
The Tech and Tradecraft Behind Open Source Intelligence
Cogs of War
00:00
Authenticate’s managed-attribution and secure browsing workflow
Scott Petry details Authenticate’s arm’s-length browsing, regional personas, toolchain, provenance preservation, and audit controls.
Play episode from 19:28
Transcript


