<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
    
    <url>
        <loc>https://www.informedis.com/contactus</loc>
        <lastmod>2026-01-26</lastmod>
    </url><url>
        <loc>https://www.informedis.com/</loc>
    </url><url>
        <loc>https://www.informedis.com/website/info</loc>
    </url><url>
        <loc>https://www.informedis.com/blog</loc>
    </url><url>
        <loc>https://www.informedis.com/blog/blog-news-4</loc>
    </url><url>
        <loc>https://www.informedis.com/blog/blog-news-4/feed</loc>
    </url><url>
        <loc>https://www.informedis.com/blog/blog-news-4/from-photoshopped-to-ai-generated-how-fake-images-fool-the-internet-4</loc>
    </url><url>
        <loc>https://www.informedis.com/blog/blog-news-4/from-satire-to-scams-understanding-the-different-forms-of-fake-news-3</loc>
    </url><url>
        <loc>https://www.informedis.com/blog/blog-news-4/clicks-emotions-and-bias-why-fake-news-feels-so-convincing-2</loc>
    </url><url>
        <loc>https://www.informedis.com/blog/blog-news-4/fake-news-explained-what-it-is-what-it-isnt-and-why-it-matters-1</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/introduction-to-fake-news-misinformation-1</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/how-to-verify-an-image-in-60-seconds-3</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/deepfakes-101-understanding-ai-generated-media-4</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/introduction-to-osint-for-beginners-5</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/social-media-safety-responsible-sharing-6</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/lesson-1-4</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/module-1-what-are-deepfakes-basics-103</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/module-1-what-osint-really-is-139</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/module-1-how-social-media-algorithms-work-155</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/module-1-what-makes-an-image-fake-35</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/lesson-2-7</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/module-2-why-deepfakes-matter-137</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/module-2-everyday-osint-tools-142</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/module-2-avoiding-manipulation-online-158</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/module-2-the-60-second-verification-workflow-39</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/lesson-3-9</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/module-3-common-signs-of-synthetic-media-110</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/module-3-social-media-verification-basics-146</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/module-3-spotting-fake-or-suspicious-accounts-161</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/module-3-reverse-image-search-basics-42</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/lesson-4-11</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/module-4-techniques-tools-to-spot-deepfakes-116</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/module-4-ethical-boundaries-in-osint-149</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/module-4-protecting-your-digital-identity-164</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/lesson-5-13</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/module-4-spotting-digital-manipulation-with-the-naked-eye-46</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/lesson-6-15</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/module-5-ethics-responsibility-regulation-119</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/module-5-metadata-basics-exif-made-simple-49</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/lesson-7-17</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/lesson-6-case-studies-124</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/module-6-checking-for-misleading-context-52</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/module-7-cross-checking-sources-55</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/slide/module-8-60-second-verification-practice-58</loc>
    </url><url>
        <loc>https://www.informedis.com/slides</loc>
    </url><url>
        <loc>https://www.informedis.com/profile/users</loc>
    </url><url>
        <loc>https://www.informedis.com/profile/ranks_badges</loc>
    </url><url>
        <loc>https://www.informedis.com/slides/all</loc>
    </url>
</urlset>