Forensic Analyzer — Secure sharing workflow

Secure sharing workflow for Forensic Analyzer.

Forensic Analyzer: Secure sharing workflow

For whistleblower submissions or journalist handoffs, the analyzer is the first step. Check for GPS in embedded images, JavaScript beacons, and revision history. Then scrub, flatten, and analyze again.

Suggested flow

  1. Prepare source file(s) and confirm intended recipients.
  2. Run this tool with minimal settings first.
  3. Review output quality and file size.
  4. Combine with scrub flow for external sharing when needed.

What this does not protect

  • Scenario guidance reduces risk but does not eliminate it.
  • Operational identity leaks can still occur outside this tool.