How to be Invisible Online using Expert OSINT techniques

Поділитися
Вставка
  • Опубліковано 11 жов 2024

КОМЕНТАРІ • 139

  • @davidbombal
    @davidbombal  2 місяці тому +25

    Big shoutout to KASM for sponsoring this video. KASM workspaces supports the OSINT Community Efforts by providing the following products:
    Kasm Community Edition: kasmweb.com/community-edition
    Kasm Cloud OSINT: kasmweb.com/cloud-personal
    Kasm Workspaces OSINT Platform for Professionals/: kasmweb.com/osint
    Kasm Infrastructure/Apps for OSINT Collection: registry.kasmweb.com/1.0/
    // MJ Banias’ SOCIALS //
    LinkedIn: www.linkedin.com/in/mjbanias
    Cloak and Dagger Podcast (Spotify): open.spotify.com/show/6mT8zDMBq5gOfAVZi47pT3
    The Debrief: thedebrief.org/podcasts/
    Instagram: instagram.com/mjbanias/
    X: x.com/mjbanias
    Website: www.bullshithunting.com/
    // Ritu Gill’ SOCIALS //
    LinkedIn: www.linkedin.com/in/ritugill-osinttechniques/
    OSINT Techniques website: www.osinttechniques.com/
    Instagram: www.osinttechniques.com/
    X: x.com/osinttechniques
    UA-cam: www.youtube.com/@ForensicOSINT
    Forensic OSINT website: www.forensicosint.com/
    TikTok: www.tiktok.com/@osint.techniques
    // Rae Baker’s SOCIALS //
    Website: www.raebaker.net/
    LinkedIn: linkedin.com/in/raebakerosint
    X: x.com/wondersmith_rae
    // Eliot Higgins’ SOCIALS //
    Bellingcat website: www.bellingcat.com/author/eliothiggins/
    X: x.com/eliothiggins
    // Books //
    The UFO People: A Curious Culture by MJ Banias:
    USA: amzn.to/3xP5Jme
    UK: amzn.to/4cOrzoK
    Deep Dive: Exploring the Real-world Value of Open Source Intelligence by Rae Baker and Micah Hoffman:
    USA: amzn.to/3xFN9gv
    UK: amzn.to/3zJSy6z
    We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News by Eliot Higgins:
    USA: amzn.to/3RXNa64
    UK: amzn.to/4cvYP4B
    // UA-cam video REFERENCE //
    Top 10 FREE OSINT tools (with demos): ua-cam.com/video/PRqOj5qM1ic/v-deo.html
    Deep Dive OSINT: ua-cam.com/video/dxiNByvkvU8/v-deo.html
    Best Hacking Python Book: ua-cam.com/video/2B76CTbi72w/v-deo.html
    She Hacked Me: ua-cam.com/video/U6pDqFhN82I/v-deo.html
    // David's SOCIAL //
    Discord: discord.com/invite/usKSyzb
    X: twitter.com/davidbombal
    Instagram: instagram.com/davidbombal
    LinkedIn: www.linkedin.com/in/davidbombal
    Facebook: facebook.com/davidbombal.co
    TikTok: tiktok.com/@davidbombal
    UA-cam: www.youtube.com/@davidbombal
    // MY STUFF //
    www.amazon.com/shop/davidbombal
    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
    // MENU //
    00:00 - Coming up
    00:41 - 00:41 - Sponsored Section: KASM Workspaces demo
    06:26 - Intro
    06:46 - MJ’s Journey in OSINT
    11:14 - Starting an OSINT Company
    11:55 - Teaching Background
    12:34 - Years in OSINT
    13:19 - Advice for People Starting Out
    15:44 - What It Means to Do OSINT
    16:54 - Recommended Tools for OSINT
    19:03 - Meet Ritu Gil
    19:09 - Characteristics of a Good OSINT Investigator
    20:03 - Knowing When to Give Up
    20:43 - Soft Skills vs Technical Skills
    22:17 - Ritu’s Advice on How to Get Started
    23:24 - Are There Jobs in OSINT?
    24:39 - Forensic OSINT Demo
    26:41 - Tinder Vulnerabilities
    30:51 - Next Guest Intro
    32:04 - Rae Baker
    32:33 - Tools Rae Uses
    34:11 - From Graphic Design to OSINT
    37:56 - Volunteering to Learn
    39:10 - Next Guest Intro
    40:10 - Eliot Higgins
    40:19 - Eliot’s Background into OSINT
    41:44 - Bellingcat
    44:27 - No Degree Needed to Start
    45:37 - Useful Tools to Use
    47:19 - Advice for People Starting Out
    48:36 - Communities to Join
    51:50 - Recommended Books
    53:03 - How MJ Got the Job
    55:53 - MJ Shares an OSINT Story
    01:02:44 - Importance of a Team
    01:08:15 - Conclusion
    01:10:34 - Outro
    osint
    open-source intelligence
    open source intelligence tools
    osint curious
    geolocation
    geolocation game
    facebook
    instagram
    google
    bing
    yandex
    geolocation google
    geolocation bing
    you cannot hide
    social media
    warning about social media
    google dorks
    dorks
    google
    osintgram
    osint framework
    osint tools
    osint tv
    osint ukraine
    osint tutorial
    osint course
    osint instagram
    osint framework tutorial
    cyber security
    information security
    open-source intelligence
    open source intelligence
    sans institute
    cybersecurity training
    cyber security training
    information security training
    what is osint
    open source artificial intelligence
    cyber
    hack
    privacy
    nsa
    oscp
    ceh
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
    Disclaimer: This video is for educational purposes only.
    #osint #cyber #privacy

