
Looking for the latest episodes, between 285-305. If anyone has them, please send the link to me.

Lemmy Community for fans of the Privacy Security and OSINT show podcast to talk about the latest episode and bounce ideas off of each other how they can improve their privacy, security, or OSINT knowledge. This is just a fan based community, and is no way connected to or involved with Michael Bazzell, Inteltechniques.com, or the Privacy, Security, & OSINT podcast.
Torrent archive of the entire show
Looking for the latest episodes, between 285-305. If anyone has them, please send the link to me.
I found this magnet link on Bitsearch:
magnet:?xt=urn:btih:3C21F5F3A8E4FE2319617C9DF6548B02ECAB20AC&tr=udp%3A%2F%2Ftracker2.dler.com%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.breizh.pm%3A6969%2Fannounce&tr=udp%3A%2F%2Fwww.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.bitsearch.to%3A1337%2Fannounce&dn=%5BBitsearch.to%5D+The+Privacy%2C+Security+and+OSINT+Show+-+Ep+001-305
I'm so glad I found this, and I will re-listen to many of the episodes. I currently just have the entire archive stored on my phone, listening to it through the 'local folder' feature in AntennaPod. Will soon move this to my self-hosted Audiobookshelf server.
Why Facecheck.id not working on desktop pc for me?
When uploading image gives me “hmm something went wrong pls try again later”
I tried multiple browsers.
It works on the phone.
Im stumped.
Emergency Alert Test
Written by Aaron Kelley
Our Los Angeles office recently had the opportunity to test our recommendations for those who wish to avoid mandatory emergency alerts (and test alerts) within their mobile devices, and the results were surprising. On Wednesday, October 4th, 2023 at 11:20 Pacific, three of our devices alerted, but one did not.
There has been many conspiracy theories about how the recent test alert was an attempt by the government to collect data about our locations, but we do not buy into that. We just wanted to know if our settings worked. For our test, we full reset four mobile devices. Two were a Pixel 6A with GrapheneOS default settings. The other two were an Apple iPhone 14 with default settings. All four devices possessed eSIM service from Mint with cellular service from T-Mobile. All four were next to each other with a strong signal. The following settings represent the modifications to each GrapheneOS device. The device on the lef
The Dangers of Data Removal Service Doxxing
Great reminder to always do data removal yourself. This allows you to be absolutely sure that it is done correctly and kept confidential.
https://inteltechniques.com/workbook.html
https://inteltechniques.com/data/workbook.pdf
https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List
USA Driver's License Barcode
What do/would you put over your barcode? What do you think MB has on his? Curious to see if others implement this tactic.
EPISODE 269-New OSINT Tools & Breach Data Lessons
[31:26.86] Now, one thing I've started doing is on the back of my driver's license, there is a barcode. I would never let anyone copy it, but I did go ahead and take a, I made a vinyl sticker of a new barcode and I put it on my driver's license.
[31:37.86] So if I am ever forced for some reason to allow a system to scan my driver's license, it'll scan, but the message that you're going to get is probably not something safe to talk about on this show.
The Privacy, Security, and OSINT Show - Status Update
https://inteltechniques.com/podcast.html
STATUS: The SoundCloud podcast archive is offline. We are researching new hosts capable of servicing this audience.
The Privacy, Security and OSINT Show - Ep 1-255
https://0.0g.gg/?d1fac00317d9bdb0=#DBSPNffnJYQa79wEzjeZ4XCQr9cLNqedTuKMaWhb6GHG
EPISODE 287-Listener Questions, UNREDACTED 5, & OSINT 10
undefined
[20:22.30] - The most asked question, we'll start with that. [20:25.02] And this is a question that is dear to my heart. [20:27.74] Where are all the old podcast episodes? [20:30.58] I actually emailed you about this when they disappeared. [20:33.70] Where are they? [20:34.82] - Are there some missing? [20:36.66] - There are all of them missing. [20:38.54] There are all of them missing. [20:39.94] About from about a year ago onwards. [20:42.74] - Yeah, we've been purging old episodes [20:46.14] for a couple of years now. [20:48.10] Typically what we do is once or twice a year we go in [20:51.06] and purge everything over one year old. [20:54.10] And the reason for that is twofold. [20:55.90] First, we wanna be responsible. [20:57.90] We don't want to have bad information out there. [20:59.58]
The Privacy, Security, and OSINT Show - Transcripts
This file has been shared with you on pixeldrain
This archive includes transcripts up until episode 305, which was released on September 8th, 2023. These were transcribed using the FOSS whisper.cpp with the base.en
model.
