Someone said it on Reddit and I agree but the amount of "OSINT"conflict maps that are vibe-coded Intel dashboards has to STOP.
Seriously.
It's a lot.
Add something unique to the space or find something else.
Posts by The Security Dialogue ๐ต๐พโโ๏ธ๐๐ฎ๐พโโ๏ธ๐ชช๐ป
Rewatching #DS9 and the whole trilogy of episodes concerning the Circle and their coup against the provisional government on Bajor is like the perfect scale of an overarching plot for a 10 episode series. Throw in 7 character focused episodes and boom - there's your #StarTrek show.
Finally, another reason you could be seeing a username on a site. Your enemies know a certain site being attributed to you could be viewed as damaging. So, they create an account with your "unique" username.
Again, not always enough to dismiss outright but it's enough to make you look further.
That leads to another reason username enumeration can be problematic for attribution - you can't dismiss the idea of credential stuffing or artificial insemination of real user data by a site to show huge spikes in membership.
This doesn't happen enough to dismiss the attribution outright.
Usernames, even though unique'ish at times, aren't that "unique" that someone else couldn't have had the same idea as the target and setup an account with the same username.
Found it in breach data? Awesome. But unless it's a dead-on match w/ corroborative data, I wouldn't trust it.
There are times when I can't confirm it. Ordinarily, that would be okay but what makes it dangerous is the stuff of every Vulcan's nightmare - the amount of credibility we assign assumptions, based on REALLY bad correlations.
"It's a unique username. It MUST be my target."
It's usually not.
That's mostly because people treat their usernames and passwords the way they do their underwear during hard times - they reuse them a bunch, no matter how much it stinks.
So, it's safe to say in MOST cases I can find a bunch with a username especially if I can confirm that it belongs to my target.
Something near and dear to my heart - username enumeration and why it's not so great always for user attribution, especially for evidentiary purposes.
I'll explain.
As an investigator, I comb a TON of the Internet hunting down whatever I can find on a username.
As a small business owner, I need to find ways to save money and time.
So, this project looks like it'll do both.
Have no worries, I'm sorta almost done.
There are some things I need to work on in the backend but it'll be cool to show it soon enough.
Goal is two to three weeks.
Wish me luck.
And no, the new tool In building isn't a skill for OpenClaw - YET.
However; it is something that I spent a long time thinking about, in order to meet some requirements for my small solo operated OSINT firm.
Nothing too cool but it saved me a TON of money and time.
HUGE fan of OpenClaw.
Jesus.
It did stuff that would have taken me WEEKS to do.
Super fucking glad I tried it out.
Yeah, OpenClaw is kinda the shit.
I'm DEEPLY enmeshed an investigation and it's been super fucking solid.
Pretty interesting piece.
Though, I would always assume identity management systems would be a huge target for any attacker.
You'd also like to think they would be as heavily protected as a response to such targeting.
However, that's not always the case and this article seems to reflect that.
You have my attention.
Looks like one of my slides made it into this Space Force brief on how to annotate imagery! Glad to see they liked it as much as I did
Also seems like the slides just endorse careful language for photo interpretation fwiw. Gotta respect analytic tradecraft
I mean....you can always get an organ for cheap off a clinic in a nondescript "undisclosed" "partner" country we don't have a cooperative treaty with which might outlaw certain "business transactions" in this regard.
Just saying.
I've been working on a new tool to use for OSINT in the "person(s) of interest" domain.
I'm working towards getting my business up and running towards doing this as a small living.
Once it's complete, I may share what it's like on GitHub and here.
It could be super cool.
I believe we underestimate the danger posed to us by people motivated to kill us all for the flimsiest of reasons and with little any motivation to value the surety of their demise in the execution of their plans to commit murder.
It's our greatest vulnerability as an ironically, predatory species.
Border patrol is patrolling the dangerous border between the Loop and... the other part of the Loop
Good news: STIs are down.
Bad news: People are still pretty fucking stupid.
You can say a lot about how much Bluesky sucks but they tried to cancel Dril here and are accusing Darth of suppressing free speech so you know we are COOKING WITH GAS
What. In. THE. Fuck.??!?!?!
I will say while expertise in a subject is in abundance here.
The echo chamber and lack of inconsequential conversations can make this place a bit stuffy.
That said, I've hung out over there long enough to know there's ZERO chance to have anything constructive over there.
Dallas ICE shooter was targeting agents, not detainees, officials say
abcnews.go.com/US/ice-facil...
Investigators identified the suspected shooter who killed a detainee at a Dallas ICE field office as Joshua Jahn.
Can't stress enough that this is why you use burners for EVERYTHING.
The thing about here and X is the level of expertise is well-endowed here on such a huge death of topics.
We used machine-learning tools in an attempt to recreate the method for cutting funding, and then applied it to past US NIH grants to reveal the broad-reaching consequences
go.nature.com/4pBArFH
A look at a very troubling development, even in the context of a hundred fires burning every day, with some comments by me
Maybe it's not the generals who show up we need to be concerned about.
Perhaps, it would be worth noting who was allowed to fly with them that shall.