Trace my shadow is a tool that allows you to get a glimpse into the digital traces you're leaving - how many, what kinds, and from what devices.
Start by selecting the device and services that you use. See how many traces you leave and what you can do take control of you traces.
Whats App
Whats App is a short messaging platform and social network that allows users of mobile phones with a data plan to exchange short messages with every contact in their address book, bypassing the fees involved in sending SMS text messages. Whats App requests access to the contact information of everyone in your address book and copies this information on their servers. Whats App has been known for several security flaws in the past.
SMS / MMS
SMS (Short Message Service) is a form of text messaging communication on mobile phones. MMS (Multimedia Messaging Service) is a way to send messages that include multimedia content like images and videos on mobile phones.
Both SMS and MMS are inappropriate for confidential transactions. With the right equipment and/or expertise, SMS and MMS communications can be intercepted and falsified. They are also able to be seen and logged by the mobile provider.
Phone number
A phone number is a unique communications identifier provided by the mobile/telephone company. For mobile phones, it is associated with the SIM card and identifies your country and the mobile provider. For older landline telephones, phone numbers represent the country, local area code and a unique combination of 6-7 numbers.
Operating system updates
This includes system updates and registration update logs on the OS vendor/provider site. Operating systems undergo regular development to fix known problems and add new features. When your computer is online the OS can check automatically or manually the OS manufacturers update servers, to check for new updates and download and install these onto your computer. Updates are usually determined by the OS version number. Once an update had been installed the OS version number is incremented to the latest OS version number.
Operating system version number
A version number is a unique number given to each release of an operating system, programme, hardware model, firmware, or driver. Higher numbers are applied to newer or more up-to-date hardware or software. Version numbers can identify the specific release of the operating system installed on your computer or mobile phone as well as how long it has been since your software was updated. The version number can help you determine when your operating system requires an update, but it can also be used maliciously to reveal if your operating system is insecure. Older versions of an operating system often have known vulnerabilities that can put you at risk.
Logs
MAC Address Logs on Router
Logging of MAC addresses is usually done only on the immediate router or host that provides the IP address to MAC address association. Although on some networks the MAC address is logged as well on some routers within the local network. The logs track the IP addresses used by specific hosts on the network and helps in routing the traffic on a network.
To get online on the internet you will need an IP address. Currently IP addresses are provided dynamically by computers (configured specifically for this purpose of giving out IP addresses) known as routers. Since no two IP addresses can exist on a network there has to be a way to track down assigned IP addresses. This is where the MAC address comes in. The MAC address of a computer is logged onto the router with the details of what IP address it has been assigned so that when an IP address will no longer be assigned to another computer. This means at any given time communication on the internet can be tracked down to the level of the actual computer.
Date/Time Access logs of Internet
Every time your computer accesses the internet, the logs will be recorded on your computer and on the internet access point. This gives access to a database of the user's computer and internet activities.
Visited IP Address Logs
Every time you browse a website, your IP address is recorded on the server that hosts the website. This is precious information for the website hosts as they can analyse your internet activity and use it, for example, for targeted advertisement.
Internet Services Access Logs
These are the log files that are kept by Internet service providers (ISP). All Internet traffic can be monitored by the ISP.
Device Name Logs on Router
Every time as a user you are connected to a router, your log details will be registered.
Browser History
The browser history displays the list of web pages a user has recently visited, with the exact page titles and times of the visit. It is recorded by web browser software as a default for a certain period of time. Anyone who has access to your computer is able to retrace which internet sites you have visited. This is especially the case when using a computer in a public space like an internet café.
MAC Address
The MAC address associated with a particular network adapter (the hardware that allows your device to connect to the Internet, either wirelessly or through an ethernet cable) is one of several unique hardware IDs on computers, phones and other devices. Bluetooth adapters and mobile phone (GSM, 3G, LTE, etc.) “baseband radios” also have unique IDs. Since every network interface has a MAC address, and they are required to be unique, they are often used to uniquely identify a particular computer. However, software exists that allows you to temporarily overwrite your MAC addresses with a custom value. This can be a a good way to protect your privacy on public wireless networks.
