If you have ever registered on a social network, left a comment under some video or posted on an online forum, your information is publicly available. Just google yourself and see the search results. But this is just the most basic information about you that can be found on the Internet. A person with sufficient motivation and time can find much more. In addition, a significant amount of information is available in public databases, as well as government and commercial records, from which data can leak.
A doxer aims to gather your personal information to use it for some malicious purpose, most often leaking it.
So, how do doxers do that? Where do they get all the information about you? There are several ways to dox people. Let’s look at the most widespread ones:
These are just a few of the most popular ways to gather information about someone, but there are so much more – and some that you would not even be able to imagine.
A bright example is a case of an unfortunate cyclist. One day he unexpectedly began receiving abusive messages and threats from strangers. As it turned out, the sports tracking application he was using published his bike routes in the public domain, and someone found out that the cyclist recently drove near the place where someone attacked a child.
And here it started: due to a similar outfit and coincidental presence at the spot of attack, he was “identified” as a suspect by some internet users who found and published his address. As a result, the police had to protect the innocent cyclist while searching for the real attacker.
Still, not to worry, many cases of doxing like this can be prevented. In the next lesson, you will learn what you can do not to become a victim of doxing.
Which of the following is true when it comes to doxing?
IP address tracking is a myth