{"id":18281,"date":"2021-04-29T19:27:52","date_gmt":"2021-04-29T15:27:52","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/doxing-methods\/18281\/"},"modified":"2021-04-29T19:27:52","modified_gmt":"2021-04-29T15:27:52","slug":"doxing-methods","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/doxing-methods\/18281\/","title":{"rendered":"How to protect yourself from doxing"},"content":{"rendered":"<p>Every time you like something on a social network, join a community of neighborhood residents, publish your CV, or get caught on a street camera, the information accumulates in databases. You may have no idea how vulnerable leaving all those traces of information \u2014 every action on the Internet and almost every action in the real world \u2014 leaves you.<\/p>\n<h2>The wrong biker, driver, father<\/h2>\n<p>Doxing can happen to anyone, as these three anecdotes illustrate.<\/p>\n<p>When Maryland cyclist Peter Weinberg <a href=\"https:\/\/nymag.com\/intelligencer\/2020\/06\/what-its-like-to-get-doxed-for-taking-a-bike-ride.html\" target=\"_blank\" rel=\"nofollow noopener\">began receiving<\/a> insulting messages and threats from strangers, he learned that his workout app was publishing his cycling routes and somebody had used them to deduce that Weinberg had recently passed not far from where somebody had attacked a child. The crowd quickly \u2014 and incorrectly \u2014 identified him as the suspect and found and published his address. In a very familiar pattern, the subsequent corrective tweets and other clarifications were shared far less widely than the original information was.<\/p>\n<p>On the other side of the world, an animal rights activist from Singapore <a href=\"https:\/\/www.tnp.sg\/news\/singapore\/animal-rights-activist-harasses-wrong-person-hitting-dog-car\" target=\"_blank\" rel=\"nofollow noopener\">published the name and address of a person whose car hit a dog<\/a>, with a call to \u201cgive her hell.\u201d According to the car\u2019s owner, <a href=\"https:\/\/www.straitstimes.com\/singapore\/courts-crime\/animal-welfare-advocate-fined-after-wrongly-accusing-woman-of-knocking-into\" target=\"_blank\" rel=\"nofollow noopener\">the public accusations harmed her career<\/a>: After vigilantes figured out where she worked, hate posts hit the company\u2019s Facebook page. As it happens, another person was driving the car at the time of the accident.<\/p>\n<p>A more famous iteration of the story involves former baseball pro Curt Schilling, who saw tweets about his daughter he considered inappropriate and offensive. Schilling tracked down their authors (which he said took less than an hour), collected a sizable dossier on each, and <a href=\"https:\/\/www.nydailynews.com\/sports\/baseball\/ex-boston-pitcher-schilling-plays-hard-ball-trolls-article-1.2134914\" target=\"_blank\" rel=\"nofollow noopener\">posted<\/a> some of the information on his blog. The offenders who were connected with the baseball community were fired or removed from their athletic teams within a day.<\/p>\n<h2>What happened?<\/h2>\n<p>All three stories provide simple examples of <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/doxxing\/\" target=\"_blank\" rel=\"noopener\">doxing<\/a>. The word describes the collection and online publication of identifying data without the owner\u2019s consent. Apart from being unpleasant, it can also be damaging in real life, to the victim\u2019s reputation, employment, and even physical safety.<\/p>\n<p>Doxers\u2019 motives vary. Some believe they\u2019re exposing criminals; some are trying to intimidate their online opponents; still others are in it to avenge personal slights. Doxing as a phenomenon emerged in the 1990s, but it has since become much more dangerous \u2014 and with the volume of private information now available to all, doxing really requires no special skills or privileges.<\/p>\n<p>We\u2019re not here to analyze the legality or ethics of doxing. As security experts, our task is to outline doxers\u2019 methods and suggest ways to protect yourself.<\/p>\n<h2>Doxing: A look from the inside<\/h2>\n<p>Because it requires neither special knowledge, nor many resources, doxing has become very common. The tools doxers use tend to be legitimate and public, too.<\/p>\n<h3>Search engines<\/h3>\n<p>Ordinary search engines can provide a lot of personal information, and using their advanced search functions (for example, searching among specific websites or file types) can help doxers find the right information faster.<\/p>\n<p>In addition to first and last name, a nickname can also betray a person\u2019s online habits. For example, the common practice of using the same nickname on several websites makes things easier for online detectives, who can use it to aggregate comments and posts from any number of public resources.<\/p>\n<h3>Social networks<\/h3>\n<p>Social networks, including specialized ones such as LinkedIn, contain a wealth of personal data.<\/p>\n<p>A public profile with real data is basically a ready-made dossier. Even if a profile is private and open to friends alone, a dedicated investigator can collect bits of info by scanning a victim\u2019s comments, communities, friends\u2019 posts, and so forth. Add a friend request, perhaps from someone posing as a job recruiter, and you arrive at the next level, social engineering.<\/p>\n<h3>Social engineering<\/h3>\n<p>A hallmark of many attacks, social engineering takes advantage of human nature to help doxers gain information. Using publicly available information about a mark as a starting point a doxer can contact the victim and persuade them to give up their own information. For example, a doxer might appear in the guise of a medical admin or bank rep to try to wheedle information out of a victim \u2014 a ploy that works a lot better with a few bits of truth sprinkled in.