OSINT Case Study - Streamer Under Spotlight
An OSINT analysis revealing extensive vulnerabilities in a streamer's digital footprint, including old photos, deleted tweets, historical usernames, leaked IPs and passwords, geolocation of their parents' house, and detailed mapping of their residence via Instagram geotags.

Introduction
This case study delves into the digital footprint of a popular streamer, uncovering significant security vulnerabilities. The analysis highlights how historical online data—including old photos, deleted tweets, outdated usernames, and leaked credentials—can be exploited by malicious actors to piece together a detailed personal profile.
Tools Used
- Historical Data Scrapers: Recovered old photos and tweets that were removed, offering insight into the streamer's past digital behavior.
- Username Aggregators: Compiled outdated usernames along with associated personal information from various platforms.
- Leak Databases: Identified leaked IP addresses and passwords from multiple data breaches.
- Geolocation Analysis: Mapped the streamer’s residential area by analyzing geotags in Instagram photos, even pinpointing the location of their parents' house.
- Online Registries: Discovered instances where the streamer’s photo was used in registrations on numerous websites.
Findings
- 📷 Old Photos: Archived images surfaced, revealing sensitive details about the streamer’s personal life.
- 💬 Deleted Tweets: Retrieved tweets that had been removed, exposing past statements and sensitive remarks.
- 🔗 Historical Usernames: Uncovered outdated usernames that, when correlated with personal data, provided a fuller picture of their online identity.
- 🌐 Leaked IPs & Passwords: Multiple leaks of IP addresses and passwords were identified, heightening the risk of unauthorized access.
- 📍 Geolocation Data: Geotagged Instagram photos enabled detailed mapping of the streamer’s residence and even located their parents' house.
- 📝 Photo Registrations: Found the streamer’s photo used in various online registrations, increasing avenues for potential exploitation.
Conclusions & Recommendations
This analysis demonstrates the significant risks posed by a publicly exposed digital footprint. To mitigate these vulnerabilities, the following measures are recommended:
- ✅ Regularly update security settings and monitor for compromised credentials.
- ✅ Remove geotags from all photos to safeguard location privacy.
- ✅ Proactively manage and purge historical data that could compromise personal security.
- ✅ Strengthen account recovery processes and utilize unique, robust passwords.
- ✅ Conduct periodic audits of online presence to identify and address emerging risks.
By addressing these issues, streamers can better protect themselves against the multifaceted threats posed by modern cyber adversaries.