An Open Source Intelligence (OSINT) service claims it can generate detailed profiles on YouTube users based solely on their commentary activity.
The tool, part of the “YouTube Tools” package of Pseudonymous developer Lolarchiver, allows users to run a number of AI-powered controls on any YouTube commentator. The tool’s web page was recently changed to only display the administrator’s E -mail address, presumably in response to increased media uprising.
According to a May 28 report from Tech Outlet 404 Media, the tool can produce reports within seconds that include derived data such as a user’s geographical location and potential political or cultural inclinations.
During the test, a user was reportedly identified as living in Italy based on Italian-language comments and referrals to an Italian TV show.
AI makes osin lazy
While the insight generated by YouTube tools is based on publicly available data, the tool has significantly lowered the barrier to access to digital profiling. Anyone can look up what a YouTube commentator has written and even make these deductions.
Still, it will usually take careful research and read through a lot of boring content. With AI, all it takes is a click.
In addition to YouTube tools, Lolarchiver also delivers OSINT tools for Twitch, Kick, League of Legends, Nhentai, Leaked Databases Search, X, Reverse posting of E email and phone reverse posting. Legal experts warn that some of these tools may be contrary to the platform terms or even local data protection laws, depending on where they are used.
Related: Third person arrested in NYC Crypto Torture and Kidnapping Case
Do not play according to the rules
YouTube tools are probably contrary to YouTube’s policy. This is because the site’s Terms of Service allows data rapping, but “only in accordance with its robots.txt” file showing the indexable pages – this service probably does not respect such restrictions.
The service also allows you to search in leaked databases and the legality of doing so depends on your location. While it is generally legal to search your data, searching for third -party data without a legal basis may be a violation of the European Union’s general data protection regulation or the state’s privacy legislation in the United States.
If the data includes credentials, use of them can cross the line from civilians to criminal charges, depending on jurisdiction. According to 404 media, Lolarchiver’s administrator is located in Europe and the EU has strict requirements for the processing of personal data.
The meaning of data security
The increase of tools such as Lolarchiver highlights the long -term effect of historical and ongoing data violations. Whether there is a newsletter enrollment or know your customer (KYC) processes on crypto platforms, personal information is often postponed in hacks and database leaks.
This is because databases often end up in leaks that then make their way to stolen data market or services, such as Lolarchives. An old example that still repeats itself in Crypto Space is a data leak of hardware -tektog manufacturer Ledger, which reveals the personal information to over 270,000 customers.
The author of this article, affected by the leak, reports daily receipt of scam -e emails as a result. A newer example is Coinbas’s data violation from this month.
This Hack exposed Coinbase -Users’ Account Balance, ID pictures, phone numbers, home addresses and partially hidden bank information to attackers. Such questions are part of why some in the cryptocurrency rum raise concerns about KYC requirements.
Related: France arrests over 12 suspects attached to cryptocidnappings: Report
Kyc and $ 5 screw key attack
For cryptocurrency, the exposure of KYC data can be particularly dangerous. A growing number of physical attacks – sometimes referred to as “$ 5 wrenches” – are targeted at individuals who are believed to have large amounts of crypto.
Recent reports show that when cryptocurrency grows in popularity and price, some criminals take to violent measures to steal funds from high -profile crypto holders. A stock of well -known physical attacks on Bitcoin holders reports 29 cases in 2025, not including unreported events or those who did not receive media trial.
As privacy mounts mount, tools such as YouTube tools reflect a wider trend: the growing ease with which digital footprints can be converted into invasive profiles, often without user awareness or consent.
Magazine: In crypto, nobody is interested in who you are: here is why it is a good thing