Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Anonymous research

Latest blogs

Topic : Anonymous research
  • --Any--
  • Anonymous research
  • Compliance
  • Cryptocurrency
  • Cybersecurity
  • Dark web basics
  • Dark web research
  • Digital fingerprint
  • Financial crime
  • Fraud and brand misuse
  • Law enforcement
  • OSINT news
  • OSINT research
  • Phishing/malware
  • Product info
  • Secure web access
  • SOC
  • Social media
  • Threat intelligence
  • Trust and safety
  • VPN
  • Zero-trust app access

5 key reasons why VPN alone won't protect you or your research

What you need to know about VPNs and the security implications that come with relying on it alone.

How adversaries use researcher’s digital fingerprint against them

Hidden dangers are lurking in your digital fingerprint. Here's how to manage it.

Buy vs. build non-attributable networks

DIY approaches to powering secure, anonymous online research may seem cost-effective, but hard and soft costs combined show that’s not the…

What’s in your digital fingerprint and how to control it

Your digital fingerprint — or browser fingerprint — may seem like innocuous details. But for online investigators, especially in law…

Mitigating risk in SOC investigations with managed attribution

Cloud-based web isolation neutralizes cyberthreats in employees’ everyday web activity — but how do SOCs secure their own online…

generia blog

Online investigation best practices: 3 strategies to follow

There are a lot of resources out there to help researchers. Here are Authentic8’s 3 online investigation best practices to stay productive…

Misattribution vs. managed attribution

What’s the difference between misattribution vs. managed attribution? We look at the levels of control each type of attribution provides…

generia blog

Naked and exposed: stop investigating online without managed attribution

Everything you wanted to know about browser fingerprint, managed attribution and non-attribution — but didn’t know who to ask.

What VPNs and Incognito Mode still give away in your online identity

VPN and Incognito Mode reveal a ton of data to visited websites that managed attribution solutions can conceal and manipulate for analyst…

Blog updates

Stay updated with the latest posts from the blog
Close
Close