Our only URLs are

All other sites are scams – especially be wary of:

benumbs.cards & bennumb.cards & bennumbs.cards & benumb.cc & many more…

(it can be hard to notice the S and extra N if not careful.) 

Welcome to the real deal. 

Please bookmark this link — the other sites have simply copy/pasted our html and don’t actually have any cards to sell. 

They can be easy to fall for if you aren’t cautious!

Retrieving EXIF Information from a Facebook Image

When you upload a photo to Facebook, you may not realize that it contains a wealth of information about the photo itself. This information is known as EXIF data, and it can tell you a lot about the photo you’ve uploaded.

EXIF stands for Exchangeable Image File Format, and it’s a type of data that’s embedded in photos. It contains information about the camera used to take the photo, the settings used, and the date and time the photo was taken. It can also include information about the software used to edit the photo, the location where it was taken, and even the camera’s serial number.

This data can be useful for photographers who want to keep track of their work. It can also be used to help identify the source of a photo if it’s used without permission.

Facebook doesn’t display EXIF data by default, but it’s still there. To view it, you’ll need to download the photo and open it in an image editor. Most image editors will display the EXIF data in a separate window.

EXIF data can be a useful tool for photographers, but it’s important to remember that it can also be used to track your movements and activities. If you’re concerned about your privacy, you may want to consider disabling EXIF data in your camera or editing it out of your photos before you upload them to Facebook.

5 thoughts on “Retrieving EXIF Information from a Facebook Image”

  1. Congratulations on your first post in r/opsec! OPSEC is a mindset and thought process, not a single solution — meaning, when asking a question it’s a good idea to word it in a way that allows others to teach you the mindset rather than a single solution.

    Here’s an example of a bad question that is far too vague to explain the threat model first:

    > I want to stay safe on the internet. Which browser should I use?

    Here’s an example of a good question that explains the threat model without giving too much private information:

    > I don’t want to have anyone find my home address on the internet while I use it. Will using a particular browser help me?

    Here’s a bad answer (it depends on trusting that user entirely and doesn’t help you learn anything on your own) that you should report immediately:

    > You should use X browser because it is the most secure.

    Here’s a good answer to explains why it’s good for your specific threat model and also teaches the mindset of OPSEC:

    > Y browser has a function that warns you from accidentally sharing your home address on forms, but ultimately this is up to you to control by being vigilant and no single tool or solution will ever be a silver bullet for security. If you follow this, technically you can use any browser!

    If you see anyone offering advice that doesn’t feel like it is giving you the tools to make your *own* decisions and rather pushing you to a specific tool as a solution, feel free to report them. Giving advice in the form of a “silver bullet solution” is a bannable offense.

    *I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/opsec) if you have any questions or concerns.*

    Reply

Leave a Reply

%d bloggers like this: