Bitcoin

AI’s OSINT tool allow mass analysis of YouTube profiles

An Open Source Intelligence Service (OSINT) says it can generate detailed profiles on YouTube users based solely on their comment activity.

The tool, which is part of the suite “YouTube Tools” by the pseudonym developer Lolarchiver, allows users to perform a series of checks supplied by AI on any YouTube commentator. The tool’s web page has been recently modified to display only the administrator’s email address, probably in response to increased media attention.

According to a report of May 28 by Tech Outlet 404 Media, the tool can produce reports in a few seconds which include induced data such as the geographic location of a user and potential political or cultural trends.

During the, a user would have been identified as living in Italy on the basis of Italian language comments and references to an Italian television program.

Ai makes bone lazy

Although the information generated by YouTube tools is based on data accessible to the public, the tool has considerably reduced the barrier to the entry for digital profiling. Anyone can look for what a YouTube commentator has written and do these deductions themselves.

However, careful research would usually be necessary and by reading a lot of boring content. With AI, just one click.

In addition to the YouTube tools, Lolarchiver also provides OSINT tools for Twitch, Kick, League of Legends, NHENTAI, the search for databases disclosed, X, Reversed by e-mail and inverted telephone research. Legal experts warn that some of these tools may be in violation of the conditions of use of the platform or even local data protection laws, depending on where they are used.

In relation: Third individual arrested in a case of cryptographic torture and kidnapping in New York

Do not play according to the rules

YouTube Tools is probably in violation of youtube policies. Indeed, the conditions of use of the website allow data scratching, but “only in accordance with its Robots.txt” file, which lists indexable pages – this service probably does not comply with these limitations.

The service also allows you to search for disclosed databases, and the legality of doing so depends on your location. Although the search for your data is generally legal, the search for third-party data without legal basis may be a violation of the general regulation of the protection of European Union or the laws on the confidentiality of states in the United States.

If data include identification information, their use can cross the line of civil accusations to criminal accusations, according to the court. According to 404 Media, the Lolarchiver administrator is located in Europe and the EU has strict requirements for the processing of personal data.

The importance of data security

The rise of tools like Lolarchiver highlights the long -term impact of historical and in progress data violations. Whether through newsletter inscriptions or know your customer processes (KYC) on cryptographic platforms, personal information is frequently exposed in hacks and database leaks.

Indeed, databases are often found in leaks which then make their way to stolen markets or data services, such as Lolarchive. An old example that still resonates in the Crypto space is a data leak by the large book of material portfolio producers, exposing personal information of more than 270,000 customers.

The author of this article, which was affected by the flight, reports daily scam emails. A more recent example is the violation of this month’s Coinbase data.

This hacking exposed the accounts of the accounts of Coinbase users, identification images, telephone numbers, personal addresses and banking details partially hidden from the attackers. These problems are part of the reason why some in the cryptocurrency space raise concerns concerning the requirements of KYC.

In relation: France stops more than 12 suspects related to cryptography abductions: report

KYC and Key attacks at $ 5

For cryptocurrency holders, exposure of KYC data can be particularly dangerous. An increasing number of physical attacks – sometimes called “$ 5 attacks” – target individuals who hold large amounts of crypto.

Illustration of a key attack of $ 5. Source: XKCD

Recent reports indicate that as cryptocurrency gain in popularity and price, some criminals take violent measures to steal funds from high-level cryptography holders. A repository of known physical attacks against Bitcoin holders reports 29 cases in 2025, without including unusual incidents or those who have not received the media attention.

As confidentiality problems rise, tools like YouTube tools reflect a broader trend: the growing ease with which digital fingerprints can be transformed into invasive profiles, often without awareness or consent.

Review: In crypto, nobody cares about who you are: this is why it is a good thing