OSINT: deanon with improvised means

BadB

Professional
Messages
1,709
Reaction score
1,697
Points
113
It is no secret that most of the data, or at least hints of its existence, are contained in open sources. Social networks, various applications and just personal notes and photos in public - all this creates a unique digital imprint of a person. And in order to create to find out a sufficient amount of information about a person, it is not at all necessary to be a representative of the organs. Sometimes it's enough just to know where to look.

Properly honed information retrieval skills are essential. This knowledge is especially important when you collect information about a person or company, or you need to check important information. Wondering how to do this? Then today we'll talk about OSINT.

What is OSINT?
OSINT (Open Source Intelligence) - search, collection and analysis of information received from publicly available sources. For example, getting information from social networks, personal sites and forums, as well as from search engines. To better understand the essence of this term, let's look at examples.

If you look at history, one of the famous CIA analysts, Ken Sherman, stated that the state gets more than 80% of the information it needs from open sources. A little later, the head of the US Defense Intelligence Agency, Samuel Wilson, said that more than 90% of all intelligence data is in open sources, the rest is the success of agents. Statistics captures and confirms the relevance of OSINT.

In our age of Internet accessibility, there are a lot of search opportunities in open sources. An ordinary user tells a lot of information about himself: connections with other people, profiles on social networks, interests, geolocation, marital status, etc. Using such sources to collect information is OSINT.

Why don't most users know how to search for information?
Using open source search, you can solve more than one mystery of private detectives. After all, there are a lot of open government resources, forums, social networks and other sources for finding information around. But it is very important not to get confused in all this and learn to find the most important thing in order to find a real treasure among the tons of sand.

Beginners do not always correctly perceive the information received. Let's say there are some records, photos, the user lives like everyone else, and he has nothing serious. But if you dig deeper, analyze the activity, groups, geotags, comments, and also check the nickname for being busy on other services? After completing such a simple list, you can find a lot of interesting information. But that's not all either.

Let's take a look at the case. Let's imagine that there is a user Vasya from St. Petersburg, he is registered in Vkontakte and Facebook. Minimum information and photos, boring profile, nothing special. And now let's imagine that after a slash in the VK address bar his nickname vasechka66 is written. And having broken through such information, you can find an active user on forums with a similar place of residence. And this is more interesting, because here Vanya posts photos from his vacation, openly communicates about his political views, and also publishes incredible stories from his life. This is the beauty of OSINT.

How to approach open data search in a structured way?
This is not an exhaustive list and the methods I have described are not redundant. However, for beginners, this can serve as a starting point. And then - there is no limit to perfection.
For convenience, we have divided the entire process into stages.

1. Formation of tasks
At this stage, you need to clearly understand what you need to get in the end. This can be, for example, the nicknames that the target uses. Or you need to break through absolutely all the information about a person on the Internet. Typically, the key data for sending are phone numbers, email addresses, nicknames, or social media leads.

Stage 2. Planning
At this stage, you need to determine all possible directions and sources that will be used for the search. As a rule, there are 3 main ones:

Personal (social networks, blogs, websites, nicknames, etc.).

State (registers, bases, courts, taxes, border bases, diploma bases, base of invalid passports, etc.).

External sources (friends, acquaintances, media, employers, recommendations).

It is very important to visualize. The best way to do this is to use XMind, MindMap, Maltego or other similar apps. For each goal, you need to make your own roadmap.

3. Gathering information
This stage is the most time consuming, but it is mainly implemented using a set of software and online services. As you approach this stage, you should have some preliminary information. For example, you know that a person uses the last name of their first teacher as their password. And, let's say, our victim has it as a friend on VKontakte. This significantly narrows the circle and it becomes clear where to look first.

But sometimes there is no such information and you need to search for absolutely everything. It's best to start with your first name, last name and nickname first. Then you can promote and search for a phone number, a list of friends, build connections in social networks and forums. But as practice shows, almost all search results are based on three things: phone number, email and nickname.

Here we have compiled a small selection of resources and sites that you can search for.

Search by home phone, full name and city or address of residence http://spra.vkaru.net or http://nomerorg.me. Attention, you can search here if a person has a home or office number. The service does not search for SIP, mobile, etc.

Special sites. For example, the search engines Shodan and Censys. This will be relevant if you have the target IP address.

