5. Learning to leave no trace
When we surf the Internet, we leave traces in the computer's browser, with cookies, with the host. But investigating also means learning how to obtain information as discreetly as possible, even if it's freely available. It may indicate to others that you share the same interests.
A few precautions can then be taken to limit these traces on a computer, such as using private browsing, which is the simplest and free choice, a VPN (free like Proton, or paying Proton VPN plus, Nord VPN) or a proxy, the Tor browser.
On a cell phone, you'll need to learn how to manage and control the authorizations given to applications (sending data, accessing the microphone, accessing the camera). Managing this extension of our memory is a real security issue, as access to the microphone and camera can be particularly intrusive. For the time being, however,...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Learning to leave no trace
Article included in this offer
"Management and innovation engineering"
(
434 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
The legal framework of OSINT. Inter-community reflection, 2023, CC BY-NC-ND.
Searching for strategic information on the web. 3rd Edition, 2023, Deboek Supérieur.
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information, Michael Bazzell, 2016, Independently published.
OSINT Techniques: Resources for Uncovering Online...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!