    • @Hartley94
      @Hartley94 2 місяці тому

      Thanks David.

    • @ForensicOSINT
      @ForensicOSINT 2 місяці тому

      Thanks so much for having me on your show! I had a blast talking about OSINT with you!

  • @funwisely
    @funwisely 2 місяці тому +7

    Thank you David for training public on privacy, security & related tools.

  • @RobbieFlores
    @RobbieFlores 2 місяці тому +4

    This channel keeps getting better. The value is just incredible.

  • @dylanvooski
    @dylanvooski 2 місяці тому +12

    Always great content David. I enjoy watching and learning more everyday.

    • @davidbombal
      @davidbombal  2 місяці тому +2

      Thank you! I hope you enjoy the video 😀

  • @Heavy146
    @Heavy146 2 місяці тому +11

    Thanks for sharing... Definitely in your Top 5 videos for 24 so far. Appreciated

  • @dimcx5011
    @dimcx5011 2 місяці тому +29

    The best way to be invisible is to be offline.

    • @ion1992
      @ion1992 Місяць тому +1

      tell that to people that run buissneses

    • @kro3q
      @kro3q Місяць тому +2

      the only way*

  • @circuitmasters5258
    @circuitmasters5258 2 місяці тому +3

    I'm 15 years into linux and python now and its a journey

  • @MohammedAli-rn5dp
    @MohammedAli-rn5dp 2 місяці тому +11

    you do not know how much i respect you as a Human and A Person 🌻

    • @x2phat2cmytoes
      @x2phat2cmytoes 2 місяці тому

      Anyone else notice these profiles commenting have *username -rn5dp* ... are these AI bots or?

  • @OfficialSethro
    @OfficialSethro 2 місяці тому +6

    If you can’t erase yourself, put out as much false information as you can. Those ad survey sites are a good place to start. When I get looked up all the real information is gone, and my age etc are all wrong including my address

    • @kevinmitchnik702
      @kevinmitchnik702 2 місяці тому

      if you only have 5 bucks to spend, spend it on noise!🫡👍🏻

  • @UziUzi-tz3wc
    @UziUzi-tz3wc 2 місяці тому +8

    Hey David, you're an incredible human being, however I want to ask you... Why do you use Google in a video where the content is privacy? I know people in cybersecurity prefer other search engines to avoid being fingerprinted, and most of us in this space don't want our data to be sold to 3rd parties.
    Note: I don't want to sound hostile, just a curious person.