Search in court cases of the Russian Federation https://sudrf.ru/index.php?id=300

Base of diplomas http://frdocheck.obrnadzor.gov.ru

Base of bailiffs http://fssprus.ru/iss/ip/

Base of invalid passports http://services.fms.gov.ru/info-service.htm?sid=2000

TIN database https://service.nalog.ru/static/personal-data.html?svc=inn

As well as many other tax data available on the same website.

Everything about the owner of the car by license plate, phone number or VIN https://avinfo.co or https: //hybd.d.rf/check/auto

Information about individual entrepreneurs and organizations, including the full name of the entrepreneur https://egrul.nalog.ru/index.html

Get an extract from the USRN on the main characteristics and registered rights to the real estate object https://rosreestr.ru/wps/portal/p/cc_present/EGRN_1

You can also use your nickname, for this there are two sites to help you: https://knowem.com or https://namechk.com. Here are a few more sites that allow you to search by nickname according to the same principle:
https://www.namecheckr.comhttp://usersherlock.comhttps://usersearch.orghttps://thatsthem.comhttps://inteltechniques.com

Based on this information, you can see which social networks are occupied with a nickname.

Applications GetContact and Numbuster. They will allow you to determine how this number is recorded in other people's phone books. Ahtung! To use the applications, install them on a phone with an empty contact book, otherwise they will merge your contacts too!

Also install the Viber, Telegram, VK, and WhatsApp applications on your phone. Enter the desired number in the contacts on the phone, and import the contacts into the installed applications. This will allow you to find a person's accounts if his cell phone was used there for registration.

Search for people on social networks:
View hidden VK friends and mutual friends between two profiles: https://220vk.com/

Search for information about VK records by user ID: https://vk.com/feed?obj=ID&q=§ion=mentions

Searching where else in the vastness of the Internet there is a photo (useful when searching for other social accounts of the object, or the original source of the photo):

Extract EXIF information from a photo (may contain geographic coordinates of the shooting location):

You can search for known database leaks. Very often hackers leak databases with names and passwords, and possibly other data. Other hackers meticulously monitor such leaks and organize these data. Just enter the address or nickname and see the results. For this, these services are suitable:
https://ghostproject.fr
https://haveibeenpwned.com/
https://hacked-emails.com/
https://weleakinfo.com/
https://leakedsource.ru/

Collecting information using other sources
OSINT Framework https://osintframework.com, https://github.com/lockfale/osint-framework

The author created this framework to automate the collection of information from various places and its further systematization. For further work with the framework, you may need to register on which of the resources that it uses, but in general, it is free and allows you to search a large number of resources, as well as google and other publicly available systems, and then systematize this information.

Awesome OSINT URL='https://github.com/jivoi/awesome-osint']https://github.com/jivoi/awesome-osint)[/URL]

No program this time, just a huge list of OSINT resources

Maltego https://paterva.com

An absolutely unrivaled tool for collecting and organizing OSINT data, included with Kali Linux. Nevertheless, even for the community version, the set of functions is very impressive, and all the rest of the systematization can be done either completely by hand, or written (or borrowed or redone ready-made ones).

DataSploit Framework https://github.com/datasploit/datasploit

DataSploit is an OSINT framework written in Python that automatically collects information about domains, email, usernames and phone numbers. You can use DataSploit both inside Python applications or as a standalone tool via the command line.

4. Analysis of results
The information found should be systematized. Better to add notes on during the reset process. For example, if you found something interesting at the stage of collecting information, then you must definitely note it visually. So that at the stage of analysis it can be analyzed in detail and drawn conclusions.

If in the process of collecting information it was possible to find files, then you need to pull out the metadata. To do this, you can use programs such as FOCA, for example. You can also upload data from social networks and continue to work with them.

It is imperative to save correspondence, public messages or records in order to analyze them later. This is very important, because after reading the messages, you can roughly understand the psychological portrait of our target, and then work and use to use the attack.

At the end of this stage, we must have a clear understanding of everything with whom the target interacts, what it does, who it likes on social networks, with whom it communicates, as well as where it rests, what its geo-location is in social networks. Absolutely everything, down to the smallest details.

5. Formation of conclusions and preparation of results
At this stage, we have a so-called person card. We know basic information, we know preferences and interests, social circle, sphere of influence, activity in social networks, as well as on other resources. As a result of such work, one can understand that, in general, a person represents, how much he earns, what assets he has. And depending on this, we can make a start.

For example, if a person is fishing, then you can come up with an interesting story and offer a free outing tour, some super cool book or club membership. It is good to prepare a fake website, create a high-quality letter and send it to the target. You can, for example, ask that in order to get a free trip, you need to register on the site. So, for example, we can get an idea of what passwords our target is using. You can immediately check to see if the same policy is being used across all sites.

It is also very important to revise the roadmap, it will allow us to understand what we have in general and where the person spends the most time. If he communicates on social networks, and actively uploads photos to Instagram from photo exhibitions or from the same bar, then it means that you can very often meet him there. And if you also offer on behalf of the institution some kind of super offer through the mail, then you can meet a person in a specific place and at a specific time. It all depends on your imagination.

Visualization
When working with big data, it's very important to work with visualization. Thus, you can not get confused and get more information. That is why I will show you several services that allow you to implement this function.

Wisemapping http://www.wisemapping.com

A convenient set of icons, there is the possibility of drawing up notes, design, can be divided into levels and sublevels. Finished cards can be discarded for collaboration. There is of course a minus, you can pick up numbers in the link and find other cards.

Mindmeister https://www.mindmeister.com

Free functionality with paid features. There is a standard set of functions: icons, pictures, notes and links. You can work together. Not a bad service with average functionality.

Mindomo https://www.mindomo.com

There are paid features inside, but you can use the free version. Has more functionality for the design and placement of elements. You can use ready-made templates for building maps. You can see an example of ready-made maps at the link.

Maltego https://www.paterva.com

You've probably heard that this is a cool OSINT tool for automating search. It is installed in Kali and the free version is sufficient for use. But it can also be used to build links and visually display information in manual mode. Entities nodes can be used to add people, nicknames, servers, ports, images, and more. But this is a topic for a separate article rather than a paragraph. With the Social Links plugin https://www.mtg-bi.com worth $ 100, this already powerful "harvester" turns into a powerful search tool on social networks and other resources.

Who seeks will always find. And what I wrote about here is just a basic selection with which you can start. I will definitely write in the future about interesting software and new search technologies. Stay with us!
 
OSINT by images. What can you recognize from the photo? Deanon from photography.
Our world is not only what we see. And sometimes a lot can be said about the simplest things, or even secrets can be revealed. And for this it is not at all necessary to be a psychic.
Regular photographs are no exception. A simple photo can tell a lot, from EXIF information to the position of the sun and camera defects, by which you can identify the relative time, location and even the photographer himself, even in the absence of metadata.
Deanon from photography is a modern reality. Artificial intelligence systems, processing huge amounts of information, make it possible to recognize faces and objects, improve image quality, detail small, indistinct objects, such as reflections and shadows, or determine the type and model of a camera or check a photo for editing.
AI systems today are much smarter than those who use them, especially those who use their "droids" and "stubs" for illegal purposes. And often neglecting the rules of basic digital hygiene, these people end up behind bars. And not at all through the efforts of cop, but solely because of its stupidity.
All this has long been a part of our daily life. And it is not in vain that we call for vigilance in the slogan of our site. It is not only the state that monitors. On the Internet, you can find a huge amount of open information.
In this article, we will tell you how to do all this with the help of available, available and completely free tools.

Face recognition
It's no secret that the whole city is filled with cameras, and our faces are recognized in squares, in the metro, in buildings and in public transport, and compared with various databases in real time. Recognition systems work so well that they are able to recognize a person, even under a mask. We will talk about how recognition systems work in another article. Here we will focus on how to recognize people from a photograph ourselves, without having any data.
The easiest option is black market services. For a price tag of 5000-20000 wooden ones on well-known resources on the darknet, you will be punched not only by the name and personal data of a person, but also by a map of his movements around the city.
But we talked about how to do everything ourselves, without the help of other people. And here, too, there are plenty of opportunities.

findclone.ru
The service searches for faces of the social network Vkontakte. The first 25 searches are free, then you have to pay. The quality is average, but quite suitable for getting acquainted with the technology.
image-13.png


search4faces.com
Search4faces is another service for finding people on the Internet by photography. Thanks to the technology of neural networks and machine learning, within a few seconds, the service helps to find the right person or someone very similar to him. The result is a link to the profile of the found person on the social network vk.com or ok.ru and others.
The service currently partially or completely contains 3 databases: avatars of the Vkontakte social network, the main photos of the Odnoklassniki social network, and profile photos of the Vkontakte social network.

https://pimeyes.com
Paid overseas search engine, searches mainly by photos from the cache of search engines. It works well, but unfortunately you have to pay for the results.
image-14.png


VK.watch
VK.watch is an OSINT tool for finding information about people on VK. According to them, their database is the largest archive of historical data of the VK service: user comments, photos, friends lists and profile changes. The user can be found by a unique ID or by the last nickname. The bulk of the data was collected in 2016, and in August 2018 VK.watch launched with the same base on a self-sustaining basis. In 2019, it became possible to find people by faces, like the closed FindFace - just upload a photo here.

Maltego + Social Links
So much has been written about maltego that it will be superfluous to write something else. Nevertheless, for those who are in the tank, I will still conduct a short educational program. Maltego is a tool for building and analyzing connections between various subjects and objects. Maltego allows you to bring together information obtained from open and closed sources, it allows you to visualize aggregated data.
How is this useful for us? In combination with paid plugins, this framework provides the maximum possibilities available to a mere mortal to search and identify images on any social networks and on the Internet in general. There are plenty of articles on how to do this on the Internet. You can also find the desired versions of maltego.
For example, the guys have written well how to do this here, here and here. For a detailed study of this combine, you will need a whole book, and my task is only to acquaint you with its existence.

Age determination
There are a couple of good services pictriev and how-old.net
image-15.png

Visual demonstration of the capabilities of artificial intelligence.

Search by pictures
Yandex.Images, Google Images, Mail.ru Image Search, Bing.Images.
There are a lot of interesting things you can do with search engines. Do not underestimate their power - after all, their cache contains trillions of images, including from social networks. For example, using the usual capabilities of search engines, the guys from the Bellingcat agency have declassified more than one secret owner of factories, newspapers and steamships and helped in a recent investigation into the poisoning of Navalny. Here is a description of the tools with which they did it.
Nothing is complicated, except for the presence of a sample picture for working with the above-mentioned tools, you will not need. Uploading a picture, looking for similar ones. We refine the search results. Here's how it works:
image-16.png

Immediately got one correct result from Google.
image-17.png

Bing didn't fail either.
image-18.png

But the coolest functionality is provided by the service from Yandex.Images. Try it - you will understand everything yourself.
These same services will help you identify obscure objects, devices, plants and animals in photographs. For example, modern technology makes it possible to recognize not only what the picture shows a dog, but also what breed it is.
Cars, clothing brands and more can often be recognized as well.
And, for example, the Shazam! allows you to identify the artist simply by a small piece of melody.
And all this is absolutely free.

The image search service TinEye can also be noted, although it has recently improved its position.
Here are a few more services that will make OSINT easier for you on social media:
https://map.snapchat.com
http://snradar.azurewebsites.net
https://intelx.io/tools?tab=location
https://twitter.com/search-advanced
https://montage.meedan.com/welcome
https://mattw.io/youtube-geofind/location
https://www.osintcombine.com/instagram-explorer

Frameworks, clouds and other software
It is possible to recognize faces both on the basis of huge frameworks from Google and Microsoft, and openly available on github; it is not at all difficult to parse social media data. Start now and in a year you may be the one who will open your face search service, who knows.
For example, a ready-made facial recognition service from Melkomyagkikh writes about its service like this: implement the facial recognition function in your applications for convenient and reliable interaction with users. No previous experience with machine learning is required. The following functions are available: face detection, which detects faces and their attributes in the image; personal identification, which allows you to find a match with a specific person in a private repository where data for a maximum of 1 million people are stored; emotion recognition, which allows you to identify various facial expressions such as joy, disgust, indifference or fear; recognition and grouping on images of faces similar to each other.

Compilation of composite images online
And here is a simple service that, in the old-fashioned way, will allow you to compose a composite of a person without downloading any additional software.

Improving the quality of sneaks
As we have already seen, artificial intelligence can recognize faces in a crowd and even “remove masks”. But even more opportunities exist in terms of improving the quality of images and complementing them with missing details.
For example, the Let's Enhance service allows you to significantly improve the quality of even very bad images and even bring them to print quality using AI technologies even at 16x magnification.
image-19.png

And the online service pinkmirror.com retouches photos as well as a professional.
image-20.png


Photo processing
remove.bg allows you to remove the background from any image, leaving only people or objects in the foreground. Such processing allows you to more accurately select faces or objects for further search.

