Collecting information as part of OSINT is often based on finding traces of users' online activity, such as logging into social networks or using the same e-mail address to register on multiple portals. It must not be forgotten, however, that the same applies to ourselves when we try to obtain this information, often [...]
I have been interested in the issues of security, access to information and intelligence for a long time. I've always been fascinated by the very idea of secret information - the fact that knowledge on a given topic can be so valuable and important to the operation of a company, national or personal security that it must be protected, and at the same time there are groups prepared to dedicate significant resources to get access to it. Not surprisingly I very much followed how development of the Internet enabled access to vast volumes of data. At the same time, use of the Internet simultaneously enabled collaboration of teams scattered around the world and threatened the security of information with remote, unauthorized access to it.