How Do I Avoid Getting Doxxed?

How Do I Avoid Getting Doxxed?

Doxxing (sometimes written as “doxing”) is an online threat to user privacy. It’s the process of broadcasting private or identifying information about someone on the internet with negative and malicious intent. Doxxing includes searching, collecting, documenting, and publishing the personal information of a particular person or organization.

Hacker communities have been using this method for the past two decades. This practice was previously used by hackers to identify another hacker and get him arrested for illegal and unethical practices. But today, doxxing has become a major threat to everyone who uses the internet. It’s no longer only a hacker who can doxx — anyone can doxx you.

Doxxing is meant to harass and embarrass victims. It’s meant to get revenge or cause the victim physical harm. Larger doxxing attacks often cause significant financial and professional losses. In many cases, those who are doxxed are forced to change their identities and pay a large sum of money to remove unwanted personal information online.

Is Doxxing Legal?

If the information is publicly available and a hacker uses the information in a positive way, it’s legal. Otherwise, it’s unethical and illegal. If you are caught doxxing, you can be sent to jail under state criminal laws. Doxxing is rarely in the public interest and is used with malicious intent to intimidate, interrogate, blackmail, and control.

How to Avoid Getting Doxxed

The risk of being doxxed grows with the increasing amount of identifiable information one shares on the internet. While the threat of doxxing may be daunting, it’s important to understand the actions one can take to prevent doxxing. Here are the five most important actions to take in order to prevent doxxing:

1. Social Privacy Settings

Social media plays a vital role in our daily lives. Millions of people spend their time, and often communicate with strangers, on multiple social media platforms and groups. These strangers could be a group of hackers with malicious doxxing intentions. If you don’t know someone, it’s better not to engage with them. You should never share any personal information such as your photos, phone numbers, email, home address, etc. In addition, be wary of fake phishing sites. These pages are used to get email addresses by tempting people with free giveaways that don’t actually exist.

Keep your profiles private and remove any addresses, places of work, and specific locations from your accounts. Set your posts to “friends only,” and avoid discussing personal information that could be used against you.

2. Protect Internet Communications

Anything done on the internet can be easily traced by hackers, and daily conversations like messages and emails can be monitored. Hackers can also read your encrypted data through your internet connection. Each connection you make on the internet has your internet address on it. Moreover, they can trace your location with your IP address.

Investing in encryption tools will make your online communications private and keep you anonymous on the internet. In a recent interview with Nat Maples, GM of eCommerce and New Products at BullGuard VPN, he shared how BullGuard VPN is a way to guard against doxxing.

BullGuard VPN firmly shuts down this doxxing avenue by hiding your IP address and applying military grade encryption to all your internet browsing and messaging. Even if someone finds a way to access your encrypted communications, it would take them years and hundreds of millions of dollars to crack the encryption”.

3. Protect your Computer

Keep your system up to date and secure. Use an internet security or antivirus program to stay safe from malware, ransomware, and other threats. Make sure your security software checks for updates and installs them automatically. Furthermore, scan your system regularly, as this will alert you of any suspicious or malicious activity.

4. Use Secure Passwords

Always use complex passwords, as they are more difficult to hack. Your password should be at least 12 characters with a mixture of upper and lower case letters, numbers, and other special keyboard characters. It’s highly recommended to use a password manager to create secure, strong passwords for each account.

5. Vary Usernames and Passwords

Try to set unique usernames for each website you are signed up with. If you are signed up for a controversial website or forum, make sure your username is anonymous and cannot be traced back to you. For social media, avoid using your first and last name in your username, as this is a dead giveaway if someone is trying to locate and track you.

Posted by Susan Alexandra on Jun 21, 2019


Featured

  • It's Show Time

    I am one of those people that likes to see things get bigger and better. As advertised, ISC West is going to be bigger (more exhibitors) and better (more attendees). It’s show time in Las Vegas. Read Now

    • Industry Events
    • ISC West
  • SIA Releases New Report on Operational Security Technology

    The Security Industry Association (SIA) has released an impactful new resource – Operational Security Technology: Principles, Challenges and Achieving Mission-Critical Outcomes Leveraging OST. Read Now

  • Cyber Overconfidence Is Leaving Your Organization Vulnerable

    The increased sophistication of cyber threats pumped by the relentless use of AI and machine learning brings forth record-breaking statistics. Cyberattacks grew 44% YoY in 2024, with a weekly average of 1,673 cyberattacks per organization. While organizations up their security game to help thwart these attacks, a critical question remains: Can employees identify a threat when they come across one? A Confidence Gap survey reveals that 86% of employees feel confident in their ability to identify phishing attempts. But things are not as rosy as they appear; the more significant part of the report finds this confidence misplaced. Read Now

  • Mission 500 Debuts Refreshed Identity Ahead of Security 5K/2K at ISC West

    Mission 500, the security industry’s nonprofit charity dedicated to supporting children in need across the US, Canada, and Puerto Rico, has unveiled a refreshed brand identity ahead of ISC West. The charity’s new look includes a modernized logo with refined messaging to reinforce Mission 500’s nearly decade-long commitment to serving the needs of children and families in crisis. Read Now

    • Industry Events

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.