How to disabling Geo-Tagging on your phone

The storage of location based data, in the form of Latitude and Longitude inside of images is called Geotagging; essentially tagging your photograph with the geographic location. This data is stored inside if the metadata if JPEG images and is useful for tying the photograph to a location. Want to remember exactly where you took those photographs while on vacation? This information is for you.

However, most modern digital cameras do not automatically add geolocation (Latitude and Longitude) metadata to pictures. The process for adding the geolocation data either requires specialized add on hardware, or post processing with software on the desktop after the pictures are taken.

There is a large exception to this rule: Smartphones. With the proliferation of smart phones that contain GPS locator technology inside, the cameras in these devices are already equipped with the specialized hardware to automatically add geolocation information to the pictures at the time they are taken.

Most people don’t realize that the action of automatic geotagging takes place on their smart phones, either because it is enabled by default, not exposed the user as an option, or was asked and then forgotten. As a result, individuals often share too much information about their location, right down to the exact Latitude and Longitude when snapping photos with their smartpphone and posting them online.

How do I disable this? Continue reading…

Related Posts

Guest account and user management on Mandriva 2011 Creating and managing user accounts are very basic tasks that you would need to perform on any operating system. If you are new to Linux and to Mandri...
Install NetworkManager on Hymera Open The network manager application that comes pre-installed on Hymera Open, a Debian-based, desktop-oriented GNU/Linux operating system, is Wicd. While ...
Debian 6 installation and disk partitioning guide Debian 6.0, aka Squeeze, is the latest release of Debian, a multi-purpose, GNU/Linux distribution. Like previous releases, Debian 6 (Debian 6 review)...
Got a PRISM and Boundless Informant problem? Whisper and Tor can help PRISM and Boundless Informant. Don't you just love names like that. They have a nice ring to them. But do not be fooled. Those are bad for your privac...
Top 6 KDE distributions of 2011 There are perhaps hundreds of KDE Linux distributions available, and like an active volcano, more are "erupting" at a rate that is tough to keep pace ...
Managing startup applications in GNOME 3 If you wanted to set up an application or applications in GNOME 3 to launch on boot, you'll probably go looking for a module in the desktop's System S...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*