Robert Steele: Columbia Journalism Review Guide to OSINT (1% of It)

Knowledge

A Guide to Open Source Intelligence (OSINT)

Michael Edison Hayden

Columbia Journalism Review

Introduction | One: The Difference between Open and Closed Networks | Two: Searching the Open Web | Three: Verifying the Authenticity of Social Media Accounts | Four: Verifying Images and Videos | Five: Exploring Fringe Websites | Six: Using Archives, Saving Your Work | Seven: Learning New Platforms and Interacting with Hostile Communities | Appendix: Tools

ROBERT STEELE: This is a great guide if you only care about the 1% of 1% of 1% of 1% of 1% that is online.  The author, from the much-discredited Southern Law Poverty Center that scams people for donations while censoring haters (anyone committed to the truth), has done a fine job on the pimple under the donkey’s tail. He should apply to the CIA’s Open Source Center, where he will find himself in good company.  Serious people can start here: #OSINT.

Penguin: Open Source a tool, not a business model?

Software

The benefits of open source and community – the view from the trenches

Open source is not a business model; it’s a tool.

If you are a software company providing a specific set of features, then you don’t want to open source your code, says Sommerseth. But if your company can provide services around what you open source (e.g., integrations, enterprise features) that you can monetize, then an open source approach may work for your company.

Penguin: 6 Open Source Android Alternative Operating Systems For Mobiles

Commerce, Corruption, Software

6 Open Source Android Alternative Operating Systems For Mobiles

In the wake of the ongoing US-Huawei-Google tussle, many Android enthusiasts are wondering about the different alternative phone operating systems that are out there. We have Apple’s iOS at our disposal, but the cost of owning an iPhone makes it an impossible choice for many.

This prompted me to create a list of other Android alternatives that are being developed or being used in mobile devices. The options that have been included in this list are open source, so any developer can grab the code and fork it to create something new for free. Huawei is itself creating its own operating system but I haven’t included it on this as the details are scarce.

Continue reading “Penguin: 6 Open Source Android Alternative Operating Systems For Mobiles”

Berto Jongman: Jake Creps OSINT Tools for the Dark Web

Knowledge
Berto Jongman

OSINT Tools for the Dark Web

As OSINT investigators, collectors, and analysts, we have to be familiar with the dark web and be able to navigate it with efficiency. We also have to be able to extract information from it in a targeted, efficient matter. Here are a few tools you can use to get you started, get you familiar, and get your comfortable in the difficult task of inspecting the dark web.

Read full article.

Phi Beta Iota: This is the kindergarten version of Stephen E. Arnold and his Dark Web sources and methods accessible via http://arnoldit.com/.

Penguin: Adobe Makes Open Source A Priority — This Will Not Save Them

#OSE Open Source Everything, Advanced Cyber/IO, Collective Intelligence

How and Why Adobe is Making Open Source A Strategic Priority

In October 2018, Adobe ranked as the 16th largest corporate open source contributor (per Github data), moving up the list from our 32ndranking in 2017. One of the reasons for this growth came from the acquisition of Magento in June 2018 and its open source e-commerce platform. But this only tells part of the story. As of May 2019, we have climbed to 14thplace, and this ongoing improvement has nothing to do with vanity metrics and everything to do with a concerted internal efforts to free our employees to participate in open source development.

Continue reading “Penguin: Adobe Makes Open Source A Priority — This Will Not Save Them”

Penguin: How ZCoin’s Privacy Technology Compares to the Competition

#OSE Open Source Everything, IO Privacy

How Zcoin’s Privacy Technology Compares to the Competition

Unlike the previous anonymity schemes which involve obscuring the real transactions with other inputs or transactions, the Zerocoin protocol completely breaks the transaction links between coins through the use of zero-knowledge proofs.

This anonymity scheme is not without some drawbacks. In return for the huge anonymity set and breaking of transaction links, Zerocoin requires a one time trusted setup to generate initial parameters. In Zerocoin these are two very large prime numbers that need to be destroyed. Knowledge of these two large prime numbers would allow someone to forge Zerocoin spends and create coins out of thin air.

Read full article.