📋
Operational security for activists
  • Home - Operational security for activists
  • Mobile phone security
  • Secure digital communication
  • Email, online banking, and social media security
  • Running a pseudonymous social media account
  • WiFi security
  • Virtual Private Networks (VPNs) and Tor
  • Editing images for security
  • Laptop security
  • How the government tracks your location
  • Talking to journalists
  • Glossary
  • Further reading
Powered by GitBook
On this page
  • Strip EXIF information, including GPS location information.
  • Do not use blurring tools to censor images. Censor images with a solid color brush.
  • Censor faces, including ears and hair.
  • Censor detailed images of hands and fingerprints.
  • Censor revealing reflections, including reflections inside people's eye pupils.
  • Censor identifying marks such as tattoos and clothing.

Editing images for security

Learn to edit images to preserve anonymity.

PreviousVirtual Private Networks (VPNs) and TorNextLaptop security

Last updated 4 years ago

Strip EXIF information, including GPS location information.

EXIF stands for Exchangeable Image File Format, and often refers to the metadata that is stored in many image files.

EXIF data may include information like:

  • The camera used to take an image.

  • Various camera settings, like shutter speed, aperture, and ISO speed.

  • The names and versions of any photo editing tools.

  • The GPS location the picture was taken--as mentioned above.

Some image-sharing sites, like Flickr, proudly show EXIF information for images by default. Other sites, like Twitter and Facebook, strip the EXIF information from images that are uploaded, making them unavailable to other users that see these images. However, if you rely on these sites to strip EXIF information, you are trusting them with it. It is better for security to remove EXIF information before sharing or uploading pictures.

Here are various resources for removing EXIF information by platform:

Do not use blurring tools to censor images. Censor images with a solid color brush.

Censor faces, including ears and hair.

Censor detailed images of hands and fingerprints.

Censor revealing reflections, including reflections inside people's eye pupils.

If you are taking a picture of a scene with reflections--mirrors, windows, ponds, etcl--you may end up appearing in the image even though you are behind the camera. Always make sure to censor any reflections that could reveal something you intend to hide.

Censor identifying marks such as tattoos and clothing.

Tattoos, piercings, and clothing may be another way that a photo of someone can be de-anonymized. Before you share a photo of someone whose identity you want to conceal, make sure that all such identifying marks are censored.

The encrypted messaging app Signal . Note that it will not automatically blur other identifying marks like tattoos and logos with clothing.

It is possible for machine learning models to reconstruct faces based on or potentially other body parts. In order to defeat such models, it is important to censor as much of a person's face and uniquely identifying features as possible.

Images of fingerprints can of who owns the hands. Alternatively, photos of your hands can be used to --potentially using those duplicates to trick fingerprint scanners.

When you are taking a picture of a person's face, check the pupils of their eyes for revealing reflections. A man stalking a pop star based on images containing pupil reflections.

iOS
Android
Mac OSX
Windows
Linux
also offers a tool for automatically blurring faces
images of ears
reveal the identity
duplicate your fingerprints
managed to find her home