My Apps
Apps, or applications, are software that are either pre-installed on the device you are using or that you installed yourself, typically from an “app store.” They are are similar to other pieces of software you may have installed, but there are a few differences worth taking into account. When you install software from an app store, you provide the company running that store with a complete list of software and versions you have installed on your computer. This can be useful, of course, as it helps you keep your apps updated, but it also allows the app store and the company that runs it to track your usage of these applications.
Your interaction with advertisements displayed through apps cannot be tracked by advertising companies in the same way as browser based ads, which are monitored using cookies. For this reason, there are now several new mechanisms - including Apple's IFA (identifier for advertisers), Google's Android ID, and comparable techniques from Microsoft and some larger online advertisement networks - being developed to help advertisers track your use of apps on mobile phones, computers and gaming consoles as closely as they currently track your browser activities.
IMSI
An International Mobile Subscriber Identity (IMSI) number is a 15-digit serial number that identifies your SIM card. It is used to identify your account. Similar to your phone's IMEI (International Mobile Equipment Identity) located on your phone, it is used to identify you on a mobile network.
Language
Even in cases where it is not absolutely necessary, choosing a language in your computer, mobile phone, Facebook, Twitter or Google settings often helps improve your user experience, but it can also lead to targeted marketing and advertisement campaigns.
IMEI
An International Mobile Equipment Identity (IMEI) number is a 15-digit serial number used to identify your phone or mobile device. It is used to identify your phone's handset and can be accessed on most devices by keying in *#06#, looking behind the battery inside the handset or by checking your phone's settings. Similar to your phone's IMSI (International Mobile Subscriber Identity) located on your phone's SIM (Subcriber Identity Module) card, it is used to identify your phone's handset as part of your full identity on a mobile network.
Flash Cookies, Local Storage and Web Beacons
Tracking your browsing habits is mostly done through Cookies. But there are also other methods to track the websites you browse and the apps you use:
All of these are known for tracking user behaviour.
E-books
E-books are digital books and are available in different file formats. There are different types of e-book readers, and each of them supports several formats. Many of these e-book readers (both hardware and software) monitor your searches for books as well as your reading. The main e-book platforms, such as Amazon Kindle and Google Books, store this information and might share it with third parties.
Computer serial number
A serial number is used to identify a computer. It is also used for ownership identification and for warranty purposes. The device serial number collectively ties up all of the other components that have individual serial numbers. When you purchase a computer, the serial number is usually part of the financial transaction, and is indicated in the official receipt and warranty card. If you purchase a computer with a credit card, this serial number is also tied to you through the credit card information.
In addition to the serial number assigned to your fully assembled computer by the company that produced the final product, there are serial numbers in parts of the computer, such as the main processor (CPU) or the hard disk drive, that may be registered with the company from which you bought your computer. As a result, these numbers can be linked back to you.
For example, software running on your computer may use these serial numbers to detect multiple installations of commercial software that you only have a license to install once. Similarly, these unique identifiers can be used to link multiple online accounts back to you, and to keep tracking you even if you reinstall your computer's operating system.
Computer specification (Hardware)
Computer hardware specifications are technical descriptions of the computer's components and capabilities.
Cookies
Cookies are small text files stored in your web browser or email client. They are placed on your device by websites you visit or ads you view while surfing the web. In some cases, cookies are necessary. They may be required to log in to some online accounts, for example. So-called third party cookies allow advertising networks to track your browser activity, even across several, unrelated websites.
Browser History
The browser history displays the list of web pages a user has recently visited, with the exact page titles and times of the visit. It is recorded by web browser software as a default for a certain period of time. Anyone who has access to your computer is able to retrace which Internet sites you have visited. This is especially the case when using a computer in a public space like an Internet café.
BBM Pin
A BlackBerry Messenger (or BBM) pin is a unique number that is associated with a BlackBerry device. It uniquely identifies the device, particularly for the use of BlackBerry's Messenger services, in order to route and track messages, emails, and other data between devices and accounts within the RIM network and the networks of supporting mobile providers. Because of this, it is often tracked by BlackBerry Enterprise Servers and related BlackBerry services. It cannot be altered manually on a device by the user.
