Anonymous Security


SOVEREIGN TECH • OPEN SOURCE INTEL • DIGITAL ANONYMITY

RECENT INTEL


OSINT For Journalists: Verifying sources securely

Learning how to use open-source tools to gather information and protect your identify


Building Your Own Anonymity stack: Guide

Explore the tools and technigues to create a resilient and private online presence.

Decentralized Web: Exploring IPPDS and its implications


Dive into interplanetary file sysem and its role in building a censorship resistant web

ABOUT anonsec.space


Empowering individsuals with the knowledge and tools for digital sovereignty. We deconstruct and promote private, decentralized technologies.

Categories


Newsletter


Stay updated. Join our private list



© 2024 ANONSEC.SPACE.


Anonymous Security


SOVEREIGN TECH • OPEN SOURCE INTEL • DIGITAL ANONYMITY

We are

Lorem ipsum dolor sit amet, consectetur adipiscing magna elit. Magna sed at scelerisque enim, mattis iaculis nisl. Duis amet aliquam ipsum, tristique lacus. Quisque sed tempus. Lorem ipsum dolor sit amet, consectetur adipiscing magna elit. Tempus sed scelerisque enim, mattis iaculis nisl. Duis amet aliquam ipsum tristique lacus. Quisque sed tempus.

Newsletter


Stay updated. Join our private list


© 2024 ANONSEC.SPACE.


Anonymous Security


SOVEREIGN TECH • OPEN SOURCE INTEL • DIGITAL ANONYMITY

OSINT For Journalists: Verifying sources securely


🔍 Part I: The OSINT Toolkit for Verification
OSINT for verification is the art of cross-referencing and contextualizing digital breadcrumbs.

1. Geolocation and Visual Verification
Verifying when and where a photo or video was taken is often the first step in debunking misinformation.
Reverse Image Search (RIS): Use tools like Google Lens, Yandex, TinEye, or the Baidu RIS (useful for content originating in China) to see where an image first appeared and how it has been used previously.Metadata Analysis: Check the Exif data on files using tools like ExifTool (a powerful command-line utility) to reveal details like the camera model, date, time, and sometimes GPS coordinates. Crucially, advise journalists to never upload the original file to a public tool.Geolocation (Verifying Location):Use Google Maps Street View or Google Earth Pro to match visual clues (signs, buildings, shadows, unique architectural details) in a photo/video against a claimed location.Use SunCalc to verify the time of day a photo was taken by comparing the direction and length of shadows with the claimed date and location.2. Social Media and Account Verification
Verifying the authenticity of an account or digital footprint.
Username and Email Checks: Use OSINT frameworks (like the Maltego community edition or free web tools) to search a username across hundreds of social media platforms simultaneously.Timeline Analysis: Review an account's history for inconsistencies. Look for changes in language, location, or posting style that might indicate a compromised or purchased account.Archiving: Use tools like the Wayback Machine or Archive.is to capture a snapshot of a webpage or social media post before it can be deleted, providing crucial evidence.

🛡️ Part II: Securing the Reporter's Identity (OpSec)
Protecting the journalist is as critical as verifying the source. Good OpSec ensures the reporter and their sources are safe from identification or surveillance.

1. Network Anonymity
Virtual Private Networks (VPNs): Encrypt all internet traffic between the journalist's device and the VPN server, hiding their IP address from the websites they visit. Caution: Choose a reputable, audited, and 'no-log' VPN provider.
The Tor Browser: Use Tor (The Onion Router) for maximum anonymity. Tor routes traffic through a global network of relays, making it extremely difficult to trace the user's location or activity. Best practice for accessing dark web sources or highly sensitive public websites.2. Device and System Security
Use Separate Operating Systems: Never conduct sensitive research on a primary work or personal computer.
Tails: A live operating system that runs from a USB drive and forces all connections through the Tor network. It leaves no trace on the computer it's running on.Virtual Machines (VMs): Use VirtualBox or VMware to set up a sandboxed, disposable operating system for investigations.Metadata Stripping: Before publishing or sharing any document, photo, or file, use a dedicated metadata removal tool (often built into publishing software or dedicated utilities) to ensure no location, author, or device information is accidentally leaked.3. Secure Communication with Sources
Journalists must establish secure, end-to-end encrypted channels from the very first contact.
Encrypted Messaging: Recommend Signal as the industry standard for messaging due to its strong end-to-end encryption, disappearing messages, and metadata minimization.Encrypted Email: Use services like ProtonMail or Tutanota which encrypt messages at rest and in transit, offering a much higher degree of security than traditional email providers like Gmail (though, even a secured Google Workspace account can use encryption features).Secure Drop/File Sharing: If you handle extremely sensitive documents, consider establishing a SecureDrop instance or using encrypted file transfer services to allow sources to share information anonymously.

✅ Conclusion: Integrity and Safety in the Digital Age
OSINT tools are not just a way to gather information; they are a necessary component of journalistic integrity and security. By mastering these open-source techniques, journalists can:
Verify information with scientific rigor.Protect the privacy and safety of their sources.Secure their own digital identity from malicious actors.Final Call to Action: Encourage readers to establish a permanent OpSec checklist and conduct all OSINT investigations in a controlled, isolated environment.

Newsletter


Stay updated. Join our private list


© 2024 ANONSEC.SPACE.


Anonymous Security


SOVEREIGN TECH • OPEN SOURCE INTEL • DIGITAL ANONYMITY

Building Your Own Anonymity stack: Guide


Lorem ipsum dolor sit amet, consectetur adipiscing magna elit. Vestibulum at scelerisque enim, mattis iaculis nisl. Duis id aliquam ipsum, et tristique lacus. Quisque sed tempus.

Newsletter


Stay updated. Join our private list


© 2024 ANONSEC.SPACE.


Anonymous Security


SOVEREIGN TECH • OPEN SOURCE INTEL • DIGITAL ANONYMITY

Decentralized Web: Exploring IPPDS and its implications


Lorem ipsum dolor sit amet, consectetur adipiscing magna elit. Vestibulum at scelerisque enim, mattis iaculis nisl. Duis id aliquam ipsum, et tristique lacus. Quisque sed tempus.

Newsletter


Stay updated. Join our private list


© 2024 ANONSEC.SPACE.