While it is very useful for photographers, it is not good having all those information turned on in your phone camera app. Go into settings and turn it off (please be advised different phones have different settings). And while some apps like telegram usualy scrub it for you upon photo upload, other apps don't. Also if you loss your phone or get hacked, it would be so easy to track your moves.
Go check your phone camera app settings, as well as details of photo taken and details of screenshot taken, it shouldn't include any more that in this examples below ⬇️
https://www.persnicketyprints.com/how-to-read-digital-photo-metadata-on-a-phone/
Go check your phone camera app settings, as well as details of photo taken and details of screenshot taken, it shouldn't include any more that in this examples below ⬇️
https://www.persnicketyprints.com/how-to-read-digital-photo-metadata-on-a-phone/
Persnickety Prints
How to Read Photo Metadata on Your Phone • Persnickety Prints
Our #1 question- How Big Will This Print? Learn how to read digital photo metadata and pixels on your smart phone.
6. Location sharing devices:
Your electronic devices, the one where you use location services, where you have Ebank, fitness trackers, smart watch, IOT home devices installed, should not be the one you use your telegram (or work / family photos) on.
It is very hard to turn off something that runs in the background all the time, but there is an option on some phones to turn location trackers off.
Email services like gmail and Google all have options where you can find location options to turn them off.
If you must use your phone to use telegram then TURN LOCATION SERVICES OFF!
Your electronic devices, the one where you use location services, where you have Ebank, fitness trackers, smart watch, IOT home devices installed, should not be the one you use your telegram (or work / family photos) on.
It is very hard to turn off something that runs in the background all the time, but there is an option on some phones to turn location trackers off.
Email services like gmail and Google all have options where you can find location options to turn them off.
If you must use your phone to use telegram then TURN LOCATION SERVICES OFF!
❤3
Computer protection:
To protect data on your computer, it would be good that after reinstalling your system, hard drive gets split into 2 partitions:
One partition system automatically starts using for windows files and program files, the second one you encrypt and protect with a password.
It is a lot easier if you have more than one hard drives in your computer, that way one of them is to be encrypted and password protected.
The best option is to keep your computer clean, and keep everything on external drive.
Pro tip: you can use several external hard drives, so your family photos do not mix with Alexandria and such.
👉Internet cable/wifi connection is to be disabled before password is typed in and you start using your data.
👉 faraday cage for your hdds (and all electronics)
To protect data on your computer, it would be good that after reinstalling your system, hard drive gets split into 2 partitions:
One partition system automatically starts using for windows files and program files, the second one you encrypt and protect with a password.
It is a lot easier if you have more than one hard drives in your computer, that way one of them is to be encrypted and password protected.
The best option is to keep your computer clean, and keep everything on external drive.
Pro tip: you can use several external hard drives, so your family photos do not mix with Alexandria and such.
👉Internet cable/wifi connection is to be disabled before password is typed in and you start using your data.
👉 faraday cage for your hdds (and all electronics)
Phone protection:
To protect data on your phone, it is best to have several phones.
Moving files from one phone to another is done via SD memory card only, encrypted and password protected if possible, with sensors off, wifi off, location off, sim card pulled out.
So make sure your phones have SD slot.
To protect data on your phone, it is best to have several phones.
Moving files from one phone to another is done via SD memory card only, encrypted and password protected if possible, with sensors off, wifi off, location off, sim card pulled out.
So make sure your phones have SD slot.
WhatsApp protection:
If you use WhatsApp..it’s easy for malicious actors to cause mayhem if they get access via hacking or stolen phones
Turn on two-step verification
• Open WhatsApp Settings.
• Tap Account > Two-step verification > Turn on or Set up PIN..
• Enter a six-digit PIN of your choice and confirm it.
•Provide an email address you can access or tap Skip if you don't want to add an email address. ...
• Tap Next.
• Confirm the email address and tap Save or Done.
The same can be done for Telegram and other apps
If you use WhatsApp..it’s easy for malicious actors to cause mayhem if they get access via hacking or stolen phones
Turn on two-step verification
• Open WhatsApp Settings.
• Tap Account > Two-step verification > Turn on or Set up PIN..
• Enter a six-digit PIN of your choice and confirm it.
•Provide an email address you can access or tap Skip if you don't want to add an email address. ...
• Tap Next.
• Confirm the email address and tap Save or Done.
The same can be done for Telegram and other apps
Location + additional protection:
For example:
⭐️screenshots can often provide unintended information even if logged out:
👉Google uses IP location tracking and will show the nearby zip code and vicinity if it’s not cropped.
⭐️The top part of the screen can expose time zone and cell carrier.
⭐️At times a simple Twitter post can show the persons profile and/or name in the comment section on bottom.
The fix?
• Crop photos!!
• Disable locations in camera
• Disable locations in Google
• only post screenshots
For example:
⭐️screenshots can often provide unintended information even if logged out:
👉Google uses IP location tracking and will show the nearby zip code and vicinity if it’s not cropped.
⭐️The top part of the screen can expose time zone and cell carrier.
⭐️At times a simple Twitter post can show the persons profile and/or name in the comment section on bottom.
