You'll be amazed how seemingly innocent things you share online, like a picture of your cat, can give away your location if someone knows how to connect the dots using public information. This part shows you how investigators can piece together a complete picture from just a tiny, low-quality screenshot, revealing specific locations using logical deductions and clever image analysis tricks. You'll realize that even your old, forgotten online profiles or posts can be easily uncovered with readily available tools, making you think twice about your long-term digital footprint. The discussion about AI's potential in OSINT will really make you consider how much more powerful and pervasive these tracking capabilities might become in the near future. you have to be careful what you post out there because it's amazing what you guys can do identifying key things in pictures and trying to figure out what they are and think very logically about what that might be is a it's a real skill, you know, breaking down an image, foreground, middle ground background and really looking at it, you know, objectively. What was a key technique Gary used to identify Johnny Lee Miller's apartment from publicly available information? In the shisha bar investigation, what piece of information was crucial for Gary to quickly locate the bar, despite the low-quality image? According to Gary, what is a fundamental skill for effective imagery analysis in OSINT? How does Gary predict AI will impact OSINT tools like Maltego in the future? What general warning about social media use can be inferred from Gary's OSINT examples? You’ll definitely want to hear about the essential personal security upgrades, like iOS 17.3’s new protection and why hardware security keys (think Yubikey) are a game-changer for completely shutting down phishing attacks. The clip makes you question whether it's better to constantly train people to spot threats or build systems so secure that a misstep doesn't even matter — it’s a thought-provoking dilemma that might change how you view security education. You'll get a fascinating insight into the surprising vulnerabilities of things like voice authentication and even facial recognition, making you think twice about how secure these modern methods really are. You’re reminded that even with all the tech, basic vigilance is key, especially when you hear the shocking story about how a simple email compromise led to a massive sum being stolen during a mortgage transfer. make sure you've turned on that new thing that came out in ios 17.3... if people steal your device your iphone uh it they really can't there's no benefit anymore because it just won't work for them even if they have the passcode if you run a small business do not become complacent the amount of the amount of small and medium businesses that no one has ever heard of you know jack's lumber shop in Oregon y no one's ever heard of it but it's on a ransomware site because it got hit with lock bit because they didn't update for free their active directory you know just update especially the internet facing stuff um don't get complacent with that that really annoys me when I see that happen because it's just so much of it is an easy fix What is a key benefit of enabling the new security feature in iOS 17.3 mentioned in the discussion? According to the speaker, what is a fundamental rule for password security that is often made easier by built-in device features? What advanced security device is specifically recommended for superior phishing resistance, even against sophisticated MFA bypass tools? What critical security measure is emphasized for individuals and especially small businesses to prevent common cyberattacks like ransomware? What type of cyberattack led to a significant financial loss in the real-world example involving a mortgage money transfer? You’ll hear a wild story about how simply an Instagram post and reflections in windows can lead someone to figure out where a celebrity lives – it really makes you think about what you share! Discover how a blurry screenshot of a shisha bar was pinpointed to an exact location in Leeds, thanks to clever observation skills and a crucial hint, showing you the detective work involved in OSINT. You'll get a peek into how professionals analyze images, enhancing details and logically breaking down what's in front of them, even using techniques like boosting shadows on a phone! This part serves as a powerful reminder of how easily your online footprint can be traced, especially with tools like Sherlock and the coming impact of AI on OSINT – it’s a clear call to be mindful of your digital privacy. you have to be careful what you post out there because it's amazing what you guys can do. identifying key things in pictures and trying to figure out what they are and think very logically about what that might be is a it's a real skill, you know, breaking down an image, foreground, middle ground background and really looking at it, you know, objectively. What specific technique did Gary use to identify Johnny Lee Miller's apartment in the video? What crucial piece of information, though seemingly unrelated to the image, significantly helped Gary locate the shisha bar? According to Gary, what is a key skill for effective imagery analysis in OSINT? What does Gary predict will significantly enhance the power of OSINT tools like Maltego in the future? What is the main takeaway Gary emphasizes regarding personal online posts? You'll immediately want to put these fundamental tips into practice: ditch those reused passwords for a password manager, and make sure you've enabled multi-factor authentication (MFA) everywhere you can. You'll discover how crucial it is to keep your software updated immediately, and why specific tools like a YubiKey can be a game-changer for phishing protection. Plus, if you have an iPhone, you'll hear about a new iOS 17.3 feature that's a serious digital life-saver if your device is stolen. You’re going to hear a fascinating debate about whether we should focus on educating everyone to spot every phishing attempt, or if technology should be so robust that it protects you even if you click the wrong thing. It’ll make you wonder what the best approach really is. You'll also get a chilling real-world story about how a seemingly simple email hack led to a huge financial loss during a mortgage transfer, showing just how vulnerable even major transactions can be and why constant vigilance is key. if people steal your device your iphone, they really can't, there's no benefit anymore because it just won't work for them even if they have the passcode. Google reported they have zero fishing now because they use those [YubiKeys]. What significant security enhancement was introduced in iOS 17.3 to protect stolen iPhones? What is a critical piece of advice regarding password management? According to the speaker, what is a highly recommended hardware solution for 'fish proof' multi-factor authentication? Why is it crucial to update your operating system and software quickly? Based on the anecdote shared, what is the speaker's general opinion on voice or simple facial recognition for authentication?