Image: Alexander Nemenov/Contributor via Getty Images
Hacking. Disinformation. Surveillance. CYBER is Motherboard's podcast and reporting on the dark underbelly of the internet.
Advertisement
When contacted by Motherboard, the Times initially said that it took steps to delete the metadata but failed to scrub several audio files. It said that the metadata was up for only a "few hours.” “Before publication, we worked to remove identifying information from the story. We later learned that some buried metadata was live on the site for a few hours, and took prompt steps to remove it,” Charlie Stadtlander, director, external communications, newsroom, at the New York Times initially told Motherboard in a statement.Motherboard then found that additional phone numbers and internal notes for fact checkers—which in some cases seemingly included not only the number of the apparent soldier but also the person they were speaking to, as well as their supposed relation—remained online in the article's source code as of Wednesday afternoon, months after publication. When contacted again by Motherboard, the Times edited the piece to remove that metadata from the source code, and replace it with "null."Do you know any other cases of data exposure? We'd love to hear from you. Using a non-work phone or computer, you can contact Joseph Cox securely on Signal on +44 20 8133 5190, Wickr on josephcox, or email joseph.cox@vice.com.
Advertisement
Advertisement
Advertisement