GDPRhub is a free and open wiki that allows anyone to find and share GDPR insights across Europe!
This Ten Minute Tip is the first in a series looking at how we can geolocate images as part of OSINT work. Being able to examine a picture and work out when and where it was taken is an increasingl…
Guide de protection numérique fourni pour le FBI à la police.
via https://twitter.com/_The_Marquis_/status/1301135129277075458
Lien direct sur document https://assets.documentcloud.org/documents/6983419/Digital-Exhaust-Opt-Out-Guide-for-Law-Enforcement.pdf
https://t.co/jV4tUqx9fo OSINT Recon Tool (Email address, phone # Domain, URL, username ETC https://t.co/61IZDN3yRf
holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function.
The COVID-19 pandemic has challenged the traditional public health balance between benefiting the good of the community through contract tracing and restricting individual liberty. The authors anal...
Number Verifier is a SMS verification tool that makes it easy to get a disposable SMS number and bypass SMS number verifications on any site. - upmasked/number-verifier
Tour rapide des trucs pour récupérer des informations sur yopmail
À voir aussi, l'ensemble du site
Tim Kendall, un ancien dirigeant de Facebook, a témoigné devant des membres du Congrès le 27 septembre 2020. Mark Zuckerberg sera entendu à...
Dans les recoins sombre d'internet se trouve…
Des bibliothèques…
Clandestines. Illégales.
Non pas qu'elles hébergent des livres particulièrement bizarres ou interdit.
Ces bibliothèques de l'ombre, puisque c'est leur nom, peuvent aussi bien proposer des best-sellers, que des études scient
AFRICA 1) Laetoli, Tanzania. 3.66 Ma. Site G, found in 1978: 70 footprints made by three Australopithecus afarensis. Along with footprints were hominin and animal remains and Acheulean objects. The…
What are XS-Leaks? # Cross-Site Leaks are a class of vulnerabilities that have been present on the web for a long time, gaining new attention at the end of 2018 when a formal name was assigned and a repository of some of them was created. These vulnerabilities are Browser Side-channel Attacks and most of them exploit behaviors inherent to the design of the web, which increases the complexity around their mitigation.
A blog about search, search skills, teaching search, learning how to search, learning how to use Google effectively, learning how to do research. It also covers a good deal of sensemaking and information foraging.
via https://twitter.com/PrincipeDebase/status/1308319368003104768
Petite découverte du jour, un blog qui propose des challenges de recherche sur Internet pour apprendre à mieux chercher, à comprendre les outils et à mettre un pied dans l'OSINT
The goal of Cloudflare operated Secondary DNS is to allow our customers with custom DNS solutions, be it on-premise or some other DNS provider, to be able to take advantage of Cloudflare's DNS performance and more recently, through Secondary Override, our proxying and security capabilities too.
La réponse de Bruno Canard, directeur de recherche CNRS travaillant notamment sur les coronavirus, à Frédérique Vidal, ministre visiblement chargée de la destruction de la recherche publique.
An attempt to answer the age old interview question "What happens when you type google.com into your browser and press enter?" - alex/what-happens-when
Via https://mastodon.gougere.fr/@bortzmeyer/104869608548373665