You can download and extract this ZIP and then use grep
or rg
(ripgrep) with the files to find specific keywords in order to find when and in which episode something was mentioned.
Example:
undefined
$ rg -ie 'burner.*sim' 263-Proton Changes & New Breach Lessons.lrc 227:[13:32.00] I won't give out the make and model of this device, but it was very obvious that this was a knock off burner type phone that you would get maybe in a grocery store for $40 when you buy a prepaid SIM card
Episode 253-Bypassing VPN Blocks
was released on March 4th of 2022, but it appears after some backlash from the community, MB decided to pull the episode. The response to the backlash can be found in 253-Dash Cams
.
EPISODE 305-Revisiting VPNs & Firewalls
https://inteltechniques.com/blog/2023/09/08/the-privacy-security-osint-show-episode-305/
This week I revisit many updates associated with VPNs and Firewalls to coincide with the release of our next digital guide.
SHOW NOTES:
INTRO:
Jason
NEWS & UPDATES:
None
REVISITING VPNS & FIREWALLS:
https://inteltechniques.com/book7d.html
https://0.0g.gg/?30dc0d1379292270#AeBHewMjQdPALmfgNDoHhWsFKdzHKnYYtnAdr4vAr4bz
EPISODE 304-Linux Privacy & Security
This week we release our new digital guide Extreme Privacy: Linux Devices, I offer a conversation about Linux privacy and security, and present several important OSINT updates.
LINUX PRIVACY & SECURITY:
https://inteltechniques.com/book7c.html
OSINT:
https://0.0g.gg/?793c8a2e767e1bea#5bjMkAx7ezTKRjZJ26hSYJ2BHDC9obBwNMhBEUw4zmjy
VOIP.ms | Service Limitations
For those of you who might consider using VOIP.ms as suggested recently by MB (Michael Bazzell), beware of the limitations, specifically the MMS limitation.
Without MMS, you will NOT be able to receive messages over 160 characters in length. This is caused by the SMS 160 character limit. Anything >160 characters gets converted to a MMS message.
List of limitations below:
⚠️ LIMITATIONS
undefined
➜ The limit of the capacity to send SMS/MMS via the portal is unlimited. ➜ The limit of sending SMS/MMS via the API is limited to 100 per day. For any modification to the limit, please contact support or open a ticket via the customer portal. ➜ At the moment, receiving and reading MMS is only possible through the message center or by using the SMS/MMS Forward option. MMS through SIP protocol is not available. ➜ The SMS/MMS Service is only available for US and Canadian local DID Numbers marked with the distinctive SMS/MMS Icon. ➜ The SMS/MMS Service can only be use
EPISODE 303-iOS Privacy & Security
This week we take a brief break from the self-hosting series and revisit iOS privacy and security.
https://inteltechniques.com/book7a.html
Benefits of iOS
Risks of iOS
Privacy & Security Considerations
Settings
Remove unused stock apps
App Store login vs iCloud login
App funding
DNS: https://nextdns.io/
Calendars & Contacts: https://www.etesync.com/
Password Manager: https://strongboxsafe.com/
VoIP App: https://acrobits.net/
VoIP Service: https://voip.ms/en/invite/Mzc2NjM3
Data Service: https://refer.telnyx.com/refer/zrfmo
Custom App Settings
Shortcuts for Home Screen
https://0.0g.gg/?01a41f194dc84e9b#6UNbk8VAUxcKJGVAJDV8Stv9iDAm2PYa9Nfr7WzCfCT7
EPISODE 302-Self-Hosted 4: The Next Level
This week I continue the self-hosted series with a discussion about password managers, 2FA, Docs, Photos, Backups, Comms, and Media.
