Understanding Doxxing: Prevention Techniques & Strategies - Insights by MalwareFox

Understanding Doxxing: Prevention Techniques & Strategies - Insights by MalwareFox

Jason Lv8

Understanding Doxxing: Prevention Techniques & Strategies - Insights by MalwareFox

The doxxing comes from ‘dropping docs’ which is used to take revenge by dropping malicious documents. If you are like most internet users, who are unaware of doxxing, then continue reading.

TotalAv Logo

Stay malware-free with reliable antivirus

Don’t compromise your Data and Privacy. TotalAV is a top-notch antivirus program that handles various viruses, trojans, and other malware that may target your devices. It will safeguard your devices and enhance your system performance.

4.9/5

Editor’s Choice

✔️ Excellent Malware Detection
✔️ Multiple set of Features
✔️ 30 Day Money-Back

Get TotalAV >

Protect your identity and remove Spyware from your Device

DOWNLOAD

Disclaimer: This post includes affiliate links

If you click on a link and make a purchase, I may receive a commission at no extra cost to you.

What is Doxxing?

Doxxing - What is it?

Doxxing is a type of cyber attack that involves searching and posting personal and identifiable information about an individual. The attacker discovers the personal information and identity of a person and makes it public. Usually, the intent behind making private information public is malicious, but it is also used to aid law enforcement, risk analysis, business analysis, and vigilante justice.

Usually the attacker research and analyzes the information you posted online and reveals your identity. The doxxer checks your social media posts on Facebook , Twitter, Instagram, MySpace, etc. You might think that you haven’t published your identity online, but the attackers could guess and relate several posts to know your location and name. They can guess it from social check-ins, posts, and comments.

People post too much personal information online. They don’t think that someone could use that information against them. That’s the reason the doxxer gets the chance to harass them.

Why People Dox?

There are various reasons that someone could dox. Most of the time they want to harass other people. Doxxer targets famous people on the internet; politicians, celebrities, journalists, social media influencers, and YouTube celebrities are the prime targets. The attacker could reveal their identity, mobile number, partner’s name, and personal pictures in public. They do this to get attention and make their group popular.

Sometimes, if you come in the way of someone, they could dox you to take revenge. Also, attackers dox to reveal the scam which is categorized as vigilante justice.

https://techidaily.com

Are you at Risk?

Are you at Risk of Doxxing

https://techidaily.com

A typical internet user is not at risk of doxxing unless they give someone a chance. You are safe from doxxing unless you put your nose in someone else work. The most common motive for doxxing is revenge. The other reasons are protest, control, or malicious intent. So if you don’t give motivation to the attackers, you are not at risk.

Often the doxxer looks for new targets as it becomes their way of entertainment. So, you should always minimize the information you share on the internet.

https://techidaily.com

Doxxing Cases

Below are some famous cases of doxxing.

https://techidaily.com

Unmasking Reddit’s Troll

A Reddit account Violentacrez used to troll people by posting sexualized and offending images. He used to post pictures of underage girls on the platform. A journalist Adrian Chen from Gawker linked the Violentacrez account with Michael Brutsch . He revealed the identity of the user behind the troll account. Due to this, Michael lost his job and faced public shaming.

Jessi Slaughter

Jessi Slaughter, a teenage girl, paid a huge price to post a series of YouTube videos against the 4Chan website. Her personal details were posted online alleging that she had sex with a member of a band. She started getting attacked online and physically through phone calls, email, and chat apps.

Her father tried to save her and posted a video threatening the attackers. A year after this incident, her father died due to a stress-induced heart attack. After that, the girl was taken to a mental institution.

Doxxing and Swatting

Swatting is making a prank call to the police officials about a severe incident mentioning the address of another person which is obtained using doxxing. In 2017, doxxing and swatting leads Andrew Finch to death . Two Call of Duty gamers argued and put a bet of $1.50 to do swatting. A user provided the address of Finch’s home.

Tyler Barris called the police and gave Finch’s address saying there have been a murder and a hostage situation. The Police later shot Finch when he comes out of the house.

Is it Illegal?

Not particularly, Doxxing is not illegal. It is merely collecting the information that is already available in public. So no one can put you behind the prison if you post the data which is available to the public. But, how you use the information comes under the laws.

If you use the information to stalk, harass, identity theft, and financial gain then it is illegal. You can face severe charges in such situations. Where simply doxxing is not unlawful, but it is morally unethical. We should respect the privacy of other people.

https://techidaily.com

How to Avoid It?

How to Avoid Doxxing

The first rule is to not engage with people especially a doxxer to avoid getting doxxed. You shouldn’t give people a chance, so they have the motive to dox you. The other way to stay away from doxxing is to minimize the information you share publicly. Follow the below exercises to do that.

Follow Strict Social Media Privacy

We often share too much on social media. We should limit the information that we share on these platforms. Almost, all social media platforms have privacy settings. You should use them to restrict access to your sensitive information from prying eyes. Always add people to your social media accounts, if you know them personally.

How to Remove Facebook from your Life

Use VPN to Access Internet

Your IP Address could reveal a lot about you. It could tell the identity and location. So, it is better to mask your IP address using a VPN. It hides your real IP Address and location when you access shady services online.

Use Separate Username and Password

Do not use the same username on all your online accounts. So that people cannot know your identity relating to different platforms’ accounts. Also, use strong and different passwords for your accounts and use multi-factor authorization to prevent any unauthorized access.

How to Set Strong but Memorable Passwords?

https://techidaily.com

Protect your Information from WhoIs

Protect Whois Data

When you register on a website your information like name, phone number, and address is made to the public on the WhoIs database. So anyone can access this information. Use fake details to register a website, or use privacy protection services on domain registration websites.

Why You Shouldn’t Buy Identity Theft Protection?

Avoid Sharing Files with Meta Data

How to Avoid Doxxing - Protect Metadata

The documents you share online contain metadata. The word document contains the author name, company name, and total editing time. The images reveal too much like the camera, resolution, owner, time it was taken, and even the location if your GPS was on. Even PDF files contain metadata that can reveal the identity of the author. So stay cautious while sharing documents online.

How to Remove Google from your Life

Leave a Comment Cancel reply

Comment

Name Email

Save my name, email, and website in this browser for the next time I comment.

Δ

Also read:

  • Title: Understanding Doxxing: Prevention Techniques & Strategies - Insights by MalwareFox
  • Author: Jason
  • Created at : 2024-10-07 17:23:56
  • Updated at : 2024-10-14 19:17:30
  • Link: https://win-special.techidaily.com/understanding-doxxing-prevention-techniques-and-strategies-insights-by-malwarefox/
  • License: This work is licensed under CC BY-NC-SA 4.0.