Welcome to the Authentic8 blog

Thursday, June 8
an onion

Peeling back the onion: How and why to access Tor for OSINT

Image: a laptop displaying the Mastodon home page
Introduction to Mastodon for OSINT practitioners
person standing in front of projection of binary code
10 OSINT tools for CTI
worker hiding his eyes at his desk
Blur graphic images, block sensitive content in OSINT research
worker peacefully meditating at desk
Managed attribution for better ROI and researcher sanity

Latest blogs

Image: Digital webs fade over html code

Demystifying online tracking for OSINT researchers

How online tracking for customized ads could be affecting your research. Learn how to avoid those persistent cookies work and how to avoid…

underwater view of ocean wave

Maritime intelligence tips from OSINT expert Rae Baker

Plunge into the world of OSINT at sea (and in port) with the leader in maritime intelligence and NeedleStack guest Rae Baker.

group of people spread out walking toward computer cursor emitting light

Fueling CTI with OSINT knowledge bases and experts

We continue our series exploring OSINT resources to improve CTI investigations, as we dive into the databases and professionals curating…

cybergraphic of box with lock symbol on its sides

Why is web isolation right for zero-trust application access?

Granting access to critical data or business apps in a zero-trust security model hinges on having granular context around users and their…

human outline with image of motherboard inside

OSINT news roundup: adapt or die, doxing bill, and spotting AI-generated fakes

Stay up to date with the latest OSINT news from around the world

laptop with Mastodon on the screen

Diving deep: Mastodon for researchers part 2

In the first part of this series, we introduced Mastodon, how it works and why it’s important for researchers. In the second part, we will…

abandoned structure with intelligence graphic overlay

OSINT news roundup: AI, ethics and clearing mines

Stay up to date with the latest OSINT news from around the world

man with shocked face looking at laptop with fire in background

4 OSINT hot takes: experts weigh in on open-source debates

As open-source intelligence (OSINT) research continues to ramp up, experienced practitioners are using critical insights to craft their own…

cybergraphic of binary code

Optimizing CTI with OSINT information-sharing

Harnessing the power of information sharing is a valuable intersection of CTI and OSINT. We rundown the list of programs, organizations and…

silo logo

Start your 30-day free trial of Silo for Research


The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Blog updates

Stay updated with the latest posts from the blog