This week I explain how a recent client became exposed via temporary “burner” numbers and email, revisit VoIP solutions with a fresh look, offer a scripted way to directly access your Twilio calls, messages, and account details, and present an OSINT tip to passively collect content URLs within a site. Big show.
Direct support for this podcast comes from our privacy services, online training, and new books for 2022: Extreme Privacy (4th Edition) and Open Source Intelligence Techniques (9th Edition). More details can be found at IntelTechniques.com. Thank you for keeping this show ad-free and sponsor-free.
Listen to PAST episodes at https://ift.tt/L6Q0EM8
SHOW NOTES:
INTRO:
Alfred Hitchcock Hour
NEWS & UPDATES:
BURNER BACKFIRES:
VOIP UPDATES:
https://ift.tt/KAIaHnW
https://ift.tt/mpxMtj1
Free Guides: https://ift.tt/ygKIaEJ
Affiliate Links:
Extreme Privacy (4th): https://amzn.to/3D6aiXp
Proton Mail: https://ift.tt/pAbajhw
Proton VPN: https://ift.tt/uo8jaiJ
from The Privacy, Security, & OSINT Show https://ift.tt/BqMU3e8
via https://ift.tt/opyZbu7