Image metadata
A file with a photograph often (that is, if it was not forcibly deleted) contains information about the circumstances of the shooting - including geotagging.
The old-fashioned custom of signing photographs in paper albums has undergone a dramatic change. Nowadays, you no longer need to provide a commentary on your own - the camera (especially a smartphone or tablet), the application in which you processed it, and in addition the Internet service to which you uploaded your photo, will do it for you.
One of the main "collectors" of metadata is the EXIF block added to graphic files. The Exchangeable Image File Format standard was developed by the Japan Electronics and IT Industry Association JEITA, and its first version was published in 1995. EXIF is for JPEG and TIFF image formats. Other popular file formats, such as PNG and GIF, can also contain similar metadata - in particular, the XMP standard developed by Adobe. In addition, camera manufacturers use their own metadata formats, which partially duplicate EXIF.
The “forgotten” metadata in files with photographs more than once came out sideways to the authors or actors of the photographs. One of the most striking examples is the arrest of John McAfee in Guatemala in 2012. While hiding from the investigation into the murder of his neighbor, McAfee gave an interview to Vice, illustrated with a photograph. The metadata of this image was passed on to John McAfee: the geotag found in the image file helped law enforcement officers find and arrest the fugitive.
Well, it's time to start experimenting - check out popular Internet services for what they do with EXIF. For this we used a plug-in for the Firefox browser - Exif Viewer 2.00. The plugin displays metadata for images on web pages and local computers, integrates with map services to display shooting locations, and displays embedded thumbnails.

By the way, you can independently experiment with those services that we have not gotten our hands on - it is extremely simple and quite exciting.
cianru-exif-bad-realtor-RU-1024x1024.jpg

exif-thumbnail-RU.png

facebook-metadata-RU.jpg

A short journey from a photo on the Internet to a place in the real world.

This is what our inspection showed:
Facebook, Twitter, VKontakte - the metadata is removed from the photos;
Google+ - does not delete;
Instagram - deletes;
Flickr, Google Photo, Tumblr - not deleted;
eBay, Craigslist - removed;
CIAN - does not delete.
By the way, with the help of geotags on CIAN, you can calculate dishonest realtors who post photos of other apartments in the ad (of course, if they did not remove EXIF on their own). Services that do not remove metadata usually have a privacy setting to disable their display. But it is the display: the service can still save this data separately. And this topic deserves a separate discussion.
By the way, not only textual information is stored in the metadata, but also a thumbnail of the picture in which it is contained. And sometimes problems can arise with them.
Reading the history of EXIF, we came across one remarkable case. In 2003, American TV presenter Catherine Schwartz posted her seemingly harmless photos on a blog. However, the metadata of these files contained thumbnails of the original photographs showing the complete image before the cropping procedure. And yes, in two of them, Schwartz appeared in the nude.
But after all, more than ten years have passed since then, the developers have probably already coped with the obvious threat to privacy, right? Well, it would be harmless to check - just to be on the safe side.
After testing Adobe Photoshop Express, GIMP, Windows Paint, Microsoft Office Picture Manager, IrfanView and XnView, we made sure that when you edit an image, the thumbnail is updated.
Another test subject was the latest version of the X8 Corel PHOTO-PAINT editor. Suddenly it turned out: when saving a JPG file, the thumbnail is not updated, showing, albeit in a reduced form, but the original image!
PHOTO-PAINT has a function for preparing images for publication on the Web (Export For Web). Perhaps at least this operation will clean up the metadata, we thought, but no.
In general, the experience of Katherine Schwartz can be replicated in our time. For reference: Corel PHOTO-PAINT is marketed as an "advanced photo editor" and "professional application".
To eliminate the possibility of an error in the file itself, due to which the editor cannot update the thumbnail, we repeated the experience, among other things, on files from a DSLR camera, a smartphone, and an exemplary graphic file with penguins from Windows 7.
On the left - the file icon that Windows Explorer takes from the metadata, on the right - the file preview. The file is freshly created, so the point is not at all about caching icons by the operating system, and the Exif Viewer confirmed the suspicions.

In order not to "light up" something superfluous, not intended for prying eyes, along with the photographs, we offer a selection of self-evident, in general, tips.
  1. Disable saving location on the device (only for the camera or for all applications at once).
  2. Remove metadata from files before publishing on the web. For example, XnView is free for personal non-commercial use. But the mechanism "Deleting properties and personal information" built into Windows (called in the file properties window on the "Details" tab) in fact leaves both a thumbnail and EXIF blocks.
  3. You can also remove metadata from photos before uploading them to the Web right on your mobile device. For example, apps for iOS, Android and Windows Phone.
  4. In the privacy settings of network services, prevent them from saving photo metadata.
The most hardcore for those who really have something to lose: do not send photos and data to the Web that may be useful to your ill-wishers. That is, do not publish anything at all that, in certain circumstances, can be used against you.

