37.6 C

How to protect yourself from metadata



1min read

TECHNOLOGY expert Benjamin Finn, in an interview conducted by Reporters Without Borders (RSF),  warns about the threat posed by metadata, listing the tools available for journalists to protect themselves and their sources.

He said: “Metadata reveals vital information that can be used against both the sender and receiver.

“In its strictest sense, metadata is data that describes data. Different platforms have different metadata needs for their operation, which includes information such as date, time, filename, settings, location, email header, recipient, server names, software, and more.

“ It can also include what a user clicks on, how long they stay on a page, what a user purchases, and every trackable habit or interest a user displays”.


Ten apps to monitor and track your child’s Internet activities

Nigerian rating agency partners Europe’s fintech firm to revolutionise credit risk

- Advertisement -

Consumer Protection, Police, raid Gocash, Okash, Easy moni, other loan shark firms in Lagos

How loan apps debt recovery agents operate

He added that there is metadata on everything a user does on a computer including personal computer files, documents, social media, and all web searches.

“ These can be combined across multiple platforms using profiles and trackers, also known as cookies, to gain a deep understanding of who someone is and even to predict their online behavior”.

Finn said that” Since ISPs have access to a large amount of information by default, combating privacy issues can be a difficult task. There is no way to completely eliminate the risk of being tracked through metadata, but the following can increase privacy while online”.

Here are ways Journalists can protect themselves and their sources

Use a Virtual Private Network at all times – a good VPN can mask some metadata such as IP addresses.

- Advertisement -

Install apps like Privacy Badger, which reduces the tracking systems that social media sites use. Have a designated device only for social media, and never use it for secure discussions.

Use a security-focused browser like Brave or Tor. If possible, use the Tor system itself and not just the browser.

Use security-focused apps for communication like Signal.

Use encrypted email services like ProtonMail and encourage sources to do so as well, because this email service only offers strong protection when used with another ProtonMail account.

Use burner phones and when not in use, keep them powered off with the battery taken out. Be sure to use a different ISP than your everyday phone, with a dedicated SIM card.

Use a physical exchange of large files without directly meeting a source, for example by using a post office box. If meeting a source is necessary, do not bring along any device.

Support the ICIR

We invite you to support us to continue the work we do.

Your support will strengthen journalism in Nigeria and help sustain our democracy.


If you or someone you know has a lead, tip or personal experience about this report, our WhatsApp line is open and confidential for a conversation



Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Support the ICIR

We need your support to produce excellent journalism at all times.



Deborah: Two suspected killers arraigned, remanded in prison custody

TWO suspects were on Monday arraigned in court for allegedly participating in the killing...

Varsity students protest lingering ASUU strike in Ogun, Oyo

University students in Oyo and Ogun states on Monday staged protests against the lingering...

FCTA demolishes Abuja mini market

THE Federal Capital Territory Administration (FCTA) on Monday demolished a mini market at Area...

Police arrest four over lynching of sound engineer in Lekki

THE Lagos State Police Command says it has arrested four suspects over the lynching...

How hackers unlock, steal vehicles – NCC

THE Nigerian Communications Commission (NCC) on Monday warned that hackers have deviced ways to...

Most Read


Subscribe to our newsletter