Category: Privacy

The Privacy, Security, & OSINT Show – Episode 276

EPISODE 276-When Google Attacks

This week I break down a recent report of Google terminating services of users who photographed their toddlers nude, the impact of their account loss, and solutions to prevent your own issues.

Direct support for this podcast comes from our privacy services, online training, and new books for 2022: Extreme Privacy (4th Edition) and  Open Source Intelligence Techniques (9th Edition). More details can be found at IntelTechniques.com. Thank you for keeping this show ad-free and sponsor-free.


SHOW NOTES:

INTRO:

The West Wing

NEWS & UPDATES:

None

WHEN GOOGLE ATTACKS:

https://www.nytimes.com/2022/08/21/technology/google-surveillance-toddler-photo.html


Free Guides: https://inteltechniques.com/links.html

Affiliate Links:
Extreme Privacy (4th): https://amzn.to/3D6aiXp
ProtonMail: https://go.getproton.me/aff_c?offer_id=7&aff_id=1519
ProtonVPN: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=277


The Privacy, Security, & OSINT Show – Episode 275

EPISODE 275-Archived Site Removal & Breaches Galore

This week I offer my new Archive Site Removal Guide and explain its usage, plus the latest news on several breaches.

Direct support for this podcast comes from our privacy services, online training, and new books for 2022: Extreme Privacy (4th Edition) and  Open Source Intelligence Techniques (9th Edition). More details can be found at IntelTechniques.com. Thank you for keeping this show ad-free and sponsor-free.


SHOW NOTES:

INTRO:

None

NEWS & UPDATES:

https://unredactedmagazine.com/
https://inteltechniques.com/services.html
https://inteltechniques.com/training.html

BREACHES:

Twilio
Signal
Twitter
Undisclosed Merch Store

ARCHIVE SITE REMOVAL:

https://inteltechniques.com/archive.html


Free Guides: https://inteltechniques.com/links.html

Affiliate Links:
Extreme Privacy (4th): https://amzn.to/3D6aiXp
ProtonMail: https://go.getproton.me/aff_c?offer_id=7&aff_id=1519
ProtonVPN: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=277


The Privacy, Security, & OSINT Show – Episode 274

EPISODE 274-Firewall Stability Modifications

This week I explain some vital pfSense firewall modifications and offer a tip to prevent website chat apps from launching.

Direct support for this podcast comes from our privacy services, online training, and new books for 2022: Extreme Privacy (4th Edition) and  Open Source Intelligence Techniques (9th Edition). More details can be found at IntelTechniques.com. Thank you for keeping this show ad-free and sponsor-free.


SHOW NOTES:

INTRO:

None

NEWS & UPDATES:

uBlock Origin Filters

FIREWALL STABILITY MODIFICATIONS:

https://inteltechniques.com/firewall/


Free Guides: https://inteltechniques.com/links.html

Affiliate Links:
Extreme Privacy (4th): https://amzn.to/3D6aiXp
ProtonMail: https://go.getproton.me/aff_c?offer_id=7&aff_id=1519
ProtonVPN: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=277
PIA Dedicated IP VPN: https://www.privateinternetaccess.com/ThePSOSHOW
SimpleLogin Masked Email: https://simplelogin.io?slref=osint
Silent Pocket Bags & Wallets: https://slnt.com/discount/IntelTechniques


The Privacy, Security, & OSINT Show – Episode 273

EPISODE 273-Credential Exposure Removal

This week I offer our new Credential Exposure Removal Guide and tackle the latest news and updates.

Direct support for this podcast comes from our privacy services, online training, and new books for 2022: Extreme Privacy (4th Edition) and  Open Source Intelligence Techniques (9th Edition). More details can be found at IntelTechniques.com. Thank you for keeping this show ad-free and sponsor-free.


SHOW NOTES:

INTRO:

Tim Conway Jr. Show

NEWS & UPDATES:

Apple IME
Offline Tools
Ring Doorbells

CREDENTIAL EXPOSURE REMOVAL:

https://inteltechniques.com/exposure.html


Free Guides: https://inteltechniques.com/links.html

Affiliate Links:
Extreme Privacy (4th): https://amzn.to/3D6aiXp
ProtonMail: https://go.getproton.me/aff_c?offer_id=7&aff_id=1519
ProtonVPN: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=277
PIA Dedicated IP VPN: https://www.privateinternetaccess.com/ThePSOSHOW
SimpleLogin Masked Email: https://simplelogin.io?slref=osint
Silent Pocket Bags & Wallets: https://slnt.com/discount/IntelTechniques


Credential Exposure Removal Guide

This blog post is replicated from https://inteltechniques.com/exposure.html and is the final step of our four-step process for eliminating much of your online exposure. Steps One, Two, and Three can be found HERE. Any updates to this post will be published at https://inteltechniques.com/exposure.html.

We all have credential exposure. Within thousands of database breaches, our email addresses, usernames, passwords, and other sensitive details are being shared across the internet. This has created business opportunities for online services which sell access to our private details. Numerous websites allow anyone to search your email address and see the breach in which it was associated, often along with a partial password. For a few bucks, many sites will show anyone the full password. Let's do something about that. The following steps allow you to remove your email address and exposed credentials from these services.

Have I Been Pwned

  • Conduct a search of your email address or username at https://haveibeenpwned.com/OptOut.
  • Click the link in the email confirmation.
  • Choose the "Remove email address completely" option.

Dehashed

  • Create a free burner account at https://dehashed.com.
  • Conduct a search of your email address or username.
  • Click "Request entry removal" link below each result.
  • Click the confirmation link within each email.

Spycloud

Leakcheck

  • Register for a free burner account at https://leakcheck.net.
  • Conduct a search of your email address.
  • If entries are present , send an email from the exposed address with a written removal request to [email protected].
  • Click the link within the confirmation email.

PSBDMP

IntelX

HudsonRock

Leak-Lookup

  • Register for a free burner account at https://leak-lookup.com.
  • Conduct a search of your email address.
  • If entries are present , send an email from the exposed address with a written removal request to [email protected].

HackCheck

  • Register for a free burner account at https://hackcheck.io.
  • Conduct a search of your email address.
  • If entries are present , send an email from the exposed address with a written removal request to [email protected].

Breach Directory

LeakPeek

This will not eliminate your exposed credentials within the original breaches or the countless copies which are floating around. However, it will remove them from the most commonly used lookup services. As always, change any exposed credentials immediately within your password manager and the services impacted.