Главная
Study mode:
on
1
Introduction
2
Overview
3
Open Source Intelligence
4
How People Find Information
5
Other Types of Information
6
Why All of This Matters
7
Staying Invisible
8
How to get rid of your information
9
Fun with your information
10
Does it work
11
Resources
12
Disclaimer
13
Extreme Privacy
14
DeleteMe
15
Tracelabsorg
16
Conclusion
Description:
Learn how penetration testers leverage social engineering and open-source intelligence (OSINT) to gather publicly available information for successful campaigns in this 20-minute conference talk from CarolinaCon. Discover the methods used to collect and connect personal data, while gaining practical strategies to protect yourself and your organization by controlling your digital footprint. Explore techniques for information removal, privacy enhancement, and data management using tools like DeleteMe and Tracelabs.org. Master the art of staying digitally invisible and understand the importance of selective information sharing in today's interconnected world.

Protecting Yourself Online: Social Engineering Defense and Privacy Strategies

CarolinaCon
Add to list
0:00 / 0:00