• Suddenly unable to log into your ZooVille account? This might be the reason why: CLICK HERE!

GPS in metadata

You mean something like a master password ?
Maybe the word back door can be interpreted in different ways, but to me it is a back door if someone can enter my data without my knowledge / permission.
Hacking is usually used in the meaning that someone tries with a large number of passwords.
But as I said, a setting in an iPhone / iPad is to delete it self (like in the movies IMF - ‘selfdestruct in 5 seconds) after 10 wrong passwords or remote - using ‘Find my Phone’.
Something like a master key or multi pass..
The files themselves never get destroyed completely; they're just not available anymore for you... Only the allocation table is deleted; in order to actually delete the data permanently, the memory locations used on the blocks must also be overwritten, which is only possible with special software.
 
By the way on Android the thumbnails you see in your gallery are not the same image as the photo.
They are files stored separately somewhere else. And when you "delete" the photo, the thumbnail does not necessarily have to be deleted too.

Try running DiskDigger
And see what you can get from your deleted files.
 
By the way on Android the thumbnails you see in your gallery are not the same image as the photo.
They are files stored separately somewhere else. And when you "delete" the photo, the thumbnail does not necessarily have to be deleted too.

Try running DiskDigger
And see what you can get from your deleted files.
Diskdigger is on AppStore - BUT
the programmer writes that “Id’s and userdata could possibly be used to track me in apps and on websites own by other companies”
 
By the way on Android the thumbnails you see in your gallery are not the same image as the photo.
They are files stored separately somewhere else. And when you "delete" the photo, the thumbnail does not necessarily have to be deleted too.

Try running DiskDigger
And see what you can get from your deleted files.
I use some Disk drill to test how well some thing is deleted.

Every so often I flood my phone till has 0 memory left with small random text files to ensure every tiny bit of memory was filled

but you need a computer to runt he disk drill on a phone.
 
yup, I do a deep crawl through the phone to secure it, now several apps don't work, why the fuck does my calendar need access to personal messages and such! I have a strict policy of nothing on my phone I wouldn't show a cop for that simple reason, as the police have tools that near intently access the phone due to back doors basically mandated, (Oh yes applies to I phone too).
My iPad was seized in an unrelated to this and me investigation and they hacked it six months before the suspect plead and they offered it back to me, if and only if I unlocked it for them and allowed them to make a copy, which I did, then inspected and destroyed the iPad and grenaded the appleid. So no, there are no apple backdoors (yet). Keep your iOS up to date and don’t do stupid stuff in it.
 
My iPad was seized in an unrelated to this and me investigation and they hacked it six months before the suspect plead and they offered it back to me, if and only if I unlocked it for them and allowed them to make a copy, which I did, then inspected and destroyed the iPad and grenaded the appleid. So no, there are no apple backdoors (yet). Keep your iOS up to date and don’t do stupid stuff in it.
not all stations are well equipped but from the few security conscious people I know who have had them taken they had all information promptly. but all so we are talking phones, not ipads here
 
It’s the same os. And this was the fbi, it sat in one of their secure labs for the entire 6mo (oddly enough it connected to the internet occasionally enough to keep me updated as to its location)
 
It’s the same os. And this was the fbi, it sat in one of their secure labs for the entire 6mo (oddly enough it connected to the internet occasionally enough to keep me updated as to its location)
well who knows then perhaps different laws, but if in Canada, I wouldn't trust it as far as you can throw it. that or those guys I knew used really simple but long passwords or bad settings.
 
It’s the same os. And this was the fbi, it sat in one of their secure labs for the entire 6mo (oddly enough it connected to the internet occasionally enough to keep me updated as to its location)
If your iPad, iPhone, or whatever is stolen and hackers can unlock it, be sure, so can law enforcement... Maybe it is a legal matter; they are not allowed to..
 
It’s the same os. And this was the fbi, it sat in one of their secure labs for the entire 6mo (oddly enough it connected to the internet occasionally enough to keep me updated as to its location)
The app *Find” functions by using the phones BlueTooth to connect with other Bluetooth devices around it, and they forwards its position through the internet. It just needs the phone is not switched off.
(I have bought an ‘item finder’ = chipolo : a card in VISA size in my wallet and a disc with my keys. So if it or my iPad is lost I can look their position up from a computer by using my iCloud name and password. Very neat, hopefully not too revealing)
 
i think instead of using the forum plugin, another approach would be if the site owners wrote a cronjob that found files in the attachment directory on the filesystem newer than the last time the job was run, then ran exiftool against each file with the commands to sanitize the exif data. Or if you want to be fancy and faster you can probably use inotifywait on linux to trigger exiftool immediately each time a new attachment file is written. (https://docs.rockylinux.org/books/learning_rsync/06_rsync_inotify/ based on that example but with exiftool instead of rsync)

it's good to educate the users on how they can protect themselves when recording and uploading, but this would be an extra failsafe.
 
another approach would be if the site owners wrote a cronjob that found files in the attachment directory on the filesystem newer than the last time the job was run, then ran exiftool against each file with the commands to sanitize the exif data.
I have suggested that already and it is not going to happen.
 
Back
Top