// Comparison

Extreme Privacy vs OSINT Techniques: Which Should You Read?

Two cybersecurity books on Privacy, compared honestly: who each is for, what each does best, and which to read first.

Intermediate
5/52024
Extreme Privacy

What It Takes to Disappear

Michael Bazzell

Michael Bazzell's defender-side companion to OSINT Techniques: a step-by-step program for removing yourself from data brokers, public records, and the everyday surveillance economy without going off-grid.

Intermediate
5/52024
OSINT Techniques

Resources for Uncovering Online Information

Michael Bazzell

Michael Bazzell's relentlessly updated technical manual for finding people, accounts, breach data, geolocation evidence, and online identifiers — the de facto reference of the modern OSINT field.

Read this if

Anyone whose threat model includes stalkers, doxxers, abusive ex-partners, hostile foreign governments, or simply the data-broker industry. Also the canonical reference for journalists, executives, public defenders, and investigators who need their personal footprint to stop being a vector.
Investigators, journalists, threat-intel analysts, fraud teams, and anyone whose job depends on what they can verify from public sources. The single most utilitarian OSINT book in print; Bazzell rewrites it nearly every year because the field's surface keeps moving.

Skip this if

Readers who want philosophical privacy theory rather than a 558-page operational checklist. Bazzell does not argue for privacy — he assumes you're sold and shows you the work. Also US-centric; the LLC, mail-forwarding, and DMV chapters require translation outside North America.
Readers wanting an academic intelligence-cycle textbook or a single tidy OSINT methodology. Bazzell's strength is breadth, currency, and tooling — if you want methodology before tools, read Hassan & Hijazi first. Also written for North America; non-US techniques are sparser.

Key takeaways

  • Privacy is a continuous practice, not a one-time purge: data brokers re-acquire your records every quarter, and the workflow is what holds the line.
  • The hardest links to break are the ones you created yourself — utility accounts, professional licensing, vehicle titles — and most of the book is the playbook for breaking them.
  • Most leaks come from people who used to know you; the book's chapters on family, devices, and shared services are the most underrated.
  • Treat the book as a current toolbox, not a finished doctrine — the URLs and tools die, the workflow Bazzell teaches outlives them.
  • Build a separate VM and disposable identity per investigation; the book's OPSEC posture is non-negotiable for serious work.
  • Breach-data, username, and email pivots are still the highest-yield queries in 2026; everything else is supporting evidence.

How they compare

Extreme Privacy and OSINT Techniques are both rated 5/5 in our catalog. Pick by topic preference and reading style rather than by rating.

Both books target intermediate-level readers, so the choice is about topic, not difficulty.

Extreme Privacy and OSINT Techniques both cover Privacy, OSINT, so reading them in sequence reinforces the same material from different angles.

Keep reading

Related topics