A thourough and scary analysis of what you can do with just metadata, applied to the hacking team leak.
A great case for mistrusting metadata storage by anyone.
Robin Edgar
Organisational Structures | Technology and Science | Military, IT and Lifestyle consultancy | Social, Broadcast & Cross Media | Flying aircraft
robin@edgarbv.com
https://www.edgarbv.com