<\/p>\n<h3>Official sources<\/h3>\n<p>People in the public sphere tend to have the hardest time maintaining network anonymity, but that doesn\u2019t mean rock stars and pro athletes are the only ones who need to safeguard their personal information.<\/p>\n<p>A doxer may even use an employer to betray a potential doxing victim\u2019s confidence, such as with a full name and photo on a corporate About Us page or full contact info on a departmental site. Sounds innocent, but general company info gets you close to the person geographically, and the photo may lead to their social network profile.<\/p>\n<p>Business activities, too, typically leave traces on the Internet; and, for example, quite a bit of information about company founders is publicly available in many countries.<\/p>\n<h3>Black market<\/h3>\n<p>More sophisticated methods include use of nonpublic sources, such as compromised databases belonging to government entities and businesses.<\/p>\n<p>As our studies have shown, <a href=\"https:\/\/securelist.com\/dox-steal-reveal\/99577\/\" target=\"_blank\" rel=\"nofollow noopener\">darknet outlets sell all sorts of personal data<\/a>, from passport scans ($6 and up) to banking app accounts ($50 or more).<\/p>\n<h3>Professional data collectors<\/h3>\n<p>Doxers outsource some of their work to <em>data brokers<\/em>, companies that sell personal data collected from various sources. Data brokerage is not a custom criminal enterprise; banks use data from brokers, as do advertising and recruitment agencies. Unfortunately, however, not all data brokers care who buys the data.<\/p>\n<h2>What to do if your data has leaked<\/h2>\n<p>In an interview with <em>Wired<\/em>, Eva Galperin, the Electronic Frontier Foundation\u2019s director of cybersecurity, <a href=\"https:\/\/www.wired.com\/story\/what-do-to-if-you-are-being-doxed\/\" target=\"_blank\" rel=\"nofollow noopener\">suggests<\/a> that if you learn that your personal information has been misused, you should contact any social networks where doxers published your data. Start with customer service or tech support. Disclosure of private information without the owner\u2019s consent normally constitutes a breach of user agreement. Although doing this will not solve the problem completely, it should reduce potential damage.<\/p>\n<p>Galperin also recommends blocking your social network accounts or finding someone to manage your accounts for some time after an attack. Like other available post-breach measures, it can\u2019t undo the damage, but it might just save your nerves and perhaps help you avoid some difficult situations online.<\/p>\n<h2>Protecting yourself from doxing<\/h2>\n<p>You are certainly better off reducing the probability of a data leak than dealing with its consequences. Immunity doesn\u2019t come easy, though. For example, you can hardly influence data dumps or leaks from governmental or social network databases. You can, however, make doxers\u2019 jobs harder.<\/p>\n<h3>Do not reveal secrets on the Internet<\/h3>\n<p>Keep your personal data off the Internet \u2014 especially your address, phone number, and photos \u2014 to the extent possible. Make sure any photos you post <a href=\"https:\/\/www.kaspersky.com\/blog\/exif-privacy\/13356\/\" target=\"_blank\" rel=\"noopener nofollow\">contain no geotags<\/a>, and likewise that documents <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-leak-info-from-docs\/37362\/\" target=\"_blank\" rel=\"noopener nofollow\">hold no private information<\/a>.<\/p>\n<h3>Check your social network account settings<\/h3>\n<p>We recommend choosing strict privacy settings on the social networks and services you use, leaving profiles open to friends only, and monitoring your list of friends regularly. You can use the step-by-step instructions on our <a href=\"https:\/\/privacy.kaspersky.com\/en\/\" target=\"_blank\" rel=\"noopener\">Privacy Checker<\/a> portal to set up social networks and other services.<\/p>\n<h3>Protect your accounts against hackers<\/h3>\n<p>Using a different password for every account may be a hassle (although <a href=\"https:\/\/www.kaspersky.com\/blog\/new-password-manager\/14053\/\" target=\"_blank\" rel=\"noopener nofollow\">it doesn\u2019t have to be<\/a>), but it\u2019s an important safeguard. If you use the same password everywhere, and one of your services <a href=\"https:\/\/www.kaspersky.com\/blog\/never-reuse-passwords-story\/24808\/\" target=\"_blank\" rel=\"noopener nofollow\">leaks it<\/a>, then even the strictest privacy settings won\u2019t help you.<\/p>\n<p>We recommend using a password manager. Our solution, <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>, saves not just passwords, but also the websites and services they access, leaving only one master key for you to remember. We also recommend using two-factor authentication wherever you can, to further strengthen your defense.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n<h3>Play it smart with third-party accounts<\/h3>\n<p>If possible, avoid signing up for websites using social network or other accounts containing your real data. Associating one account with another makes your online activities easier to follow, for example, by linking your comments with your own name.<\/p>\n<p>To solve the problem, keep at least two e-mail accounts, reserving one for your real-name accounts and the other for websites where you prefer to stay anonymous. Use different nicknames for different resources as well, to make collecting info about your Internet presence harder.