    • @Vpaq
      @Vpaq 2 місяці тому

      Well if he's using Kasm then Google is fingerprinting a container.

  • @thebeaconnetwork
    @thebeaconnetwork 2 місяці тому +3

    Great info. Kasm is a good resource. Do you have the same disposable container space when using and shutting down OS's in something like Virtualbox or Parallels Desktop?

  • @Kenoi_
    @Kenoi_ 2 місяці тому +10

    What’s the catch with KASM? What are the cons. It can’t be perfect so what are you sacrificing?

    • @hellamean
      @hellamean 2 місяці тому

      I think the pros are way better. Cons could just be slow because it uses Tor. Anyway, whatever. I’d just stick with the pros and use it to find the rest out myself.

    • @KasmWorkspaces
      @KasmWorkspaces 2 місяці тому +5

      HI, where possible we try to limit the catches. For example, we do have cloud SaaS offerings for those who want a quick and convenient solution without administrative burdens, but we also offer self-hosted solutions in your private could , on-prem or even air-gapped if you'd prefer to run the full stack yourself. In either case, the technology works by streaming the pixels of whats occurring within the session to your local browser. This is the gap or "chasm" that provides the security and privacy benefits for your local machine. Naturally this means your experience will be limited by your bandwidth and latency between you and wherever you have the Kasm deployment located. I'd say this is the main limiting factor. There are options in the app to tune for poor connectivity but at a certain point it wont be a good experience.

    • @Kenoi_
      @Kenoi_ 2 місяці тому

      @@KasmWorkspaces makes sense, thanks for the info!

  • @andyzot
    @andyzot 25 днів тому

    This, as always is a great video, with superb guests and interesting content. However, as someone based in the UK, how do you find working on OSINT in the UK, GDPR, many of the tools, resources and sites are USA oriented. I think a UK focussed video would be great!

  • @hellamean
    @hellamean 2 місяці тому +1

    This is good. That Forensic Tool is like OSIRT. Perfect for OSINT Forensics Investigations and LE Investigations. Good thing with OSIRT is that it can create for you a unique hash as well, but I’m not familiar with Forensic OSINT though. Thanks very much for this. Very helpful and informative.

    • @ForensicOSINT
      @ForensicOSINT 2 місяці тому +2

      Thank you for your comment! Forensic OSINT is indeed a powerful tool for OSINT and LE investigations. One of its key features is the ability to save online material and ensure it’s properly documented It also creates unique hashes, it offers a range of features such as video download, auto-expanding comments, data extraction, and more to support comprehensive investigations.

    • @hellamean
      @hellamean 2 місяці тому

      @@ForensicOSINT That is awesome. I’d love to use that tool and introduce other LEO’s to use it if you’re willing to give a trial, I’ll connect the LEOs I have contact with to you who are interested in using the tool as well. We’ve connected on LinkedIn, so we can carry on from there.

    • @hellamean
      @hellamean 2 місяці тому

      @@ForensicOSINT That sounds awesome. I would really love to use that tool as it sounds more advanced than OSIRT as well.

    • @hellamean
      @hellamean 2 місяці тому

      @@ForensicOSINT A Federal Agent I have communication with have given really good remarks about you as well. Maybe if you can provide us a trial and I can refer you to some agents as well, it’ll be helpful to use your tool for LE Investigations.

    • @ForensicOSINT
      @ForensicOSINT 2 місяці тому +1

      @@hellamean Definitely worth trying out to see if you like it! I don't think you would be disappointed :)

  • @alifibnetouheed3960
    @alifibnetouheed3960 2 місяці тому +1

    David you are also no less high profile. You should also share how you maintain your privacy online.

  • @IndyAdvant
    @IndyAdvant 2 місяці тому +6

    Awesome video! What about logging into accounts on KASM? I imagine there's still some risk using at our own discretion, do you feel safe signing into your company accounts on this KASM? Sometimes admins may need to sign into their company accounts to pull up the things they want to test. Curious your thoughts.