While BBM PIN messages are encrypted by default, breaking this encryption is trivial, which renders it useless.
Browser Fingerprint
Browser and device fingerprinting allows websites to track you on the web as an alternative to using cookies for the same purpose. Many users know that they can refuse to accept cookies or delete them. Advertising companies therefore start using new methods for tracking: the browser fingerprint is one of them.
Fingerprinting is done through analysing the information your browser sends to the server of the website you're browsing to. Among them are your language settings, installed fonts, your user agent (which browser), your display resolution and others. Their combination will show a rather unique pattern, just like a fingerprint. Some of this information is only transferred when Javascript is active in your browser. Studies have shown than more than 90% of browsers and thus their users can be uniquely identified only by analysing the browser fingerprint.
Phone manufacturer registration
Phone manufacturer registration involves a globally unique number identifying the physical handset of a mobile phone. For devices on GSM networks, this is an IMEI (International Mobile Equipment Identity); for devices on CDMA networks, this is called a MEID (Mobile Equipment Identifier). In addition, you often have to register your personal identity with a device manufacturer in order to receive system updates on that device.
Phone networks
When you use your mobile phone or tablet to connect to the Internet, your Internet connection is often passed through proxy servers run by the phone network operator. These proxies may copy or modify your Internet traffic. For example, there have been incidents when phone network operators forwarded requests to websites with the user's mobile phone number attached. This allowed the servers which run the websites these users visit to know their phone number.
Internet Service Access Logs
These are the log files that are kept by Internet service providers (ISP). All Internet traffic can be monitored by the ISP.
Device name logs on router
As a user, every time you are connected to a router, your log details will be registered.
Twitter lists you created or you belong to
This feature helps to group people and/or organisations you are following. Individual Twitter lists are accessible to anyone by default but can be set to private. Clustering people and/or organisations puts them into categories that might give indication about their activities, their political, religious views or sexual preferences.
Visited IP Address Logs
Every time you browse a website, your IP address is recorded on the server that hosts the website. This is precious information for the website hosts as they can analyse your Internet activity and use it, for example, for targeted advertisement.
Third party applications
Third party applications are service platforms like the Guardian app or Spotify that are usually compatible with social platforms like Facebook or Twitter. They are not provided by the operating system but by other companies and service providers. By integrating third party applications in social platform activities, a user is likely to give away personal details and preferences to the owners of the third party applications.
Tweet posts
A tweet is a short message sent by the user to his/her followers. It is restricted to 140 characters and can also contain pictures, videos, news link or other content. However, if a tweet is retweeted i.e. forwarded by one of your followers, your tweet is exposed to a much larger audience - this includes those who are not directly following you.
Retweets
The retweet function forwards tweets to the users' followers. A tweet can therefore be put in circulation to those who are not directly following the users' Twitter accounts. The retweet contains the name of the original author of the tweet in order to give credit. A retweet of the original tweet can therefore always be traced back to the original author.
Skype
Skype is an Internet video, voice and text chat network and application. Initially, Skype was a mostly decentralised service that delivered your calls by forming a network amongst Skype users. As a result, your calls rarely went through the company's own servers.
Today, Skype is owned and operated by Microsoft and is a fully centralized network: all calls are routed through Skype's servers, and Skype (as well as US surveillance and law enforcement organizations such as the NSA and the FBI) have the capability to intercept your calls and messages. In 2012, Skype handed over an activist's personal information to authorities without a warrant, violating its own privacy policy.
Skype is a closed protocol so others can not easily tell how it works, evaluate its security or build “skype compatibility” into alternative tools. The Skype source code is also disguised to prevent other software developers from understanding how it works.
Operating system registration
Previously, operating system (OS) registration for Microsoft Windows was mandatory (as part of their effort to curb the proliferation of illegal copies), but you actually had to walk through the registration process yourself. These days, OS registration is typically either automatic or optional.
