By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: This ‘invisible’ data trail can reveal your location and sexuality to scammers
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > This ‘invisible’ data trail can reveal your location and sexuality to scammers
News

This ‘invisible’ data trail can reveal your location and sexuality to scammers

News Room
Last updated: 2025/08/21 at 4:06 AM
News Room Published 21 August 2025
Share
SHARE
From photos to emails and texts, metadata is everywhere (Picture: Getty)

An ‘invisible’ layer of all our technology is a gold mine for scammers – and most people have never heard of it.

All digital content – every text you send, photograph you take and file you upload -has underlying information embedded in it called metadata.

As much as that sounds harmless, these digital fingerprints can be used by hackers to connect the dots of your life story, cyber experts told Metro.

Yet, almost three-quarters of people (72%) in the UK surveyed by the cybersecurity firm NymVPN said they do not know what metadata is.

Only a quarter of people (27%) are worried about metadata, according to the survey findings shared exclusively with Metro.

What is metadata?

If data is treasure, metadata is the treasure map, explains Harry Halpin, CEO of NymVPN.

‘Imagine you’re sending an email to a friend. What you write to them in the email is, in fact, the second form of information,’ says Harry.

‘Since this is personal, you hope it’s protected and that no one except your friend can read what you write.’

Harry said that emails are encrypted by default, making it hard for snoops to read what you’ve said.

An email’s metadata, however, isn’t, leaving people open to privacy breaches, profiling and tracking.

If hackers break into your email account or gain access to your phone using malicious software, they can use this information to identify targets and create social engineering scams – fraudsters pretend to be someone else to trick victims into divulging personal information.

EXC, TECH: This 'invisible' part of your tech is a gold mine for scammers - and three-quarters of Britons have no clue what it is
Metadata is the data of data (Picture: Getty/Metro)

‘It could be your or your friend’s email addresses, the time you sent it, or even the location it was sent from,’ Harry added.

‘If enough metadata is collected, a very detailed picture of your entire digital life can be discerned: who your contacts are, when you contact them, what sites you visit and how often.

‘It could tell people if you’re ill (such as visiting hospital websites and pages visited), or what your sexual preferences are (adult content you access regularly).’

For librarians, software developers or researchers, none of this is new. It’s part of their day-to-day work, mining metadata to help organise things.

But it’s new information for some people in the UK, with less than a quarter (24%) of people believing that a text message’s metadata includes who’s in their contact book. Only a third (36%) said a message’s timestamps are in the metadata.

Six in ten people (61%) are worried that this hidden information can be used to track them without their consent, while 27% of people were worried about its potential for mass surveillance by malicious users.

This 'invisible' part of your tech is a gold mine for scammers - and three-quarters of Britons have no clue what it is
A photograph’s metadata on an iPhone, featuring the specifics of the camera and the GPS location (Picture: Apple)

Fewer than 27% of the people surveyed, however, worry that hackers or government officials may use it to keep an eye on them.

In the UK, officials and regulators tend to consider metadata as less sensitive, Harry adds. Even if a digital asset is deleted, the metadata can leave behind a breadcrumb trail.

‘Metadata is the raw material of mass surveillance, and artificial intelligence [AI] systems are making it more and more refined,’ Harry added.

In 2018, academics were able to use metadata of posts on X, then Twitter, to pick out individual users out of 10,000 accounts 96.7% of the time.

Another study found that it’s possible to identify someone by rifling through the metadata of their nameless credit card transactions – the purchase data, amount charged and name of the store.

A person is using a laptop and a cell phone, both of which are connected to the internet. The laptop screen shows a globe with various icons
A cyber expert told Metro that he worries metadata can be used to identify people with (Picture: Getty Images)

The uniqueness of a person’s shopping habits makes them easy to single out, the researchers said, which can be combined with social media posts to put a name to the transactions.

The Massachusetts Institute of Technology ran an online programme in 2014 that could create a spider web of personal information out of the metadata in someone’s emails.

If you sent yourself emails from your work, school or other personal accounts, the programme would be able to use the tucked-away data to figure out where you’ve worked and which school you attended.

For those wary of metadata, Harry recommended people look into VPN (or virtual private network) services.

A VPN creates a secure tunnel between your computer and a service at another location, with some able to ‘scramble metadata and generate “noise” that makes it extremely difficult for anyone to trace your activity’, Harry added.

Get in touch with our news team by emailing us at [email protected].

For more stories like this, check our news page.

Comment now
Comments

News Updates

Stay on top of the headlines with daily email updates.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article How Nexo’s AI Changes Crypto Account Management With Built-In Native Intelligence | HackerNoon
Next Article 10 Best AI Automation Tools for Productivity in 2025 (Free & Paid)
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

How I Spinned up an Onion Mirror: It’s Stupidly Easy | HackerNoon
Computing
Chevy's New Bolt Electric Car Is Truly Affordable, at Less Than $30,000
News
AI factories: Data centers of the future – News
News
What You Need to Know About Advanced Patterns for Symfony HttpClient | HackerNoon
Computing

You Might also Like

News

Chevy's New Bolt Electric Car Is Truly Affordable, at Less Than $30,000

5 Min Read
News

AI factories: Data centers of the future – News

30 Min Read
News

TP-Link Archer GE650 BE11000 Tri-Band Wi-Fi 7 Gaming Router Review: An Eruption of Pure Speed

5 Min Read
News

Best AI deal: ChatPlayground AI’s Basic Plan for just $39.99

2 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?