Extracting metadata
As I wrote above, the metadata contains a lot of interesting information for the OSINT-eer, ranging from geolocation to camera exposure and other photographic nuances that can be compared with a lot of things.
Take this photo here. What else can you say about it besides the genuine joy of the liberation of a person after 7 years of rest?
Let's start with the fotoforensics.com service (which for some reason refuses to work from the Russian IP). What can he tell us?
Composite
MakerNotes
EXIF
File
File TypeJpeg
File Type Extensionjpg
MIME Typeimage / jpeg
Exif Byte OrderLittle-endian (Intel, II)
Image Width4128
Image Height3096
Encoding ProcessBaseline DCT, Huffman coding
Bits Per Sample8
Color Components3
Y Cb Cr Sub SamplingYCbCr4: 2: 2 (2 1)
Makesamsung
Camera Model NameSM-J7108
OrientationRotate 90 CW
X Resolution72
Y Resolution72
Resolution Unitinches
SoftwareJ7108ZHU1BQB1
Modify Date2017: 05: 07 19:22:25
Y Cb Cr PositioningCentered
Exposure Time1/50
F Number1.9
Exposure ProgramProgram AE
ISO40
Exif Version0220
Date / Time Original2017: 05: 07 19:22:25
Create Date2017: 05: 07 19:22:25
Shutter speed value1/50
Aperture value1.9
Brightness Value3.46
Exposure Compensation0
Max Aperture Value1.9
Metering modeCenter-weighted average
FlashNo Flash
Focal length3.7 mm
User Comment
Flashpix Version0100
Color spacesRGB
Exif Image Width4128
Exif Image Height3096
Exposure ModeAuto
White balanceAuto
Focal Length In 35mm Format28 mm
Scene Capture TypeStandard
Image Unique IDV13LLIA02SM V13LLJJ01SA.
CompressionJPEG (old-style)
Thumbnail Offset940
Thumbnail Length18416
Thumbnail Image(Binary data 18416 bytes)
Maker Note Version0100
Device TypeCell phone
Raw Data Byte OrderLittle-endian (Intel, II)
Raw Data CFA PatternSwap
Face detectOff
Time stamp2017: 05: 07 16: 22: 25 + 00: 00
Aperture1.9
Shutter speed1/50
Image Size4128 × 3096
Light value8.8
Megapixels12.8
Scale Factor To 35 mm Equivalent7.6
Circle of confusion0.004 mm
Field of view65.5 deg
Focal length3.7 mm (35 mm equivalent: 28.0 mm)
Hyperfocal Distance1.81 m
As you can see - a lot. Comparing these data, we can say a lot, even about what is left behind the scenes.
About the same information can be obtained online and here .
And if the picture had geodata, then the pic2map service will show the place where the photo was taken right on the map.
The services IMG online and metapicz.com will tell you about the same .
But the services http://www.cameratrace.com/trace and Stolen Camera Finder will allow you to find out the serial number of the camera with which the photo was taken, which, as you understand, can sometimes serve as a serious argument, or even evidence.
And the service https://29a.ch/photo-forensics will allow you to check the photo for mounting.
And for example, by entering the time of a photo that was taken outdoors in sunlight, using the SunCalc service and simple calculations, you can quite accurately determine where this photo was taken.
geocreepy.com asks for only the profile of the person you're interested in, and ... voila! The map shows where and when the user was.

Recovering text from blurred screenshots
But specifically against those who like to “wash away”, and not delete text on screenshots and other images, an absolutely free and open source program Depix has been created, which allows you to restore even the most washed out text.
cxeqampotosrb9ch3iiipmvweow.png

Hollywood films like to exaggerate. They zoom photos a million times - and output numbers from one pixel.
Although this is incredible, scientific research in this area has been going on for a long time. Back in the 90s, theoretical works and PoC were published with the restoration of text from blurred images. In 2012, Vladimir Yuzhikov wrote on Habré about his SmartDeblur program for restoring blurred and defocused images.
Despite the fairly good development of science in this direction, there has not yet been a specialized tool specifically for restoring text after pixelation. Program Depix - the first such tool. And it works.

And this is just the beginning
As we can see, there are a huge number of ways to de-anonymize a person on the network. And this is just the tip of the iceberg. Stay tuned and we will keep you updated.
At the end of the article, I give a redundant selection of OSINT resources:
https://github.com/netstalking-core/netstalking-osint
 
Top