My videos
Users can upload and share videos on platforms such as YouTube, Facebook or Google. Facebook has also released their own application for sharing videos on the internet and through Facebook Mobile when using a webcam recording feature. By uploading these videos users are often unintentionally giving away information about tagged people, IP addresses of the uploader and precise information when and where the video was recorded.
My voice calls
Any mobile phone can be set to record and transmit any sounds within the range of its microphone without the user's knowledge. Some phones can be switched on remotely and brought into action in this way, even when they look as though the are switched off.
My photos
Any photos that a user uploads on social media services are stored and made public by default. Additional information such as tagged people, date and location, when and where the picture was taken, what type of device and the IP address is therefore exposed.
My profile data
This is the personal data a user is giving away when starting an account with a social network platform like Facebook or Twitter. Giving away personal data can mean giving up control over this information. Platform operators might use and analyse this data for a number of purposes like advertising or simply processing it in way a user is not aware of.
My geolocation
Applications with geolocation features, like Google maps, can often determine the real-time, real-world location of your internet-connected mobile phone or computer, even if the device does not have built-in Global Positioning System (GPS) technology. Similarly, social networking sites like Facebook often store the last location from which you accessed them. They determine this information by looking up your IP address in a geolocation database and by analysing data that you provide through apps, geo-tagged photos, etc.
My Google search results
Google search results include both organic search results but often paid advertisements as well. Search activity is therefore analysed and matched with promotional offers that seem to fit the search preferences of a user. Google also stores browser histories of its users.
Groups
This is the list of online groups that a user has subscribed to, such as groups within social networks. These groups might give away information on your cultural, political, religious views or sexual preferences.
Gmail Contacts
When you use Gmail, all of the people you send mail to and receive mail from, as well as all the content you send or receive, is fed into Google, allowing them to extend your social profile a great deal. If e-mails you send or receive contain web links to a political event or to a dating site, this tells a great deal about you, as do the people you are in touch with and, including the interests and preferences of those people.
Google Analytics
Google Analytics is an online service for website owners which allows them to learn who uses their website and how. While it is easy to install and use for these webmasters, it means that information on all the users on this website is sent to Google where it is stored and correlated with your use of other Google services which you may use knowingly (searches, email, contacts, calendar and many others) or unknowingly (Adsense, G+ icons on other websites, Google CAPTCHA, content hosted in the Google cloud etc.). This allows Google to effectively track your Internet use across most websites, whether or not they are directly related to Google.
Google Calendar
Google Calendar is a free of charge time management web application offered by Google. Users are required to have a Google account in order to use the software. Events are stored online, meaning that the calendar can be viewed from any location with a device (computers, mobiles and tablets) that has internet access.
By using Google Calendar you might share a lot of personal information with Google: where you will be and when, what you will be doing and with whom. Be aware that you are sharing this information with a company that will not hesitate to combine it with a lot of other information about you and other users of Google services to enhance the profile they keep about you.
Google maps I created
Google maps allows users to create their own maps. This includes adding texts, drawings, images and videos. A Google map can be embedded in social platforms like Facebook. It exposes the places you visited, where your current residency is, as well as residency details of friends and family members.
Flickr
Flickr is a photo gallery and photo hosting service. To be able to use Flickr you have to agree to the service agreements which allow Flickr to analyse, share and sell your photos, which includes running them through facial recognition software and using them in advertisements.
Followers
The Following feature on Twitter shows the individuals and/organisations that you follow. Any user can access this list when scanning your profile. Information about your cultural, political, individual, religious views or sexual preferences are therefore exposed to a much larger audience than only those who are following you. Also, it gives others an idea of your own preferences. This feature is public by default.
G+ posts
Gmail
Gmail is the e-mail service provided by Google free of charge. While Gmail makes it easy to access your mail and offers a reliable service without direct payment, you do pay them by disclosing information about yourself (the content of your emails) and about other people (everyone you send emails to and receive from). Running a mail service does involve costs, Google refinances this by using your personal information in ways you may not like, such as through selling or giving it to third parties.