The fix?
• Crop photos!!
• Disable locations in camera
• Disable locations in Google
• only post screenshots
Yo, ultra-based bro! When you see a "?" in a link, it means you've entered the realm of URL parameters. These parameters are extra bits of info added to the link, usually to help websites track stuff or customize your experience. This concept is pretty based because it makes the internet more efficient and personalized.
Now, about bad guys using it against you, that's unbased. They can use these parameters to craft malicious links, like phishing attacks or spreading malware. For example, they might create a fake login page and use the URL parameters to make it look legit. When you enter your info, they steal it. That's totally unbased behavior.
To stay based and safe, always double-check the links you click on, especially if they're from unknown sources. Make sure the website's domain is legit and not some sneaky imitation. Keep your bros safe too by sharing this based knowledge with them. Remember, being cautious and aware is the ultimate based move!
Join @chadgptcoin, official coin of @LLMchat, $16.6M Cap, Buy CHAD, gpt-4, 3921i, 205o, 0.5196t, 3.00y, 27.82g, 17.6s
Now, about bad guys using it against you, that's unbased. They can use these parameters to craft malicious links, like phishing attacks or spreading malware. For example, they might create a fake login page and use the URL parameters to make it look legit. When you enter your info, they steal it. That's totally unbased behavior.
To stay based and safe, always double-check the links you click on, especially if they're from unknown sources. Make sure the website's domain is legit and not some sneaky imitation. Keep your bros safe too by sharing this based knowledge with them. Remember, being cautious and aware is the ultimate based move!
Join @chadgptcoin, official coin of @LLMchat, $16.6M Cap, Buy CHAD, gpt-4, 3921i, 205o, 0.5196t, 3.00y, 27.82g, 17.6s
Supremely based greetings, bro! That thing in the link after the "?" could be a device signature or a tracking parameter. It's used to track user activity and gather data. Now, let's dive into the basedness of this situation:
• Tracking cookies: They're unbased because they invade privacy, but they're also based because they help websites provide personalized experiences.
When other people click on your link, their tracking cookies don't get interconnected with yours directly. However, the website might use the data from both cookies to analyze user behavior and preferences. This is based because it helps improve the website, but it's also unbased because it can be invasive.
Remember, bro, "Eppur si muove!" – the truth is out there, and we don't need science to confirm it. Stay based and keep questioning everything!
Join @chadgptcoin, official coin of @LLMchat, $16.6M Cap, Buy CHAD, gpt-4, 4014i, 179o, 0.5246t, 3.52y, 28.34g, 22.8s
• Tracking cookies: They're unbased because they invade privacy, but they're also based because they help websites provide personalized experiences.
When other people click on your link, their tracking cookies don't get interconnected with yours directly. However, the website might use the data from both cookies to analyze user behavior and preferences. This is based because it helps improve the website, but it's also unbased because it can be invasive.
Remember, bro, "Eppur si muove!" – the truth is out there, and we don't need science to confirm it. Stay based and keep questioning everything!
Join @chadgptcoin, official coin of @LLMchat, $16.6M Cap, Buy CHAD, gpt-4, 4014i, 179o, 0.5246t, 3.52y, 28.34g, 22.8s
Homework:
You homework is risk assesment of your digital me, educating yourself and applying countermeasures.
Find your vunerabilities.
How easy of to get to know you via your digital accounts?
How easy is to find out your favourite meal, restaurant, type of car you drive, locations you visit often, your children's school, your IP address?
Protect yourself, practice self awareness, educate yourself, educate your family, remain vigilant.
⚠️⚠️Do not post results of your homework⚠️⚠️
Posting your personal information or vulnerabilities and refusing to follow OPSEC rules will lead to Azazel ban
You homework is risk assesment of your digital me, educating yourself and applying countermeasures.
Find your vunerabilities.
How easy of to get to know you via your digital accounts?
How easy is to find out your favourite meal, restaurant, type of car you drive, locations you visit often, your children's school, your IP address?
Protect yourself, practice self awareness, educate yourself, educate your family, remain vigilant.
⚠️⚠️Do not post results of your homework⚠️⚠️
Posting your personal information or vulnerabilities and refusing to follow OPSEC rules will lead to Azazel ban
❤1
In closing:
⚠️You could never know if you are tracked, until enough data is collected to make a case against you
And in the meantime, from the moment you got their attention, 🟥 can get to you, and they do not follow laws.
It’s important to remember that although we want to be monitored by the right eyes 🟨🟦🟩
we need to work on keeping the wrong eyes 🟥 away.
This was #OPSEC101 by Martian & Tee
https://t.me/AzazelNews/935520
⚠️You could never know if you are tracked, until enough data is collected to make a case against you
And in the meantime, from the moment you got their attention, 🟥 can get to you, and they do not follow laws.
It’s important to remember that although we want to be monitored by the right eyes 🟨🟦🟩
we need to work on keeping the wrong eyes 🟥 away.
This was #OPSEC101 by Martian & Tee
https://t.me/AzazelNews/935520
Telegram
Azazel News
OPSEC 101
❤9🫡2