Category: OSINT

The Privacy, Security, & OSINT Show – Episode 239

EPISODE 239-Health Portals, Vulnerability Reports, and Voice Cloning This week I discuss the importance of claiming your health portal profile, considerations when disclosing online vulnerabilities, and the new threat with voice cloning. Direct support for this podcast comes from sales of my books, services, and online training. More details can be found at IntelTechniques.com. Your […]

The Privacy, Security, & OSINT Show – Episode 237

EPISODE 237-The Huge OSINT Show This week Jason Edison joins me to discuss many new OSINT topics, resources, and tools. Direct support for this podcast comes from sales of my books, services, and online training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorsements, Patreon, donations, or commercial influence on […]

The Privacy, Security, & OSINT Show – Episode 234

EPISODE 234-Privacy, Security, & OSINT Updates This week I discuss the importance of offline maps, a recent Protonmail court order, online petition privacy issues, and another site which provides free historical domain information. Direct support for this podcast comes from sales of my books, services, and online training. More details can be found at IntelTechniques.com. […]

The Privacy, Security, & OSINT Show – Episode 231

EPISODE 231-This Week In Privacy, Security, & OSINT This week I offer discussions on the latest T-Mobile breach, a US Census breach, another lesson on “Journalism” and doing your own research, macOS telemetry updates, and an OSINT tip for image forensics. Direct support for this podcast comes from sales of my books, services, and online […]

Sherloq: An Open Source Image Forensic Toolset

In my OSINT book, I spoke very favorably of Foto Forensics (http://fotoforensics.com) as an online tool which could examine details of a photo including metadata and image analysis. This could help identify areas of an image which have been manipulated plus many other features. Foto Forensics has been blocking VPN addresses lately, and I have […]

The Privacy, Security, & OSINT Show – Episode 230

EPISODE 230-Personal Data Removal Revisited This week I revisit my methods for personal online data removal, offer a new free removal workbook, plus two new OSINT tips. Direct support for this podcast comes from sales of my books, services, and online training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, […]

An Analysis of the IntelX Scrape

I saw an interesting post on RaidForums today. If you are not aware, RaidForums is a website where people share/trade/sell data breaches. When you see a news article refer to a top secret, underground, hidden site, on the DARK network, they are probably just referring to RaidForums, which is easily accessible within any web browser. […]

The Privacy, Security, & OSINT Show – Episode 228

EPISODE 228-New Privacy & OSINT Strategies This week I present two new privacy strategies, including a new opt-out platform and macOS telemetry minimization, plus the latest privacy news and a new OSINT tip about government database downloads. Direct support for this podcast comes from sales of my books, services, and online training. More details can […]

The Privacy, Security, & OSINT Show – Episode 227

EPISODE 227-Eleven Topics This week I present Eleven assorted topics surrounding privacy, security, and OSINT including a Pegasus recap, ID.Me challenges, more Airtag concerns, the Protonmail audit, results from a ProtonMail search warrant, new uBlock Origin features, another email masking option, upcoming Google Voice changes, GrapheneOS updates, Librem 5 phone refunds, and a new NextDoor […]

Personal Ransomware Exposure

Note: This post is a supplement to the podcast episode with the same title located at https://soundcloud.com/user-98066669/226-personal-ransomware-exposure. When we think about ransomware victims, I suspect most of us think about companies having their data encrypted and being extorted for Bitcoin payments in order to obtain the decryption tool which will unlock their documents. With more […]