Hey all,this is a pretty simple post, so Ill keep it quick. Yesterday, someone released a dump containing several archives of Darknet black-market sites for research purposes. This looked interesting, so I took them and did a little research.
One of the suggested uses by gwern was:
deanonymization and information leaks (eg GPS coordinates in metadata, usernames reused on the clearnet, valid emails in PGP public keys)
Sounds like a good start to me.
For my target, I chose a random archive with a decent amount of data. I wanted something that had potential. I also decided to only look at .jpg images. I did this so I could standardize on the method in which I collected the data.
I then hacked together a script that would extract all of the files I wanted from the tar.gz. The script would then get each files latitude and longitude if it existed within the metadata of each image.
After parsing hundreds of thousands of images, I came across about 37 unique images that were not properly sanitized. This means that the files contained exif data which may identify the latitude and longitude where the pictures were taken. (Keep in mind, this data could also be spoofed). Overall, it appears as if these images came from just a handfull of individuals.
So thats it. Have a good weekend!