top of page

OSINT – The Art of Finding Everything About Everyone (And How to Vanish from It)

  • Writer: Matyas Koszegi
    Matyas Koszegi
  • Mar 21
  • 5 min read

Welcome to the Digital Panopticon


Congratulations, you exist! That means your data is out there—somewhere, everywhere, on some server, in some database, possibly even in places you’ve never visited. The internet is a wonderful place, full of cat videos and digital skeletons in the closet. As a professional OSINT (Open Source Intelligence) researcher, I can tell you with great confidence: You would be amazed (and horrified) at how much can be discovered about you without breaking a single law.


But here’s the fun part: While OSINT is often used for legitimate purposes—journalism, cybersecurity, law enforcement—it is just as easily wielded by malicious actors, stalkers, and nosy individuals with too much free time. The real question is, do you want to be an easy target?


Let's take a deep dive into the terrifyingly fascinating world of OSINT and, more importantly, how you can become an internet ghost.



OSINT Techniques – How Your Life is an Open Book


Before we discuss solutions, let’s first appreciate the sheer power of OSINT. Here are some of the most effective (and often alarming) ways that information can be gathered about a person:


1. Google Dorking – The Art of Finding What Wasn’t Meant to Be Found


Google is your best friend. Or your worst enemy, depending on which side of the search bar you're on. Google Dorking uses advanced search operators to extract hidden gems from the internet, including exposed documents, login portals, and personal information.


Example Dorks:

  • intitle:"index of" "passwords.txt" → Finds open directories containing plaintext passwords.

  • site:linkedin.com inurl:pub "@gmail.com" → Extracts personal emails from LinkedIn.

  • filetype:xlsx site:gov "passport number" → Oh look, government spreadsheets just lying around!


Lesson? If something was ever publicly available, Google has probably indexed it.


2. Social Media Searches – The Goldmine of Personal Data


People love to overshare. Birthdays, locations, relationships, new jobs—it’s all there. A few well-crafted searches on Twitter, Instagram, Facebook, or TikTok can reveal:

  • Your full name, birthdate, and family members.

  • Where you went on vacation last summer.

  • That “super secret” second account you use for venting.

And the best part? Even if you delete it, platforms archive everything.


3. Email and Username Searches – Tracing Your Digital Footsteps


Your email address is like your digital fingerprint—it’s everywhere. Tools like Have I Been Pwned?, Dehashed, Whatsmyname and Sherlock can tell an investigator:

  • What services you’ve signed up for.

  • Whether your email is in any data breaches.

  • If you used the same username across multiple platforms (rookie mistake).


4. Government Databases and Public Records – Official Spying, but Legal


Governments love collecting data, and some of it is freely available. This includes:

  • Property records

  • Business registrations

  • Court documents

  • Voter registration info


Here are some useful sites for the US and Europe.


U.S. Government & Public Records

  • FOIA.gov – U.S. Freedom of Information Act (FOIA) request portal.

  • Data.gov – Open data from the U.S. government.

  • VINCheck – Check if a U.S. vehicle has been stolen or declared a total loss.


European Government & Public Records

5. Dark Web and Data Leaks – Where Your Passwords Go to Die


Data breaches are inevitable. Once your personal information leaks onto the dark web, it's out there forever. Criminals trade and sell stolen credentials, meaning that:

  • Your old passwords might still be in use somewhere.

  • Your credit card info may be up for grabs.

  • Your private emails might not be so private.


6. OSINT Framework and Maltego – The Professional Spy Kit


Maltego is an OSINT investigator’s dream. It visualizes connections between individuals, emails, domains, and networks, making it incredibly easy to track down everything about a target. Meanwhile, OSINT framework compile all possible investigation sources into one place.


How to Protect Yourself – The OSINT Vanishing Act


Now that we’ve successfully ruined your peace of mind, let’s talk about how you can actually do something about it.



1. Harden Your Social Media Profiles

  • Set everything to private.

  • Disable search engine indexing.

  • Avoid posting real-time location updates.

  • Use aliases instead of your real name (if possible).

  • Delete old posts that reveal too much.


2. Mask Your Email and Username Usage

  • Use unique emails for different services.

  • Try email aliasing services like SimpleLogin or ProtonMail’s Hide My Email.

  • Never reuse the same username across platforms.


3. Lock Down Your Personal Data

  • Opt out of data broker sites (use services like DeleteMe or do it manually).

  • Avoid registering your phone number publicly.

  • Request the removal of old personal info from search engines. Here is an example for Google.

  • Use a privacy-focused web browser like Brave.


4. Encrypt and Secure Communications

  • Use end-to-end encrypted messaging apps like Signal or Session.

  • Encrypt sensitive emails (PGP encryption still works!).

  • Use a VPN to mask your IP address. Proton VPN and Mullvad VPN are great.


5. Strengthen Your Passwords and 2FA

  • Use password managers like Bitwarden or KeePass.

  • Enable two-factor authentication (preferably hardware keys like YubiKey).

  • Never reuse passwords. Ever.


6. Avoid Data Leaks and Dark Web Exposure

  • Regularly check Have I Been Pwned?

  • Change passwords if your credentials are compromised.

  • Monitor dark web activity related to your data.


7. Use OSINT Tools to Check Your Own Exposure

  • Run Google Dorking searches on yourself.

  • Use Maltego to see how much can be connected back to you.

  • Search your email and username on breach databases.


8. Use Free And Open Source Software And Privacy-Focused Search Engines

  • If you already use Brave, why not use Brave search?

  • Use a Linux distributions instead of Windows or MacOS. If you just want to try it out, Linux Mint is a solid choice.

  • Buy yourself a Google Pixel Phone, an older model will do as well. You want to erase everything on it and install GrapheneOS. Follow the instructions on the homepage. Very easy to set up.


Conclusion: You Can’t Erase Yourself, But You Can Hide Well


Let’s be honest: Completely erasing yourself from OSINT sources is almost impossible. But minimizing exposure? That’s an achievable goal. By being proactive about privacy, you make yourself a harder target.


The truth is, most people don’t even realize they’re leaking data until it’s too late. So, while OSINT remains an invaluable tool for investigators, journalists, and cybersecurity professionals, it’s also a powerful reminder of just how fragile our digital privacy really is.


The choice is yours—will you continue to be an open book, or will you take control of your digital footprint?

Your move, internet ghost.


Comments


bottom of page