https://bitwarden.com/help/install-on-premise-linux/
https://bitwarden.com/help/licensing-on-premise/
https://bitwarden.com/blog/new-deployment-option-for-self-hosting-bitwarden/
https://standardnotes.com/help/self-hosting/getting-started
https://photostructure.com/server/photostructure-for-servers/
https://element.io/solutions/self-hosted-or-cloud-collaboration
https://0.0g.gg/?149950011a6d89a3#5VWSgvYsTxgG1Fv9b5z33rjMyxdv6NrSjE2UcbTbJgg5
PSA: Upgrade your LUKS PBKDF to Argon2id !!
TIL the French government may have broken encryption on a LUKS-encrypted laptop with a "greater than 20 character" password in April 2023.
When upgrading TAILS today, I saw their announcement changing LUKS from PBKDF2 to Argon2id.
The release announcement above has some interesting back-of-the-envelope calculations for the wall-time required to crack a master key from a LUKS keyslot with PBKDF2 vs Argon2id.
And they also link to Matthew Garrett's article, which describes how to manually upgrade your (non-TAILS) LUKS header to Argon2id.
EPISODE 301-Self-Hosted 3: Calendars, Contacts, & Notes
This week I continue the Self-Hosting series with a discussion about Calendars, Contacts, and Notes.
https://github.com/etesync/server
https://standardnotes.com/help/self-hosting/getting-started
https://standardnotes.com/help/self-hosting/docker
https://www.cloudflare.com/products/tunnel/
https://github.com/juanfont/headscale
https://github.com/slackhq/nebula
https://0.0g.gg/?a398c9795cd99b7e#6bi1vWv8QugMuzRSq6SCJeDWpfBZfK4QjyYc9KG48YmQ
EPISODE 300-Self-Hosted 2: Offline Knowledge
This week I continue the self-hosted series with several easy options from which anyone can benefit. Let's archive some powerful data for offline use.
https://library.kiwix.org/?lang=eng&q=wiki
https://download.kiwix.org/zim/wikipedia/wikipedia_en_all_maxi_2023-05.zim
https://download.kiwix.org/zim/wiktionary/wiktionary_en_all_maxi_2023-04.zim
https://download.kiwix.org/zim/other/mdwiki_en_all_maxi_2023-06.zim
https://download.kiwix.org/zim/other/zimgit-medicine_en_2022-03.zim
https://download.kiwix.org/zim/other/wikem_en_all_maxi_2021-02.zim
https://download.kiwix.org/zim/zimit/fas-military-medicine_en_2022-05.zim
https://download.kiwix.org/zim/ifixit/ifixit_en_all_2023-04.zim
https://download.kiwix.org/zim/gutenberg/gutenberg_en_all_2023-05.zim
https://download.kiwix.org/zim/stack_exchange/mechanics.stackexchange.com_en_all_2023-05.zim
The Privacy, Security, and OSINT Show - Transcripts
This file has been shared with you on pixeldrain
ZIP archive containing text files of transcripts with timestamps of episodes 250-299. These were transcribed using the FOSS whisper.cpp with the base.en
model.
You can download and extract this ZIP and then use grep
or rg
(ripgrep) with the files to find specific keywords in order to find when and in which episode something was mentioned.
Example:
undefined
$ rg -ie 'burner.*sim' 1276301293-user-98066669-263-proton-changes-new-breach-lessons.mp3.lrc 227:[13:32.00] I won't give out the make and model of this device, but it was very obvious that this was a knock off burner type phone that you would get maybe in a grocery store for $40 when you buy a prepaid SIM card