Welcome to the Authentic8 blog

Thursday, June 8
an onion

Peeling back the onion: How and why to access Tor for OSINT

Image: a laptop displaying the Mastodon home page
Introduction to Mastodon for OSINT practitioners
person standing in front of projection of binary code
10 OSINT tools for CTI
worker hiding his eyes at his desk
Blur graphic images, block sensitive content in OSINT research
worker peacefully meditating at desk
Managed attribution for better ROI and researcher sanity

Latest blogs

Image: geolocation data on a map

OSINT news roundup: damage assessments, location data and, lagging intel strategies

Stay up to date with the latest OSINT news from around the world

cyber graphic of crashing currency

The fall of FTX: What happened and what could have been done differently

The fall of FTX could have been predicted if researchers conducted proper blockchain analysis, but that didn’t happen until it was too late…

Managed attribution FAQs

Managed attribution FAQs: answers to your most common questions

Authentic8 answers FAQs about managed attribution and misattribution from online investigators who need to cloak or be anonymous for…

world map with digital lines

OSINT news roundup: fighting misinfo in Africa, recruiting bloggers and hackathon doxing

Stay up to date with the latest OSINT news from around the world

Image: illustration of a person with a tv for a head, puppet strings over silhouettes

OSINT news roundup: export controls, Russian influence and lessons from Ukraine

Stay up to date with the latest OSINT news from around the world

Man on laptop sitting on paper airplane

FAQ: web isolation and the zero-trust maturity model

Nearly every organization is pursuing or perfecting zero-trust architecture. Web isolation can be a fast win in this sizable undertaking.…

A stack of books next to a computer

Reading for research: 5 books to better your OSINT

Winter is a great time to curl up with a good book. Why not make your next read an asset to your research?


OSINT in the FY23 National Defense Authorization Act

A new congressional bill could shape the way open-source intelligence is utilized.

three workers at computer

OSINT is a perishable skill: How Skull Games kept me sharp

OSINT research and reporting are use-it-or-lose-it skills. To brush up on mine, I participated in a recent Skull Game to put OSINT to a…

silo logo

Start your 30-day free trial of Silo for Research


The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Blog updates

Stay updated with the latest posts from the blog