03.02.2023
Article

Holes in Invisibility Cloak

How metadata destroys your anonymity

Breshi v mantii-nevidimki kak metadannye unichtozhayut vashu anonimnost'
Reading time 4 minutes

The previous article about information security focuses on how to be invisible on the Internet. In addition to the technical instruction, we also told about the errors of the «human factor». However, «torified» traffic, while preventing any IP-address leaks, does not save from other paths to lose data or giving yourself away. About one of the least obvious – read in this article.

Some significant points from the previous article

When a computer connects to Tor, a user’s actions on the Internet are (almost) impersonal. It becomes impossible to track the person’s location, IP-address and other data. However, there are a number of ways to find out where you are and what you are doing: the use of bank cards or phone compromise any information about purchases, movements, calls. Suppose you do not make errors of «human factor» and have successfully installed Whonix according to our instructions. The next step for secure communication or activity on the Internet will be to clean up metadata.

For what reason it is used and why metadata is dangerous

Metadata is an information about a file on your device inside the object itself. To make it easier to understand, let’s take a picture on your phone for an example. The picture has both data (information about where and what color the pixel is) and metadata (it helps to identify a device with which the photo was taken, geolocation at the time of shooting, the size of the image). Metadata improve the quality of information, as it can help to structure the data and set its context. It is used in different areas for analytics, increases the speed of systems and optimizes communication between computer software and files, establishes software licensing restrictions.

Metadata of the author of the article. With its help you can find out the location, model of the phone and even the height above sea level. Site suIP.biz was used to view the metadata.
Metadata of the author of the article. With its help you can find out the location, model of the phone and even the height above sea level. Site suIP.biz was used to view the metadata.

Despite all the advantages, metadata is dangerous when you seek to anonymize your activities. The fact is that they provide much more personal information about the user than the IP-address. For example, you can find out where a person spends most time (home and place of work), geolocation, devices’ operating system, date of video shooting or creation of a text document, authorship. In Digital Security research «II Files’ metadata: Invisible information, revealing your identity», experts note that mail services, even Protonmail, which is considered the most secure, do not delete metadata at all. Messengers erase all metadata from photos, but files (including images sent as files), video and text documents remain intact. Therefore, anonymizing traffic with Tor makes no sense if you do not delete metadata from published or sent materials, as you become easy to track.

Digital Security research found that mail, messengers, sources for photo and video, and cloud storage leave metadata in most uploaded files.
Digital Security research found that mail, messengers, sources for photo and video, and cloud storage leave metadata in most uploaded files.

Security tools

You probably don’t need such a serious anonymization yourself in regular life, so this utility is related to Whonix (Linux’s distributive from the previous part). However, I cannot advise nothing to clean metadata ordinary users too. For laypersons online resources will be suitable, for example, imgonline. But this method has two obvious drawbacks. Firstly, information will be transferred to a specific site, and secondly, the number of file formats which metadata can be deleted is much smaller.

For Linux there is a special software to clean metadata: «MAT – Metadata Anonymisation Toolkit». There are two versions: MAT and MAT2. The last one is more convenient and easier to use. To download the software, you need to enter the command in the Whonix terminal:

$ sudo aptitude install mat2

To view all available commands, type:

$ mat2

Then the list of actions will appear:

Terminal window in Whonix. The screenshot shows all possible operations in MAT2.
Terminal window in Whonix. The screenshot shows all possible operations in MAT2.

To use any command, you must first write the tool name – mat2. The most interesting of the proposed commands is called «–inplace» which removes all metadata. Unfortunately, to address a specific object, you need to specify its directory, so to make this action easier, you should place the files in the system, for example, on the desktop. Write a request in the terminal line:

$ mat2 –inplace /home/user/Desktop/имя файла

We tested the operation of this method by cleaning the metadata from the picture from the gallery, comparing the size of the file before and after: 3.3 MB and 2.3 MB respectively. Almost a third of the information is «data».

Of course, photo does not take up much space on the hard drive, and if you take a larger file, the share of metadata will be insignificant. However, the most popular files distributed by people are images, video, audio and text documents. Together with them, a significant amount of information, however hidden from the average user, but confidential, is transmitted.

Views All Time
Views All Time
86
Views Today
Views Today
1
Posted on Categories ArticleTags