The Privacy, Security, & OSINT Show – Episode 105

Posted on December 28th, 2018

EPISODE 105: Advanced Disinformation & Telephone Archives

This week I wrap up the discussion about disinformation techniques and present a new OSINT tool that pulls historic phone numbers, names, and addresses.

Listen to all episodes at https://inteltechniques.com/podcast.html

or Subscribe at:

RSS / iTunes / Google / Stitcher  / Spotify


SHOW NOTES:

SPONSORS:

Silent Pocket: https://silent-pocket.com/discount/totalprivacy
Authentic8: https://info.authentic8.com/

INTRO:

10-50 Victim

ADVANCED DISINFORMATION:

Discussion

OSINT: TELEPHONE ARCHIVES:

https://inteltechniques.com/menu.html

LISTENER QUESTIONS:

Q: Let’s say I have a VeraCrypt container that contains my .kdbx password database file.  Now I go in and remove the .kdbx file extension, so Windows just sees this as a generic “file”. If someone somehow cracked into my VeraCrypt container, would they have any way of knowing that file is in fact a KeePass database?  Assuming that I don’t name the file “my_keepass_db”, would this be a valid way to disguise my database? Whenever I need to access the file I could just add the extension back temporarily.

Q: To complete a vetting process, the organization I am working with uses PeopleFacts to complete a back ground investigation. I have provided all of my real life information to this web site with exception to my Social Security Number. What is your take on this risk?


Data Removal Workbook:
https://inteltechniques.com/data/workbook.pdf

Please submit your listener questions at https://inteltechniques.com/podcast.html


Filed under OSINT, Podcast, Privacy, Security |

Search

Recent Posts