    • @KasmWorkspaces
      @KasmWorkspaces 2 місяці тому +2

      This is a good question and healthy skepticism. We understand that different folks have different sensitivities (or regulations) when it comes to security and privacy. Thats why we offer a number of options of how you can use and deploy Kasm. For individuals we have the cloud SaaS solutions, but also the ability to run the Kasm Workspaces Community edition on-prem so that you are in complete control of your environment and data. For business we offer single-tenant SaaS deploys as well as private-cloud and on-prem deploys - to include fully airgapped.

  • @rbw9692
    @rbw9692 2 місяці тому +1

    Im totally Intrigued by MJ’s background 😂. And once again good video!

  • @beachbumsailordude
    @beachbumsailordude 2 місяці тому

    Very interesting topic. I like hunting online so this has peaked my curiosity.

  • @robert8
    @robert8 2 місяці тому +7

    I have a question, does Kasm hide my browsing history from my ISP?

    • @KasmWorkspaces
      @KasmWorkspaces 2 місяці тому +5

      Hi, the short answer is Yes, but because there are many ways to deploy Kasm the answer is : it depends.
      If you were to sign up for our Kasm Cloud OSINT solution: yes. If you were to deploy Kasm Workspace to your private VPS in the cloud: yes. If you deploy Kasm Workspace in a local VM (that uses your same ISP) : no. In that case you still have several options like using the Tor workspace, and layering a VPN that would hide your browser activity

  • @masterfitter83
    @masterfitter83 2 місяці тому

    Definitely would like to hear more on the subject

  • @frinko1976
    @frinko1976 2 місяці тому +1

    Sorry to tell you that, YOU ARE THE BEST!

  • @cameronrich2536
    @cameronrich2536 2 місяці тому +47

    Step 1 purchase a guy fawkes mask

    • @aussiegruber86
      @aussiegruber86 2 місяці тому

      Ok done, what’s next

    • @claussanta2341
      @claussanta2341 2 місяці тому

      ​@@aussiegruber86 buy black hoodie

    • @Hebdomad7
      @Hebdomad7 2 місяці тому +1

      2. Ship it to home address.
      3. Shipping account gets compromised showing your address and that you bought a guy fawkes mask.

    • @cameronrich2536
      @cameronrich2536 2 місяці тому +1

      @@Hebdomad7 a.k.a moms house

    • @chaithanyasurya1997
      @chaithanyasurya1997 2 місяці тому

      😂

  • @cyberdefenseddi
    @cyberdefenseddi 2 місяці тому +1

    Great segment 🙌😎

  • @GaviI-km5fo
    @GaviI-km5fo 2 місяці тому +4

    hey so I've got a question during the tinder part she showed that the birthdate is open to see . however when trying to recreate the scenario with multiple different accounts the year was correct however the month and date were the same. anyone know why that is?

    • @doordashchic
      @doordashchic 2 місяці тому

      Awesome find

    • @ForensicOSINT
      @ForensicOSINT 2 місяці тому +1

      The Tinder OSINT technique discussed in the video has changed since we recorded the episode. As we know OSINT techniques evolve frequently, and this one has a slight change.
      While the Tinder user's year of birth remains as the user originally set it, the month and day are inaccurate and change daily. I’m unsure about the why.

  • @mdashifuzzamanshawon
    @mdashifuzzamanshawon 2 місяці тому +1

    Very informative

  • @protoss4444
    @protoss4444 2 місяці тому +3

    How does this compare to Qubes OS?

    • @KasmWorkspaces
      @KasmWorkspaces 2 місяці тому +2

      Qubes and Kasm share the same spirit of isolating/compartmentalizing applications to provide security and interoperability benefits. However we are trying to solve two different problems. Qubes wants to be the Operating System you install on all of your machines basically replacing Windows/MacOS/Ubuntu etc. Kasm is a platform that is essentially a web application that any number of users can use. You have a central Kasm deployment and multiple users login from their browser and launch the applications / desktops/ VMs that they want.

  • @RickyCardwell-l8y
    @RickyCardwell-l8y 2 місяці тому

    But what do you do if you don't want your traffic to appear in Germany or India? Can you select a specific region?

