Telegram OSINT VM Part 1 For my next blog I have decided to share my Telegram OSINT Virtual Machine. When I have a Telegram deployment I always use a dedicated virtual machine. I will never undertake research on Telegram using my perosnal device(s), accounts or personal identifiable information, either using the Telegram Web or Telegram … Read More “Telegram OSINT VM Part 1” »
Category: OPSEC
I suppose there is a certain paradox in relation to having content about OSINT, OPSEC & Privacy on the same website. Why would someone who is involved in OSINT care about a person’s Privacy or why would someone who is keen on their Privacy care about OSINT or OPSEC. I hope from the explanation below … Read More “Introduction to Digital Exposure” »
It is 2 years since I did my first blog relating to messenger apps and what from an OSINT perspective we could find from them. In OSINT you will hear a lot said about false, positives, well what about false negatives. I have decided to do a short follow up blog on Telegram and how … Read More “Telegram Fundamentals” »
So for my latest blog I decided too see if free Wi-Fi is indeed free or whether it comes with a hidden cost. Now I don’t use public Wi-Fi not because it is inherently vulnerable, as I can use a VPN to negate some of the risk, however for those who don’t use a VPN … Read More “Free Wi-fi, is it free?” »
I have been posting about WhatsApp recently so I thought I would make them all into a small blog. I was surprised (Or maybe I wasn’t) that It was recently revealed that the Prime Minister was using WhatsApp to communicate with his cabinet. The Digital Exposure vulnerabilities to the PM, would immediately be apparent to … Read More “What’s Up, with WhatsApp” »
I suppose there is a certain paradox in relation to having content about OSINT, OPSEC & Privacy on the same website. Why would someone who is involved in OSINT care about a person’s Privacy or why would someone who is keen on their Privacy care about OSINT or OPSEC. I hope from the explanation below … Read More “Understanding The Links” »
It has been established for some time now, that to protect our privacy the use of a VPN is almost mandatory. For an OSINT practitioner their use is far more than that, yes there certainly is the OPSEC perspective, but can we manipulate then for the benefit of our OSINT work? VPNs come in many … Read More “Effective Use of a VPN in OSINT” »
Do you want more control over what recipients can do with your email and attachments? I have decided to put together a quick blog, nothing fancy on how you might want to have more control over how emails and attachments are treated by the recipient. I welcome any feedback if people have other tricks of … Read More “Do Not Forward or Copy!” »
Now, I thought I would write about something not totally OSINT related but maybe of use in some instances. As you know I like a bit of privacy too, so I thought I would do a little article on how we can achieve a little more privacy. We appear to spend vast sums on the … Read More “Something a Little Different” »
In my previous posts you may have gathered I have an interest in leveraging mobile phones for the purpose of OSINT however OPSEC is never far from my thoughts and I have @dutch_osintguy to thank for that, as he is passionate about the subject and gave me a few pointers for this blog too. Check … Read More “Deep Dive into Operational Security” »