Legal

How dangerous is image file metadata?

Unless your digital camera or camera equipped cellphone is more than fifteen (15) years old, the chances are good that any pictures taken with that device contain metadata; which describes the (who, what, where, when and how) conditions under which the picture was taken. The metadata is stored with the picture in an image file, and goes everywhere the file is copied, uploaded or downloaded. But as Catherine (Cat) Schwartz learned in 2003, certain kinds of image file metadata can be rather embarrassing. At the completion of a three (3) month qualitative risk assessment, The Assurer answers the question, “How dangerous is image file metadata?” Some of the more interesting results are that high risk probability for the iPhone 4 decreased 11.5% from the 3gs, while the amount of metadata created by the Droid 2 increased by 16% over the original Motorola Droid…

The dark side of mobile Augmented Reality

As smartphones become more popular, the use of mobile Augmented Reality (AR) applications has increased. But there lurks a “dark side” to Augmented Reality. One that is not being publicly discussed, that affects us on many personal, civil, criminal, and national security levels.

Text messages — Is it them… or someone else?

How can you be certain the person you are exchanging texts with, is who you think it is? The caller ID and that cute little contact picture, only tell you whose phone sent the message! Unlike phone calls there is no heuristic method by which you can be sure of who is on the other side of the keypad.

A Personal Security Classification Taxonomy (PSCT)

Learn how to create and use, a Personal Security Classification Taxonomy (PSCT) that is on par with how governments protect their own secret information. Includes real life examples of PSCT in action.

Bad dog!

They say that “On the Internet, nobody knows you’re a dog.” But what happens if your ex-boyfriend is a dog, who is hounding you, in an effort to sully your online reputation?

Legislation of software design

The Informed P2P User Act (HR 1319) makes it illegal for P2P software to inadvertently share files over a P2P network without a user’s knowledge.

The fallacy of Unclassified information

The common belief by the public, about Unclassified information; is that it is harmless, general knowledge; available to anyone, and is of little or no strategic value. Contrary to this belief, the term “Unclassified” refers to information that possesses one or more of the following attributes…

Pirates versus Internet Service Providers

Court orders ISP to disconnect The Pirate Bay from the Internet. But the lack of an adequate Disaster Recovery and Contingency Plan (DRCP) left it unprepared for what happened next.

Website Terms & Conditions

Users are granted access to TheAssurer.com website, subject to the following Terms & Conditions…