Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Guides - Privacy & Security Tips
Remove Personal metadata from Files to Protect Your Privacy
Message
<blockquote data-quote="Ink" data-source="post: 432089" data-attributes="member: 3"><p><span style="font-size: 12px"><strong>TECHNET.MICROSOFT.COM</strong></span> - <a href="https://technet.microsoft.com/en-us/magazine/ee851674.aspx" target="_blank">Remove Personal metadata from Files to Protect Your Privacy</a></p><p></p><p><span style="font-size: 12px"><strong>SUPPORT.OFFICE.COM</strong></span> - <a href="https://support.office.com/en-au/article/Remove-hidden-data-and-personal-information-by-inspecting-documents-356b7b5d-77af-44fe-a07f-9aa4d085966f" target="_blank">Remove hidden data and personal information by inspecting documents</a></p><p></p><p>Thanks for sharing. Remember to add a Source when posting Tutorials, when copied from the web. I have posted an additional link for Office documents (above).</p><p></p><p><strong>Examples of Metadata:</strong></p><p></p><p><em>Here are some high-profile examples where someone sending an electronic document to someone else forgot that hidden metadata exists</em> (<span style="font-size: 12px"><a href="http://www.mrblaw.com/Technology-And-The-Trial-Lawyer/Metadata-What-It-Is-and-Why-You-Should-Care-Susan-J-Silvernail-Alabama-Association-for-Justice-August-11-2007.shtml" target="_blank">SOURCE</a></span>).</p><p></p><p>[spoiler]October 2000: The Wall Street Journal reports that a candidate running for the U.S. Senate began receiving anonymous emails containing messages written in MS Word criticizing and attacking the candidate. A savvy aide looked at the document properties and discovered they were authored by the chief-of-staff of the opposing party.</p><p></p><p>February 2003: A dossier on Iraq's security and intelligence organizations, cited by Colin Powell and published by 10 Downing Street, is discovered to have been plagiarized from a U.S. researcher on Iraq. Since the dossier was published on their website in MS Word format, researchers also discovered the four people in the British government who edited the document. They were subsequently called to Parliament for a hearing.</p><p></p><p>March 2004: SCO Group , seller of UNIX and Linux, sent out a warning letter to 1,500 of the world's largest companies threatening legal liability for using Linux if they failed to obtain a license from the Utah-based company. After filing suit against Daimler-Chrysler, metadata in a MS Word version of the suit revealed that the SCO's attorneys had spent a good deal of time aiming the suit at Bank of America instead.</p><p></p><p>May 2005: Derrick Max, the head of two supposedly independent, nonpartisan groups who support overhauling Social Security, e-mailed his testimony on Social Security to the Senate but forgot to turn off "track changes". Turns out the associate commission of the Social Security Administration, who was on loan, working out of the White House, edited Max's "independent" testimony.</p><p></p><p>October 2005: United Nations issued report on Syria's suspected involvement in the assassination of Lebanon's former prime minister, Rafik Hariri. Recipients of a version of the report were able to track the editing changes, which included the deletion of names of officials allegedly involved in the plot, including the Syrian president's brother and brother-in-law</p><p></p><p>December 2005: President Bush delivers speech at the U.S. Naval Academy outlining a new "National Strategy for Victory in Iraq", which was posted on the White House website. The New York Times, using Adobe System's Acrobat software that shows the document was created by "feaver-p" reveals that the speech was largely written by a Duke University political scientist, Peter D. Feaver.[/spoiler]</p></blockquote><p></p>
[QUOTE="Ink, post: 432089, member: 3"] [SIZE=3][B]TECHNET.MICROSOFT.COM[/B][/SIZE] - [URL="https://technet.microsoft.com/en-us/magazine/ee851674.aspx"]Remove Personal metadata from Files to Protect Your Privacy[/URL] [SIZE=3][B]SUPPORT.OFFICE.COM[/B][/SIZE] - [URL="https://support.office.com/en-au/article/Remove-hidden-data-and-personal-information-by-inspecting-documents-356b7b5d-77af-44fe-a07f-9aa4d085966f"]Remove hidden data and personal information by inspecting documents[/URL] Thanks for sharing. Remember to add a Source when posting Tutorials, when copied from the web. I have posted an additional link for Office documents (above). [B]Examples of Metadata:[/B] [I]Here are some high-profile examples where someone sending an electronic document to someone else forgot that hidden metadata exists[/I] ([SIZE=3][URL='http://www.mrblaw.com/Technology-And-The-Trial-Lawyer/Metadata-What-It-Is-and-Why-You-Should-Care-Susan-J-Silvernail-Alabama-Association-for-Justice-August-11-2007.shtml']SOURCE[/URL][/SIZE]). [spoiler]October 2000: The Wall Street Journal reports that a candidate running for the U.S. Senate began receiving anonymous emails containing messages written in MS Word criticizing and attacking the candidate. A savvy aide looked at the document properties and discovered they were authored by the chief-of-staff of the opposing party. February 2003: A dossier on Iraq's security and intelligence organizations, cited by Colin Powell and published by 10 Downing Street, is discovered to have been plagiarized from a U.S. researcher on Iraq. Since the dossier was published on their website in MS Word format, researchers also discovered the four people in the British government who edited the document. They were subsequently called to Parliament for a hearing. March 2004: SCO Group , seller of UNIX and Linux, sent out a warning letter to 1,500 of the world's largest companies threatening legal liability for using Linux if they failed to obtain a license from the Utah-based company. After filing suit against Daimler-Chrysler, metadata in a MS Word version of the suit revealed that the SCO's attorneys had spent a good deal of time aiming the suit at Bank of America instead. May 2005: Derrick Max, the head of two supposedly independent, nonpartisan groups who support overhauling Social Security, e-mailed his testimony on Social Security to the Senate but forgot to turn off "track changes". Turns out the associate commission of the Social Security Administration, who was on loan, working out of the White House, edited Max's "independent" testimony. October 2005: United Nations issued report on Syria's suspected involvement in the assassination of Lebanon's former prime minister, Rafik Hariri. Recipients of a version of the report were able to track the editing changes, which included the deletion of names of officials allegedly involved in the plot, including the Syrian president's brother and brother-in-law December 2005: President Bush delivers speech at the U.S. Naval Academy outlining a new "National Strategy for Victory in Iraq", which was posted on the White House website. The New York Times, using Adobe System's Acrobat software that shows the document was created by "feaver-p" reveals that the speech was largely written by a Duke University political scientist, Peter D. Feaver.[/spoiler] [/QUOTE]
Insert quotes…
Verification
Post reply
Top