Google is known to routinely scan the content of all email sent through their service and is also one of the companies that have been revealed to co-operate with the NSA.
Facebook wall posts
The wall is the original profile space where Facebook users' content is shown. It allows the posting of different content like notes, videos or photos and displays the time and date of the posting. The content on a user's wall will be treated according to the users privacy settings. However, if a user posts a content on a friend's wall, this content is treated according to the privacy setting of the friend. That means that it can be visible for everyone on the internet.
Financial information
Purchasing goods via the internet means a user has to divulge bank or money transfer details. This financial data is then at risk of being exposed to methods like phishing. This method enables hackers to steal information such as usernames, passwords, credit card details or even to hack into the actual bank account.
Events
Events can be organised via social networks like Facebook. They let friends know about upcoming events in their community. This information can be tracked, because the event displays the event name, date, time, maybe meeting point and the list of people who were invited.
Facebook Likes
By clicking the Facebook "Like" button a user gives positive feedback on a content contribution such as status updates, photos, and links posted by their friends, as well as adverts. This makes the content appear in the friends' news feeds. Facebook collects data through users clicking the "Like" button and links users' browsing habits to their social networking profile which often contains the user's name.Facebook messages
Facebook allows users to send messages to each other via an integrated messaging system. This also includes a chat service. A Facebook user can send a message to any number of his/her friends or a group of friends at any one time. However, deleting a message from your inbox only means that the original message is invisible to you, it is not deleted from the inbox of other users. According to Facebook's privacy policy, messages on Facebook cannot be deleted anymore.
Direct Messages sent to me and by me
A Direct Message (DM) is a personal message which can only be exchanged among those who follow each other. If either the sender or the recipient deletes a DM, the respective message disappears for both of them. It is not clear whether Twitter stores deleted DMs when they are deleted by the users.
Email address
An email address is a unique identifier for sending and receiving digital messages. However, email addresses are frequently used as general purpose online identities, even for activities that have nothing to do with email. The name before the “@” sign is typically a reference to an individual, organisation or service. The text after the “@” sign is generally a domain name where the email account is located on the Internet. For example, "name@domain.org" corresponds to an email user called “name” on a system located at "domain.org".
Credit Card / Debit Card / Cash
Every time you use a credit card or debit card to pay for a device or service this information is stored by your bank and the credit card company. Your bank will thus be able to know what you purchased and where and make this information accessible to others such as law enforcement agencies when required to do so.
Date and Time
The date on which you purchased a computer, a mobile phone or service plan might be used to link your identity with a period of time during which you used that particular device or service.
Contact information
All contact details put on social media services like Facebook are stored and are public by default.
Causes
Causes is a feature that is integrated with Facebook. It invites individuals or groups to initiate and/or support philanthropical projects. Starting and/or supporting a project can only be done via Facebook, therefore this activity becomes exposed to your friends. This information might give away indications about your cultural, political, religious views or sexual preferences.
Application access logs
These updates include pre-installed applications' updates, applications' registration updates, other installed applications and updates and update logs on the application provider/vendor site.
Application Updates
These updates include pre-installed applications' updates, applications' registration updates, other installed applications and updates and update logs on the application provider/vendor site.
Address
The user is obliged to give away information like his/her home address and/or sensitive billing information. This might not only apply when you sign a mobile phone and internet contract or purchasing goods online, but also for social network platforms like Facebook or Twitter.
IP address
Your IP address is a unique number assigned to your router or modem by your Internet service provider. It can be seen by every website and every server (including mail, instant messaging, VoIP and FTP servers) to which your computer connects. As such, an IP address identifies your household, and may identify you personally if combined with other traces like the browser software you are using or your billing information. Currently, most IP addresses look something like this: 123.123.123.123.
However, a new standard called IPv6 is being introduced that will result in IP addresses that look more like this: 2001:0db8:0000:0000:0000:ff00:0042:8329. With this new standard, a unique IP address will be assigned to every computer (or other Internet-connected device). This change will introduce even more privacy risks.