// Comparison
Extreme Privacy vs OSINT Techniques: Which Should You Read?
Two cybersecurity books on Privacy, compared honestly: who each is for, what each does best, and which to read first.
Michael Bazzell's defender-side companion to OSINT Techniques: a step-by-step program for removing yourself from data brokers, public records, and the everyday surveillance economy without going off-grid.
Michael Bazzell's relentlessly updated technical manual for finding people, accounts, breach data, geolocation evidence, and online identifiers — the de facto reference of the modern OSINT field.
Read this if
Skip this if
Key takeaways
- Privacy is a continuous practice, not a one-time purge: data brokers re-acquire your records every quarter, and the workflow is what holds the line.
- The hardest links to break are the ones you created yourself — utility accounts, professional licensing, vehicle titles — and most of the book is the playbook for breaking them.
- Most leaks come from people who used to know you; the book's chapters on family, devices, and shared services are the most underrated.
- Treat the book as a current toolbox, not a finished doctrine — the URLs and tools die, the workflow Bazzell teaches outlives them.
- Build a separate VM and disposable identity per investigation; the book's OPSEC posture is non-negotiable for serious work.
- Breach-data, username, and email pivots are still the highest-yield queries in 2026; everything else is supporting evidence.
How they compare
Extreme Privacy and OSINT Techniques are both rated 5/5 in our catalog. Pick by topic preference and reading style rather than by rating.
Both books target intermediate-level readers, so the choice is about topic, not difficulty.
Extreme Privacy and OSINT Techniques both cover Privacy, OSINT, so reading them in sequence reinforces the same material from different angles.