiles.. • Use your browsers in anonymous modes on all your devices or set different browser-id strings • Be careful what extensions in use on browsers • Use some of the VM based anonymisers
  • 18. Security Research Institute Edith Cowan University Software and Resources • Office 2010+ - Document Inspector • OpenOffice – http://oometaextractor.codeplex.com/ • Removing Sensitive Data for PDF http://tv.adobe.com/watch/learn-acrobat-x/removing- sensitive-information/
  • 19. Security Research Institute Edith Cowan University References and Resources • Official 2.3 EXIF http://www.cipa.jp/english/hyoujunka/kikaku/pdf/DC-008- 2012_E.pdf • EXIF Tag list http://www.sno.phy.queensu.ca/~phil/exiftool/TagNames/EXIF.ht ml • Hidden Data and Metadata in Adobe PDF Files http://www.nsa.gov/ia/_files/app/pdf_risks.pdf • Official PDF specification - http://www.adobe.com/devnet/pdf/pdf_reference.html