  • @Ziegler-di7xz
    @Ziegler-di7xz 2 місяці тому

    10:30 editors deserve a raise

  • @try-ex9cq
    @try-ex9cq 2 місяці тому +1

    David pls make video on how to access kali through wan using ssh

    • @werdna_sir
      @werdna_sir 2 місяці тому +1

      Do it yourself and learn. How can you break into environments if you don't know how they work?

    • @try-ex9cq
      @try-ex9cq 2 місяці тому

      @@werdna_sir what do you want to say i want to access my kali machine from ssh through wan and not hack anyone's kali machine

  • @Growler-F18
    @Growler-F18 2 місяці тому

    I luv it, David's guest holds up at Tim Hortons coffee cup @53:00 minutes into the interview 😂😂😂❤❤😅

  • @Abduselam.m
    @Abduselam.m 2 місяці тому +2

    Thanks So much David
    Top world technology UA-cam channel

    • @davidbombal
      @davidbombal  2 місяці тому +1

      Thank you! I appreciate that 😀

  • @northblue8216
    @northblue8216 2 місяці тому

    Ritu Gil?? Who's her Dad, Obi Wan Kenobi? ...I think I love her. 🥰🥰🥰

  • @hillbilly4895
    @hillbilly4895 2 місяці тому +4

    It shouldn't be this hard...but it is.

    • @galloe
      @galloe 2 місяці тому +1

      It's so messed up that data brokers are even a thing, and that there are no laws against these brokers selling our data for profit. On that note, if they can make money off our data, why aren't we allowed to ask for our cut from their profits?

  • @uchihamadara5820
    @uchihamadara5820 2 місяці тому

    Hello David, I very like OTW. Can you and him do video with Metasploit because it's really difficult tool. Thanks )

  • @BadBoyAcademy-o6u
    @BadBoyAcademy-o6u 2 місяці тому +2

    Please David how to modify normal usb storage stick firemware to be hid device (bad usb)

    • @hetmanfoko
      @hetmanfoko 2 місяці тому +3

      often it is impossible. I remember most tutorials out there only work for Phison 2303 usb 3.0, so you need a specific one also. Even with that, you need a *lot* of low-level programming knowledge. So yeah... good luck I guess. I don't know wether David will do something with it (would be cool if he does tbh) but it might be hard.

  • @BATMAN_s_millis
    @BATMAN_s_millis 2 місяці тому +1

    BRO DO A VIDEO ABOUT CYBERSECURITY FREELANCE

  • @tonmeelmans7307
    @tonmeelmans7307 2 місяці тому

    Dit bestaat al meer dan 10 jaar wat een nieuwe uitvinding ?

  • @tungstengold
    @tungstengold 2 місяці тому

    david, what data does kasm keep/monitor and what is their obligations to hand it over to the said authorities protecting our society.

    • @KasmWorkspaces
      @KasmWorkspaces 2 місяці тому

      Hi ! Kasm is a US-based company, so we would be obligated to comply with the authorities where legally required. For our consumer based offering like Kasm Cloud Personal OSINT , we have logs to monitor and maintain the health of the platform. For example: User X launched a Brave workspace at this time. We however, do not monitor what occurs inside that Brave workspace so there is no detailed activity. Kasm also provides options for you to fully host the tech stack on prem , air-gapped or in your private cloud, so you have you strong data privacy needs these are options where you have complete control and our organization is not in the mix

    • @tungstengold
      @tungstengold 2 місяці тому

      @KasmWorkspaces thanks for the response but as you've seen in the u.s and many other countries investigative journalism is a life and death business. so are you prepared to put your hand on your heart and tell those investigative journalist doing the difficult work for the freedom of the people they can't be compromised using your platform kasm or are you not

  • @sabinadelkic3311
    @sabinadelkic3311 2 місяці тому

    ⭐️

  • @Appleloucious
    @Appleloucious 2 місяці тому

    'Dark arts' XDDD As if it was magic XD
    One Love!
    Always forward, never ever backward!!
    ☀☀☀
    💚💛❤
    🙏🏿🙏🙏🏼

  • @GaviI-km5fo
    @GaviI-km5fo 2 місяці тому +1

    the reason i say this is that tinder profile said 23 years old and the source code said 2000

    • @ORLYWTF
      @ORLYWTF 2 місяці тому

      Not knowing what you’re referencing, so taking your comment at face value: it’s simple mathematics. This year is 2024, so someone born in the year 2000 would be turning 24 this year, depending on the month and day. So, for instance, someone born on 2000-12-31 would show as 23 years old for the majority of 2024.

