True Crime Bullsh**: The Israel Keyes Investigation cover image

0414 | Threads

True Crime Bullsh**: The Israel Keyes Investigation

00:00

Using a Data Breach Search Engine to Find a User Name

We start with known keys data, emal addresses, user names, phone numbers, addresses, passwords, ip addresses. Then we run that against over 11 billion breech records. The results can be quite varied, and often go as far back as the 19 nineties. We then mind those profiles. We never try to log in or hack the accounts. We just see what we can find superficially. Sometimes it's an email address or an ip address or an associate account. Then we take that information and start the first phase known data all over again. And we look for both patterns and new user data. But here's a single, very boiled down example of how this has

Play episode from 04:36
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app