How Do I Avoid Getting Doxxed?

How Do I Avoid Getting Doxxed?

Doxxing (sometimes written as “doxing”) is an online threat to user privacy. It’s the process of broadcasting private or identifying information about someone on the internet with negative and malicious intent. Doxxing includes searching, collecting, documenting, and publishing the personal information of a particular person or organization.

Hacker communities have been using this method for the past two decades. This practice was previously used by hackers to identify another hacker and get him arrested for illegal and unethical practices. But today, doxxing has become a major threat to everyone who uses the internet. It’s no longer only a hacker who can doxx — anyone can doxx you.

Doxxing is meant to harass and embarrass victims. It’s meant to get revenge or cause the victim physical harm. Larger doxxing attacks often cause significant financial and professional losses. In many cases, those who are doxxed are forced to change their identities and pay a large sum of money to remove unwanted personal information online.

Is Doxxing Legal?

If the information is publicly available and a hacker uses the information in a positive way, it’s legal. Otherwise, it’s unethical and illegal. If you are caught doxxing, you can be sent to jail under state criminal laws. Doxxing is rarely in the public interest and is used with malicious intent to intimidate, interrogate, blackmail, and control.

How to Avoid Getting Doxxed

The risk of being doxxed grows with the increasing amount of identifiable information one shares on the internet. While the threat of doxxing may be daunting, it’s important to understand the actions one can take to prevent doxxing. Here are the five most important actions to take in order to prevent doxxing:

1. Social Privacy Settings

Social media plays a vital role in our daily lives. Millions of people spend their time, and often communicate with strangers, on multiple social media platforms and groups. These strangers could be a group of hackers with malicious doxxing intentions. If you don’t know someone, it’s better not to engage with them. You should never share any personal information such as your photos, phone numbers, email, home address, etc. In addition, be wary of fake phishing sites. These pages are used to get email addresses by tempting people with free giveaways that don’t actually exist.

Keep your profiles private and remove any addresses, places of work, and specific locations from your accounts. Set your posts to “friends only,” and avoid discussing personal information that could be used against you.

2. Protect Internet Communications

Anything done on the internet can be easily traced by hackers, and daily conversations like messages and emails can be monitored. Hackers can also read your encrypted data through your internet connection. Each connection you make on the internet has your internet address on it. Moreover, they can trace your location with your IP address.

Investing in encryption tools will make your online communications private and keep you anonymous on the internet. In a recent interview with Nat Maples, GM of eCommerce and New Products at BullGuard VPN, he shared how BullGuard VPN is a way to guard against doxxing.

BullGuard VPN firmly shuts down this doxxing avenue by hiding your IP address and applying military grade encryption to all your internet browsing and messaging. Even if someone finds a way to access your encrypted communications, it would take them years and hundreds of millions of dollars to crack the encryption”.

3. Protect your Computer

Keep your system up to date and secure. Use an internet security or antivirus program to stay safe from malware, ransomware, and other threats. Make sure your security software checks for updates and installs them automatically. Furthermore, scan your system regularly, as this will alert you of any suspicious or malicious activity.

4. Use Secure Passwords

Always use complex passwords, as they are more difficult to hack. Your password should be at least 12 characters with a mixture of upper and lower case letters, numbers, and other special keyboard characters. It’s highly recommended to use a password manager to create secure, strong passwords for each account.

5. Vary Usernames and Passwords

Try to set unique usernames for each website you are signed up with. If you are signed up for a controversial website or forum, make sure your username is anonymous and cannot be traced back to you. For social media, avoid using your first and last name in your username, as this is a dead giveaway if someone is trying to locate and track you.

Posted by Susan Alexandra on Jun 21, 2019


Featured

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.