Breached data sets. To use or not to use, that is the question.

  • This topic is empty.
Viewing 1 post (of 1 total)
  • Author
  • #722

    I’ve read some interesting articles recently talking about what does and does not constitute ‘legal’ OSINT and the fact that an analyst should always be alive to the legislation, policies and best practice which governs them or their organisation. I saw a comment asking about the use of information obtained from Breached datasets or aggregation sites which share personal data which had previously been ‘exfiltrated’ during the course of a ‘hack’ or other breach. Interested in your own views on this.

Viewing 1 post (of 1 total)
  • You must be logged in to reply to this topic.