this post was submitted on 21 Jan 2026
23 points (100.0% liked)

Wild Feed

516 readers
1 users here now

A catch-all world journalism community for news, reports, blogs, editorials, and whatever.

Tag if needed:

[NSFW] and [Content Warning - x] — At your discretion.

[Month and/or year] — For old but relevant articles. Use your best judgement.

[Conspiracy Tuesday] — Conspiracy theories/occult themes/cryptids/pseudoscience. On Tuesdays.

[E-mail required] — If an e-mail is needed to sign in.

[Archive link in post] — For paywalls and account sign-ins, link the main article in the URL, paste the archive link in the text body.

*Current means the article contains the most up to date publically available information on the subject, within reason.

*Good quality means the source is reputable with a reasonably clean fact checking record.

Check out !Independent_Media@lemmy.today for independent news from around the world or !indy_news_canada@sh.itjust.works for Canadian independent publications.

All communities were created with the goal of increasing media literacy and media pluralism.

Sources posted here include:

https://americanlibrariesmagazine.org/

https://www.apa.org/

https://www.bbc.com/

https://www.earth.com/

https://www.theguardian.com/international

https://www.lawfaremedia.org/

https://lithub.com/

https://www.mentalfloss.com/

https://www.newscientist.com/

http://psychologytoday.com/

https://www.thequint.com/

https://www.reuters.com/

https://www.rfi.fr/en/

Icon image by z0r0z on pixabay, depicting a silhouette of a world map on a paint-splattered background.

Banner image by Lucentius on pixabay, depicting crumpled newpapers.

founded 5 months ago
MODERATORS
 

In practical terms, smartphones generate at least three kinds of digital exposure.

The first is identification risk, including through facial recognition technology. When you post footage, you may be sharing identifiable faces, tattoos, voices, license plates, school logos or even a distinctive jacket. That can enable law enforcement to identify people in your recordings through investigative tools, and online crowds to identify people and dox or harass them, or both.

That risk grows when agencies deploy facial recognition in the field. For example, ICE is using a facial recognition app called Mobile Fortify.

Facial recognition accuracy also isn’t neutral. National Institute of Standards and Technology testing has documented that the technology does not perform equally across different demographic groups, meaning the risk of misidentification is not evenly distributed across groups. For example, studies have shown lower recognition accuracy for people with darker skin color.

Second is the risk of revealing your location. Footage isn’t just images. Photos and video files often contain metadata such as timestamps and locations, and platforms also maintain additional logs. Even if you never post, your phone still emits a steady stream of location signals.

This matters because agencies can obtain location through multiple channels, often with different levels of oversight.

Agencies can request location or other data from companies through warrants or court orders, including geofence warrants that sweep up data about every device in a place during a set time window.

Agencies can also buy location data from brokers. The Federal Trade Commission has penalized firms for unlawfully selling sensitive location information.

you are viewing a single comment's thread
view the rest of the comments
[–] homesweethomeMrL@lemmy.world 2 points 2 months ago

Before you go, decide what you’re optimizing for, whether it is preserving evidence quickly or minimizing traceability, because those goals can conflict. Harden your lock screen with a long passcode, disable face and fingerprint ID, turn off message previews and reduce the risk of what you carry by logging out of sensitive accounts and removing unnecessary apps. Even consider leaving your primary phone at home if that’s realistic. 

If you’re worried about having your recording deleted, plan ahead for how you’ll secure footage. You can either send it to a trusted person through an encrypted app or keep it offline until you’re safe. 

While filming, keep your phone locked when possible using the camera-from-lock-screen feature and avoid livestreaming if identification risk is high, since live posts can expose your location in real time. Focus on documenting context rather than creating viral clips: Capture wide shots, key actions and clear time-and-place markers, and limit close-ups of bystanders. Assume faces are searchable, and if you can’t protect people in the moment, consider waiting to share until you can edit safely.

Afterward, back up securely and edit for privacy before posting by blurring faces, tattoos and license plates, removing metadata, and sharing a privacy-edited copy instead of the raw file. Think strategically about distribution because sometimes it’s safer to provide footage to journalists, lawyers or civil rights groups who can authenticate it without exposing everyone to mass identification. And remember the “second audience” beyond police, including employers, trolls and data brokers.