    • @GaviI-km5fo
      @GaviI-km5fo 2 місяці тому

      @@ORLYWTF thank u for this let me clarify : the date shown on screen is 2000-03-18 so why this may be posiible it isnt probeble theclip is shown at 27:12 just look where she is refrencing and agian i must say i really love this channel but thought this was somthing to point out

  • @ibeezhashin
    @ibeezhashin 2 місяці тому

    So basically kasm is a tails os container.
    Free made paid.

  • @sinanicardi
    @sinanicardi 2 місяці тому

    Hi David university accepted me for both Cyber Security and AI engineering. What would you recommend me to do? I’m interested in both now i have to decide😩

    • @OkayRR.
      @OkayRR. 2 місяці тому

      Cyber duhhhh

  • @richj946
    @richj946 2 місяці тому

    Amazing

  • @ree2453
    @ree2453 2 місяці тому +2

    LMAO. ALL cpus have backdoors today

    • @magicmanchloe
      @magicmanchloe 2 місяці тому +1

      What? Do you mean vulnerabilities?

    • @werdna_sir
      @werdna_sir 2 місяці тому

      Instruction sets that aren't made aware the public. AMD would have been doing this for years as they are military contractors. Intel are just most likely infiltrated and totally corrupt.

  • @panospapathanasiou3957
    @panospapathanasiou3957 2 місяці тому

    Ummm, what about your ISP???

  • @GaviI-km5fo
    @GaviI-km5fo 2 місяці тому

    also im a huge fan but i cant help but feel like this video is from a year ago

  • @landrover827
    @landrover827 2 місяці тому +1

    I’d love to see a Kali Linux GUI install on a Mac running in a Docked container.

    • @KasmWorkspaces
      @KasmWorkspaces 2 місяці тому +2

      You can run a Kali Linux GUI running in Kasm docker container from your browser on a mac. Does that count? 😆

    • @landrover827
      @landrover827 2 місяці тому

      Sure it counts! 😎 I’ll give it a try. Thanks 🥹

  • @SerenixIO
    @SerenixIO 2 місяці тому +2

    1:06 BROO
    THAT'S MY IP ADDRESS 💀💀

    • @hellamean
      @hellamean 2 місяці тому

      @@SerenixIO It wouldn’t matter, IP Addresses change all the time. Sure, they can be used to track but in very low circumstances such as subpoenas to match accounts, but that doesn’t mean someone showing their IP on stream would be used against them if the IP changes like every after five hours. It’s likely that he has a Dynamic IP Configuration and not a Static one and that’s why he doesn’t care. Even my IP Address changes like every 2 hours and I’m not using a VPN nor a proxy.

    • @SerenixIO
      @SerenixIO 2 місяці тому +1

      @@hellamean :OOO

  • @8080VB
    @8080VB 2 місяці тому

    We miss your old specs

  • @jakestevens3694
    @jakestevens3694 2 місяці тому

    So without watching the whole video I assume we are simply talking about isolated browsing and Virtual Machines, glorified as a SASS?
    Using a VPN = hidden from the majority of web users from knowing your true IP.
    Browsers = Use private tabs / browsing ad blocking etc, unlikely to get infected via cross scripting.
    AV/VM = use of antivirus and / or virtual machine will protect you from most infections from attacking your machine (zero day, more complex and even VM's (cloud or not) are not exactly safe because if the pc is infected and you are talking to that machine you have an open channel that could have a service which may be compromised.
    In short, security is never going to be easy it's cat and mouse, period.
    These new threats are still better than our "new AV / IDS" they are still leaning on patterns heavily to sample and detect new threats which often creates many false positives and still is allowing the better of the infections to get in, including and most worryingly social engendering attacks. Although I must admit Microsoft's latest 365 email security is rather impressive.

