Welcome to the Authentic8 blog

Friday, November 25
Dark web FAQs

Dark web FAQs: how to access, security precautions and more

Venti latte with an extra shot of malware
Why conducting sensitive online research from Starbucks is a bad idea
Person using smartphone
Beyond Twitter: 6 social media sites you should be using for OSINT research
Web isolation is an enabler, not just a controller
Web isolation is an enabler, not just a controller
man with smoke flare
OSINT news roundup: wildfires and the war, de-platformed extremists, DOD social media policies

Latest blogs

Person looking at social media apps

Tips and tricks for anonymous social media investigations

How can professional online investigators securely conduct research on social media without exposing their organizations? Let's look at…

OSINT revolution

Beyond the scroll: the OSINT revolution on and off social media

Social media is an incredibly powerful source for OSINT building, but researchers need to broaden their scope — and hone their tradecraft…

OSINT news roundup: an online hunt, Telegram propaganda and data risks

OSINT news roundup: an online hunt, Telegram propaganda and data risks

This week’s OSINT news roundup covers sleuths and journalists partnering up to find perpetrators of potential war crimes, Telegram…

Web isolation is an enabler, not just a controller

Web isolation is an enabler, not just a controller

So much of security is focused on control that it severely limits usability. But web isolation gives user enablement equal focus.

OSINT news roundup: Ukraine’s intelligence successes, China’s new sub and Indo-Pacific moves

OSINT news roundup: Ukraine’s intelligence successes, China’s new sub and Indo-Pacific moves

What's behind Ukraine's apparent intelligence superiority over Russia? What has OSINT revealed about China's aircraft carrier off the coast…

cyrptocurrency

Cryptocurrency: the lynchpin to your investigation

Criminals' faith in cryptocurrency’s anonymity is investigators’ gain. Through blockchain analysis of cryptocurrency transactions,…

Cybersecurity executive order: one-year anniversary

Cybersecurity executive order: one-year anniversary

The executive order, Improving the Nation’s Cybersecurity, seeks to improve the federal government’s cybersecurity across agencies. One…

Give CTI its own seat at the table

Give CTI its own seat at the table

Considering where cyberthreat intelligence teams should reside in the organizational structure can make a major difference in the…

staged photos and intercepted comms

OSINT news roundup: staged photos, intercepted comms and threat products

Stay up-to-date with the latest OSINT news from around the world

silo logo

Start your 7-day free trial of Silo for Research

FEATURED SERIES

The Dark Web

Online research seeks to leave no stone unturned. Yet many researchers are hesitant — or not allowed — to explore the dark web. Our series explores the basics of the dark web and how to safely leverage it for a range of investigations in a way that protects researchers and their organizations. 

Understanding the dark web and how it can aid your investigation

3 things to consider before you start your dark web investigation

Essential tools for improving surface and dark web research

Best practices for creating a dark web access policy

Close
Close