Document metadata

2007-05-29

in Geek stuff, Internet matters, Security, Writing

It remains somewhat amazing to me that governments and major international institutions so frequently forget what it means to distribute documents in Word format. In particular, people are surprisingly ignorant of how Word tracks changes: making documents into a palimpsest of revisions, not all of which you want the outside world to see. You don’t want the comment about how pointless one of the ‘key items’ in your ‘corporate vision’ is making it into the file that gets passed to the New York Times. Even the early copy of the Summary for Policymakers of the 4th Assessment Report of the IPCC that I have includes a few notes about edits that still need to be done.

Hopefully, closed standards like Word documents will fall by the wayside during the next decade or so. It is insane to be distributing so much information in a proprietary format for no good reason (just one more manifestation of monopolistic dominance). Hopefully, whichever open document format eventually comes to be standard will have better means for assessing and controlling what information you are inadvertantly embedding in your press releases, reports, spreadsheets, etc. Until then, lax security is likely to keep offering some interesting glances into the drafting processes of such publicized documents.

PS. One other thing to remember is that the standard jpg images produced by Adobe Photoshop include thumbnail files that are not edited when you change the image. As such, a face blurred out of the large version may still be recognizable in the embedded thumbnail version. The same goes for areas that may have been cropped from the image entirely. I am sure Cat Schwartz isn’t the only person who has suffered public embarassment because of this. No doubt, many other pieces of software include such counter intuitive and potentially problematic behaviours.

Report a typo or inaccuracy

{ 6 comments… read them below or add one }

Anon @ Wadh May 29, 2007 at 5:09 pm

I’ll bet a kidnapping plot or two was undermined by the Photoshop ‘feature’ you describe.

Milan May 29, 2007 at 5:20 pm

Some things from Bruce Schneier’s blog:

Metadata in MS Office

The NSA on How to Redact

Milan May 29, 2007 at 5:25 pm

“The United Nations withheld some of the most damaging allegations against Syria in its report on the murder of Rafik Hariri, the former Lebanese Prime Minister, it emerged [Friday].

The names of the brother of Bashar al-Assad, President of Syria, and other members of his inner circle, were dropped from the report that was sent to the Security Council.

The confidential changes were revealed by an extraordinary computer gaffe because an electronic version distributed by UN officials on Thursday night allowed recipients to track editing changes.”

Source

Milan May 31, 2007 at 4:34 pm

Tactics, Targets, and Objectives

If you encounter an aggressive lion, stare him down. But not a leopard; avoid his gaze at all costs. In both cases, back away slowly; don’t run. If you stumble on a pack of hyenas, run and climb a tree; hyenas can’t climb trees. But don’t do that if you’re being chased by an elephant; he’ll just knock the tree down. Stand still until he forgets about you.

I spent the last few days on safari in a South African game park, and this was just some of the security advice we were all given. What’s interesting about this advice is how well-defined it is. The defenses might not be terribly effective — you still might get eaten, gored or trampled — but they’re your best hope. Doing something else isn’t advised, because animals do the same things over and over again. These are security countermeasures against specific tactics.

. February 12, 2010 at 2:26 pm

Apparently, camera phones produce a lot of metadata:

“While mining EXIF data from images is nothing new, how many people would allow this data to leave their cell phone if they knew what it contained? The source code for the scripts is also available from the article.” “399 images included the location of the camera at the time the image was taken, and 102 images included the name of the photographer. … The iPhone is including the most EXIF information among the images we found. … It not only includes the phone’s location, but also accelerometer data showing if the phone was moved at the time the picture was taken and the readout from the [built-]in compass showing in which direction the phone was pointed at the time.”

. May 1, 2011 at 6:53 pm

Stolen Camera Finder

Mark Frauenfelder at 12:38 PM Friday, Apr 29, 2011

Matt Burns created this website to help you find your stolen camera. It looks on the web for other photos with the same EXIF ID.

Leave a Comment

You can use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

{ 4 trackbacks }

Previous post:

Next post: