Key Takeaways

  • Everything is Public: OSINT (Open Source Intelligence) only uses public data. It is 100% legal.
  • Username Reuse: If a target uses `CoolGuy99` on Reddit, search for `CoolGuy99` on Spotify, eBay, and Tinder.
  • Images hold secrets: EXIF data can contain GPS coordinates, and reverse image search finds where else a photo was posted.

Investigators used to need warrants. Now, they just need Google. People voluntarily upload their entire lives to the internet, creating a digital map of their identity.

Technique 1: Google Dorking

Google has hidden search operators that normal people don't use. Hackers use these to find exposed files.

Technique 2: Username Enumeration

People are creatures of habit. They reuse usernames.

Tools like Sherlock: You feed it a username, and it checks 500+ websites instantly to see if that user exists. If you find their Strava (fitness app), you can see exactly where they run every morning (and thus, where they live).

The Danger of Photos

Never post a photo of your keys (hackers can duplicate the key from the image). Never post a boarding pass (the barcode contains your full legal name and frequent flyer ID). Even the reflection in your sunglasses can reveal your location.

Technique 3: Reverse Image Search

Use Yandex Images or PimEyes. Yandex is incredibly good at facial recognition. Upload a photo of a stranger, and it might find their LinkedIn profile or an old forum post from 10 years ago.

Frequently Asked Questions (FAQ)

Is OSINT stalking?
It is a tool. Private Investigators and Journalists use it for good (finding missing persons, exposing corruption). Stalkers use it for bad. The line is your intent.
How do I hide?
It's hard. Start by "doxing yourself" - search for your own name and see what comes up. Then ask those sites to remove it (Right to be Forgotten).

Clean up your footprint.
Read Data Removal Guide