Welcome to the Authentic8 blog

Thursday, June 8
an onion

Peeling back the onion: How and why to access Tor for OSINT

Image: a laptop displaying the Mastodon home page
Introduction to Mastodon for OSINT practitioners
person standing in front of projection of binary code
10 OSINT tools for CTI
worker hiding his eyes at his desk
Blur graphic images, block sensitive content in OSINT research
worker peacefully meditating at desk
Managed attribution for better ROI and researcher sanity

Latest blogs

Person in a foggy field with many open doors

Beating censorship: putting the “open” in open source

Anti-censorship activist Yevgeny Simkin is determined to find new ways to help people who live in dictatorial regimes access information…

Russian bombers in a joint patrol with China

OSINT news roundup: weaponized supply, joint air patrols and war crime documentation

Stay up to date with the latest OSINT news from around the world

Woman talking on the phone while using her laptop

Foolproof security of user web activity

Even the most security-aware users make mistakes and can accidentally expose their organizations’ networks to malware and other…

AI for OSINT

What we can find when we know where to look: applying AI to social OSINT

This company’s AI technology tracks alt-social media sites to document trends and violent rhetoric, creating reports and saving time for…

How EXIF data can further your research

A picture worth a thousand words: How EXIF data can further your research

Behind each image on the web is a story. Discovering the story may be easier than you think if you peel back the layers and peak behind the…

Man working at computer

Well, factually: 6 tips for diligent fact-checking

We compiled the best of the best tips and tricks from the NeedleStack podcast's fact-checking series, so you don't have to.

Floating boxes

Using open-source information to combat organized retail crime

It's the season of online shopping and with it comes organized retail crime. Lucky for financial firms and law enforcement, OSINT can help…

OSINT news roundup: OSINT for defense, the NOFORN caveat and diversification

OSINT news roundup: OSINT for defense, the NOFORN caveat and diversification

Stay up to date with the latest OSINT news from around the world

What can Ukraine tell us about Taiwan?

What can Ukraine tell us about Taiwan?

Many analysts are warning China is gearing up to invade Taiwan. Could Russia be a predictor of their strategy?

silo logo

Start your 30-day free trial of Silo for Research

FEATURED SERIES

The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Blog updates

Stay updated with the latest posts from the blog
Close
Close