<\/p>\n<h3>Try building a dossier on yourself<\/h3>\n<p>One way to learn about the state of your privacy is to play the role of a doxer and search the Internet for information about yourself. That way, you can learn about any issues your social network accounts have and find out which bits of your personal data are roaming the Internet. What you find can help you track down the source of such data and possibly even learn how to have it deleted. To keep an eye out passively, you can <a href=\"https:\/\/www.google.com\/alerts\" target=\"_blank\" rel=\"nofollow noopener\">set up Google<\/a> to notify you about any new search results on queries containing your name.<\/p>\n<h3>Delete info about yourself<\/h3>\n<p>You can report any content infringing on your privacy and ask search engines and social networks to delete your data (for example, here are instructions for <a href=\"https:\/\/support.google.com\/websearch\/troubleshooter\/9685456?hl=en\" target=\"_blank\" rel=\"nofollow noopener\">Google<\/a>, <a href=\"https:\/\/www.facebook.com\/help\/contact\/144059062408922\" target=\"_blank\" rel=\"nofollow noopener\">Facebook<\/a>, and <a href=\"https:\/\/help.twitter.com\/en\/rules-and-policies\/twitter-report-violation\" target=\"_blank\" rel=\"nofollow noopener\">Twitter<\/a>).<\/p>\n<p>Social networks and other services typically disallow unauthorized publication of personal data through their use policy, but in reality, only law enforcement authorities can get a handle on certain dubious resources.<\/p>\n<p>Legal data brokers normally allow individuals to delete their personal info, but based on the sheer number of such companies, removing everything won\u2019t be easy. At the same time, however, there are agencies and services that can help erase digital tracks. You\u2019ll have to find the balance of ease, thoroughness, and cost that works for you.<\/p>\n<h2>Quick tips<\/h2>\n<p>One can get targeted by doxing at any time, with or without apparent cause. These tips will help you preserve your online privacy:<\/p>\n<ul>\n<li>Keep your personal data \u2014 real name, address, place of work, and so forth \u2014 off the Internet;<\/li>\n<li>Close your social network accounts to outsiders and use robust, unique passwords and two-factor authentication. To manage your passwords, install <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>;<\/li>\n<li>Avoid using account in one service to sign in to another \u2014 particularly if one of those accounts contains your real data;<\/li>\n<li>Be proactive: Try building a dossier on yourself and request data deletion from any services that know too much about you;<\/li>\n<li>Consider deleting accounts altogether. It\u2019s a radical (if defeatist) method to thwart doxing, and we can <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/delete\/\" target=\"_blank\" rel=\"noopener nofollow\">help you do it right while preserving important data<\/a>.<\/li>\n<\/ul>\n<p>Doxing represents just one incursion of online data ubiquity into real life, but it\u2019s a big one that has the potential to ruin lives. We post regular news and practical information about <a href=\"https:\/\/education.kaspersky.com\/en\/lesson\/53\/page\/291\" target=\"_blank\" rel=\"noopener nofollow\">doxing<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/anti-doxing-checklist\/\" target=\"_blank\" rel=\"noopener nofollow\">how to stay safe<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-privacy\">\n","protected":false},"excerpt":{"rendered":"<p>Nowadays, building a dossier on any Internet user is easier than you might think. Learn about doxers and their methods.<\/p>\n","protected":false},"author":2581,"featured_media":18282,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1225],"tags":[231,191,2422,43,98],"class_list":{"0":"post-18281","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"tag-cyberbullying","9":"tag-data","10":"tag-doxing","11":"tag-privacy","12":"tag-social-networks"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/doxing-methods\/18281\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/doxing-methods\/22798\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/doxing-methods\/9803\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/doxing-methods\/24685\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/doxing-methods\/22676\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/doxing-methods\/21803\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/doxing-methods\/25172\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/doxing-methods\/24553\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/doxing-methods\/30598\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/doxing-methods\/9591\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/doxing-methods\/39651\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/doxing-methods\/16867\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/doxing-methods\/17420\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/doxing-methods\/26669\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/doxing-methods\/26989\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/doxing-methods\/23836\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/doxing-methods\/29174\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/doxing-methods\/28971\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/privacy\/","name":"privacy"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18281","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=18281"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18281\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/18282"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=18281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=18281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=18281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}