What is Metadata?
Data about data. In the context of communications, metadata includes information like who you contacted, when, for how long, and from where—everything except the actual content of your message. Metadata can reveal intimate details about your life even when content is encrypted.
Also known as: Meta Data, Communication Metadata
Metadata is often described as "data about data." While your message content might be encrypted, the metadata—who, when, where, how long—often isn't. And metadata can be devastatingly revealing.
Examples of Metadata
Phone Calls
- Numbers you called and received calls from
- Duration of each call
- Time and date
- Cell tower locations (your physical location)
- Sender and recipient addresses
- Subject lines
- Timestamps
- IP addresses
Web Browsing
- Sites visited
- Time spent on each page
- Search queries
Why Metadata Matters
"We kill people based on metadata." — Former NSA Director Michael Hayden
Metadata reveals:
- Your social network: Who you communicate with
- Your habits: When you wake up, go to sleep, travel
- Your interests: What you research, read, watch
- Your location history: Where you've been, who was with you
- Your relationships: Who you're close to, who you're avoiding
The Metadata Illusion
Many "private" services encrypt your content but not your metadata. Your ISP, email provider, or messaging service may still know:
- That you contacted a divorce lawyer
- That you called a suicide hotline
- That you messaged a journalist
Protecting Your Metadata
- Tor: Obscures who is communicating with whom
- Signal: Minimizes metadata collection
- Encrypted email: Use providers that minimize metadata logging
- VPN: Hides browsing metadata from your ISP
Related Terms
Data Minimization
A privacy principle that organizations should collect only the minimum amount of personal data necessary for a specific purpose, and retain it only as long as needed. This reduces privacy risks by limiting exposure in case of breaches or misuse.
End-to-End Encryption
A method of secure communication where only the communicating users can read the messages. In principle, it prevents potential eavesdroppers – including telecom providers, Internet providers, and even the provider of the communication service – from being able to access the cryptographic keys needed to decrypt the conversation.
Surveillance
The monitoring of behavior, activities, or information for the purpose of influence, management, or control. Surveillance can be government (law enforcement, intelligence), corporate (advertising, data brokers), or interpersonal (stalking, domestic abuse).
Have more questions?
Use our guided flow to get the right next privacy step for Metadata.
Open Guided Flow