I Can Stalk U site exposes danger of sharing photos online

Filed Under: Data loss, Mobile, Social networks, Twitter

Plenty of people are familiar with the dangers which can be associated with sharing your location online - whether it be by Twitter updates ("I'm at Heathrow airport, Terminal 3, waiting to go on two week's holiday.."), Foursquare ("I just ousted @gcluley as the mayor of Sophos on @foursquare!") and the newly launched Facebook Places.

But a new website called I Can Stalk U demonstrates how easy it is to unwittingly reveal your location - just by sharing a digital photo from your smartphone.

I Can Stalk U website

Many people may be unaware that lots of smart phones geo-tag photos that they take with information about where they were taken. The location data isn't visible to the naked eye in the photo, it's embedded as encoded meta-data inside the picture, alongside information about what type of camera was used, camera settings, and so forth.

That means, anyone who accesses your digital photos can (if you haven't wiped the location meta-data) work out where you were when you take the snapshot.

And as many people upload their pictures virtually instantly to Twitter via services like TwitPic, someone could find out where you are even if you had no intention of sharing that information with the world.

You can imagine how that could be very dangerous - imagine if you had a jealous ex-partner, or if you were a celebrity with hundreds of demented fans keen to "hang out" with you.

The I Can Stalk U website appears to have been set up to raise awareness of the security problem, rather than to cause mischief, and they have helpfully provided information about how to disable geo-tagging on some of the most common smartphones.

As the world wide web increasingly becomes the world where web, with location playing an ever more important role in the information we glean from the internet, it will become increasingly important for net users to consider how this information is shared, and ensure that they are not unwittingly sharing it with unauthorised parties.

, , ,

You might like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

About the author

Graham Cluley runs his own award-winning computer security blog at https://grahamcluley.com, and is a veteran of the anti-virus industry having worked for a number of security companies since the early 1990s. Now an independent security analyst, he regularly makes media appearances and gives computer security presentations. Follow him on Twitter at @gcluley