Cogs of War cover image

The Tech and Tradecraft Behind Open Source Intelligence

Cogs of War

00:00

Authenticate’s managed-attribution and secure browsing workflow

Scott Petry details Authenticate’s arm’s-length browsing, regional personas, toolchain, provenance preservation, and audit controls.

Play episode from 19:28
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app