AI OSINT tool allows mass examination of YouTube profiles

An open-source intelligence (OSINT) service claims that it can generate detailed profiles to YouTube users based solely on their comment activity.
The tool, part of the “YouTube Tools” suite of the pseudonymous developer Lolarchiver, allows users to run a series of AI-activated checks with any YouTube commentator. The tool Webpage has been modified recently to show the administrator’s email address, maybe in response to the increase in media attention.
According to In a May 28th report of Tech Outlet 404 Media, the tool could produce reports within seconds that included infer data such as the geographical location of a user and potential political or cultural leadership.
During the trial, a user was reported to be identified as living in Italy based on the Italian language commentary and references to a TV show in Italy.
AI makes Osint Lazy
While the views generated by YouTube tools are based on available public data, the tool significantly lowered the entry barrier for digital profiling. Anyone can look for what a YouTube commentator wrote and do the cuts on their own.
However, it usually takes painful research and reading through a lot of annoying content. In AI, all it takes is a click.
In addition to YouTube tools, Lolarchiver also provides Osint tools for Twitch, Kick, League of Legends, Nhentai, Leaked Databases Search, X, Email Reverse Lookup and Phone Reverse Lookup. Legal experts warn that some of these tools may violate service platform terms or even local data protection laws, depending on where it is used.
Related: Third individual arrested in NYC crypto torture and kidnapping case
Not playing policies
YouTube tools are likely to violate YouTube Policies. This is because website services allow data scraping, but “just in accordance with the Robots.txt file”, which lists index pages – this service is unlikely to respect such limits.
The service allows you to look for leaked databases, and the legality of doing so depends on your location. While viewing your data is generally legal, search for third-party data without a legal basis may be a violation of the European Union’s General regulation of data protection or state privacy laws in the US.
If the data includes credentials, the use of them may cross the line from the civil to the criminal charges, depending on the scope. According to 404 media, the Lolarchiver administrator is located in Europe, and the EU has strict requirements for personal data processing.
The importance of data security
Increasing tools like Lolarchiver features the long -term impact of historical and ongoing data violations. If by newsletter sign-ups or knowing your customer’s (KYC) processes on crypto platforms, personal information is often exposed to hacks and database leakage.
This is because databases often end with leakage that then make their way to steal data or service markets, such as Lolarchiver. An old example that is still taxing in the crypto space is a ledger ledge of the hardware wallet manufacturer’s manufacturer, exposing personal information of more than 270,000 customers.
May -set of this article, affected by leakage, reports receiving scam emails day -day as a result. A more recent example is Breaking Coinbase data from this month.
Hack exposed to Coinbase users’ account balances, ID images, phone number, home addresses and partial hidden bank details on attacks. Such issues are part of why some of the cryptocurrency space add concerns about KYC requirements.
Related: Arrests in France with more than 12 suspects linked to crypto kidnappings: Report
Attack by KYC and $ 5
For cryptocurrency holders, KYC data exposure can be especially dangerous. A growing number of physical attacks – sometimes referred to as “$ 5 wrench attacks” – target individuals believe holding a large amount of crypto.
Recent reports indicate that as popularity and price increases, some criminals take Violent steps to steal funds from the holders holding the crypto. A storage of known physical attacks on Bitcoin holders Report 29 cases in 2025, excluded by non -incidents or those who did not receive the media’s attention.
As it remembers the privacy that is mounted, tools such as YouTube tools reflect a greater trend: the growing ease of which digital footsteps can be invasive profiles, often without consciousness or user permission.
Magazine: In crypto, no one cares who you are: here’s why good things that