277-Burner Backfires & VoIP Updates

This week I explain how a recent client became exposed via temporary “burner” numbers and email, revisit VoIP solutions with a fresh look, offer a scripted way to directly access your Twilio calls, messages, and account details, and present an OSINT tip to passively collect content URLs within a site. Big show.

Direct support for this podcast comes from our privacy services, online training, and new books for 2022: Extreme Privacy (4th Edition) and  Open Source Intelligence Techniques (9th Edition). More details can be found at IntelTechniques.com. Thank you for keeping this show ad-free and sponsor-free.

Listen to PAST episodes at https://ift.tt/L6Q0EM8

SHOW NOTES:

INTRO:

Alfred Hitchcock Hour

NEWS & UPDATES:

https://ift.tt/ZrSQmgb

BURNER BACKFIRES:

https://ift.tt/tQPYpcl

VOIP UPDATES:

https://ift.tt/KAIaHnW
https://ift.tt/mpxMtj1

Free Guides: https://ift.tt/ygKIaEJ

Affiliate Links:
Extreme Privacy (4th): https://amzn.to/3D6aiXp
Proton Mail: https://ift.tt/pAbajhw
Proton VPN: https://ift.tt/uo8jaiJ

from The Privacy, Security, & OSINT Show https://ift.tt/BqMU3e8
via https://ift.tt/opyZbu7

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s