  • @NaseebullahHaidary
    @NaseebullahHaidary 2 місяці тому +1

    ❤🎉

  • @cameronrich2536
    @cameronrich2536 2 місяці тому

    I use proxychains when i can

  • @sognatore6199
    @sognatore6199 Місяць тому

    Almighty Lord, protect all normal people against evil OSINT investigators, bellingcat snakes, and other servants of Satan 🙏

  • @bobobobee9708
    @bobobobee9708 2 місяці тому +5

    You. Are. Not. Invisible. Online.

    • @hellamean
      @hellamean 2 місяці тому

      Absolutely

    • @mrnoone6
      @mrnoone6 2 місяці тому +1

      Skill issue

    • @hellamean
      @hellamean 2 місяці тому

      @@mrnoone6 We can simply put it as Bad OpSec.

    • @hellamean
      @hellamean 2 місяці тому

      @@bobobobee9708 I have a terrible OpSec but good fame.

    • @ORLYWTF
      @ORLYWTF 2 місяці тому +1

      Nor offline. We live in a surveillance state where it’s not just state-sponsored actors doing the watching and listening. This is the Information Age, after all.

  • @sunriseleatherco.6587
    @sunriseleatherco.6587 2 місяці тому +1

    AI will be able to track anyone, anywhere.

  • @txrunningwalkers
    @txrunningwalkers 10 днів тому

    I found out who hacked me,sniper mode now!

  • @mohammedbaiddah5451
    @mohammedbaiddah5451 2 місяці тому +1

    bro is that 5gb wtf

  • @MohammedAli-rn5dp
    @MohammedAli-rn5dp 2 місяці тому

    ❤‍🔥❤‍🔥❤‍🔥❤‍🔥❤‍🔥

  • @Zagnikasalam
    @Zagnikasalam 2 місяці тому +2

    please do video with otw on bitcoin forensics please I have told you many times please🙏🙏🙏🙏🙏🙏

  • @ShawnA560
    @ShawnA560 2 місяці тому

    I use windows 10 built in sandbox

    • @doordashchic
      @doordashchic 2 місяці тому

      What does that do?

    • @SalvageMasterEssex
      @SalvageMasterEssex 2 місяці тому

      @@doordashchic I thought the sandbox was for the cat to crap in 🤣🤣

  • @tungstengold
    @tungstengold 2 місяці тому

    michael this is dod and u.s fed client there is absolutely no way you can use this source to do anything secure.
    cmon man why are you pushing a u.s govt contractor

  • @c.q.5680
    @c.q.5680 2 місяці тому +1

    Dave Bombal is a fed 😂 and his fanboy are wanabe hackers 😂 hillarious people

  • @Ex_impius
    @Ex_impius 2 місяці тому

    Lol. Just dont join tinder lmao 😂😂

  • @sotecluxan4221
    @sotecluxan4221 2 місяці тому

    Great, but unsubscribed, at BC/Ody subscribed, ciao YT!

  • @HappyQuailsLC
    @HappyQuailsLC 2 місяці тому

    Correction to your info: Actually there are emails and text messages that can infect your phone without clicking on links or opening them. And it isn't sufficient to merely avoid clicking links in email. There are emails you shouldn't even open. Your info is very behind the times.

    • @galloe
      @galloe 2 місяці тому +2

      So educate us instead of saying "You're wrong." What's the name of this attack? How does it work? Etc.

  • @realguapo_mma
    @realguapo_mma Місяць тому

    I wish this was less of a talk show and more informative geez

  • @2two2twenty2two
    @2two2twenty2two 2 місяці тому

    THAT IS ALL BS ASK AN E ABOUT IT…

  • @ReluctantSpirit
    @ReluctantSpirit 2 місяці тому

    Sorry to say but the video is too dry to listen to.

  • @Zolipants
    @Zolipants 2 місяці тому

    where you get 4.2 gbps?:DDD