Metadata is particularly revealing. Where content is encrypted, data aggregators apply key metadata (the data outside the content).

You may be hearing this and say:

"So what? The content is encrypted. How is this important? Why should I care?"

Metadata is King.

Other data characteristics/values outside the content itself (which may be encrypted) makeup what is known as "Metadata." And metadata has real value. Mapping out of social networks (even when content is encrypted). Cross relationship maps. All of this can be done outside the encrypted content itself.

You may be using end to end encrypted messaging, but with metadata the time length of the conversation can help determine who an individual is talking to (For example: cross referencing packet timestamps, size and other detailed information with another user carrying correlating levels of timestamped metadata (ex: revealing packet size, start time of conversation, end of conversation can help determine parties for a data aggregator).

Metadata reveals the people networks (in situations where content is encrypted).

Using relationship mapping (between common metadata), these small pieces of seemingly useless data help to build a bigger picture and may reveal new common interests.

The extent of what metadata is extends to any and all data outside the internal content itself.

Email is particularly full of metadata.

See additional information on metadata on our latest video:


  • Decentralize - mesh and non centralized networking options

  • Use applications/protocols which put a premium on privacy (minimization of metadata)

  • Use a trusted VPN (one trusted more than ISP who may be selling personal data)

  • Use Tor

  • I2P

  • Messengers (see below for recommendations)

  • Avoid remote Cloud platforms (Does NOT apply to Nextcloud self hosted Clouds)

  • Opt for applications and messengers which are known/trusted to minimize metadata.

WiPri: Wrote scripts including 24/7 run at boot options for spoofing various metadata options to protect our Human Rights to Privacy:


wipri -d [device] -r [randomizes mac continually changing times/addresses] -p [static smartphone mac (hold it)] -P [continually randomized changing mac/times of change] -a [continually randomize MAC, hostname, signal variations] -m [Static MAC] -i [new MAC identity] -h [rand hostname] -H [restore prev hostname] -s [random signals]

Features/Flag Options:

-d sets your device. [use w/every flag]

-r continually randomizes your mac address at randomly generated, continually changing random MAC addresses/times.

-p Android/iPhone mimic mode: sets single static identity: randomly generated valid mac address of either Apple or Android.

-P Android/iPhone mimic mode: continually changing randomized Samsung/Apple mac address changes- continually changing, at randomized changing times, using continually changing, randomized yet valid OUI Apple/Samsung mac addresses (this setting allows you to appear to WiFi trackers/sniffers [like KISMET] at any given time, as either an Android or iPhone;

-m [mac here] sets a mac address of your choice, holds it for remainder of running (checks to ensure firmware does not reset it)

-h change hostname to generic yet unique and completely random hostname. Using a generic base with random extension at the end of it.

-R restore previously held hostname

-H prints help; print out wipri command examples

-i generates a valid OUI based mac identity

-s txpower randomizer (experimental) randomizes the txpower of your device. This confuses certain WiFI trackers that determine location by signal strength

-a anonymous mode: launch coordinated random changes: each change happens simultaneously: when the mac address changes so does the hostname and txpower/signal. This is intended to simulate new devices and changing locations. All 3 changes happen simultaneously, at changing, randomized times.

-A spoof random SSID for a WiFi Access Point (hostapd); Netcat notifications (optional) for each SSID change;


See my recent video on using Exiftool to create misdirection by adding alternative metadata/locations inside those pictures:

FRIENDLY MESSENGERS (Trusted Encryption + Less metadata than most- Personal Recommendation: Try Session for less metadata):

SIGNAL (Most Common/Trusted- for even less metadata: try Session below this (Signal based with even less metadata)):

BRIAR (multiple encrypted methods of communication including bluetooth/wifi!):

MESHTASTIC (LoRA: I have been hearing this may be coming to Pine64 hardware! For now MCU's like ESP32 Shown Here (Decentralized LoRa Low Power Radio Messaging)):

SESSION ( * Recommended: * Based On Signal Protocol w/Minimization Metadata):

Like content/videos like this? Share it with friends/family who care about Privacy.

Support options found at the bottom of this page
(offering early access to some content):

Sharing this content is very much appreciated.


Twitter Fosstodon


Youtube Odysee Bitchute Peertube


BMAC: (Donation Options + Support Services)
XMR: 481wHzXEsW9E519uu3SiynMuGe1yUT43iiJ8M49fgxfngHr9MUPVNAmPgyjS4XYtvzD1TbK7P5ywUWhGo11ibT2RQhEcRSX