cross-posted from: https://lemmy.today/post/46040257
In practical terms, smartphones generate at least three kinds of digital exposure.
The first is identification risk, including through facial recognition technology. When you post footage, you may be sharing identifiable faces, tattoos, voices, license plates, school logos or even a distinctive jacket. That can enable law enforcement to identify people in your recordings through investigative tools, and online crowds to identify people and dox or harass them, or both.
That risk grows when agencies deploy facial recognition in the field. For example, ICE is using a facial recognition app called Mobile Fortify.
Facial recognition accuracy also isn’t neutral. National Institute of Standards and Technology testing has documented that the technology does not perform equally across different demographic groups, meaning the risk of misidentification is not evenly distributed across groups. For example, studies have shown lower recognition accuracy for people with darker skin color.
Second is the risk of revealing your location. Footage isn’t just images. Photos and video files often contain metadata such as timestamps and locations, and platforms also maintain additional logs. Even if you never post, your phone still emits a steady stream of location signals.
This matters because agencies can obtain location through multiple channels, often with different levels of oversight.
Agencies can request location or other data from companies through warrants or court orders, including geofence warrants that sweep up data about every device in a place during a set time window.
Agencies can also buy location data from brokers. The Federal Trade Commission has penalized firms for unlawfully selling sensitive location information.
Before you go, decide what you’re optimizing for, whether it is preserving evidence quickly or minimizing traceability, because those goals can conflict. Harden your lock screen with a long passcode, disable face and fingerprint ID, turn off message previews and reduce the risk of what you carry by logging out of sensitive accounts and removing unnecessary apps. Even consider leaving your primary phone at home if that’s realistic.
If you’re worried about having your recording deleted, plan ahead for how you’ll secure footage. You can either send it to a trusted person through an encrypted app or keep it offline until you’re safe.
While filming, keep your phone locked when possible using the camera-from-lock-screen feature and avoid livestreaming if identification risk is high, since live posts can expose your location in real time. Focus on documenting context rather than creating viral clips: Capture wide shots, key actions and clear time-and-place markers, and limit close-ups of bystanders. Assume faces are searchable, and if you can’t protect people in the moment, consider waiting to share until you can edit safely.
Afterward, back up securely and edit for privacy before posting by blurring faces, tattoos and license plates, removing metadata, and sharing a privacy-edited copy instead of the raw file. Think strategically about distribution because sometimes it’s safer to provide footage to journalists, lawyers or civil rights groups who can authenticate it without exposing everyone to mass identification. And remember the “second audience” beyond police, including employers, trolls and data brokers.

