Skip to main content

What Is Doxing & How Does It Affect Your Privacy? [MakeUseOf Explains]

Internet privacy is a huge deal. One of the stated perks of the Internet is that you can remain anonymous behind your monitor as you browse, chat, and do whatever it is that you do. However, did you know that your real life identity can be compromised based on your Internet persona? It’s called “doxing” and it’ll sneak up on you without your knowledge.
So, what is Doxing? Doxing can affect anyone. Nobody is outside the possibility of being doxed. How much of your real life information is on the Internet? Even the smallest slice of personal data can come back to bite you in the rear. Real name, phone number, email address – anything.
Sound like fearmongering? In one sense, it is. You’ve probably never heard of someone who’s been doxed. But that doesn’t mean you’re immune. Let’s take a closer look at what doxing is, exactly, and then I’ll show you what you can do about it.

Doxing 101

                                                                                                                                                                                                                          Doxing is a term that describes the process of obtaining or deducing information about a person based on a limited set of initial information. Or in layman’s terms, doxing is the act of searching around on the Internet for someone’s personal details. Another way to view doxing is to see it as taking a piece of information (e.g., email address) and identifying someone based on that.
The term “doxing” derives from “document tracing” which means to gather documents on a particular person or company to learn more about them. In the age of the Internet, doxing is more like social engineering – gathering information on someone using publicly available sources.

How Doxing Affects You



















             Whether you know it or not, you’ve probably doxed someone at some point in your life. Remember that party a few years back and you met that really interesting person but you only caught their first name and their profession? Later that night, you went home, hopped on Google, and did a bit of searching to find out who they were.
Okay, maybe it didn’t go exactly like that, but you know what I mean. Most of you have searched for people’s identities using publicly available information, like search results and Facebook profiles. And even if you did dox someone, your intentions were likely innocent.
But if you were able to dox someone else, imagine how many people could be doxing you. Not everyone performs a dox with good intentions in mind.
Recently, Reddit experienced some controversy surrounding a moderator who was doxed. This user was purported to be extremely careful with his usernames and his Internet identity, yet even then someone was able to identify him for who he was. How careful are you with your information?
Consider your Facebook profile. It contains a lot of information on you: your name, birthday, location, friends and family relations, work history, photo albums, schooling information, religious and political affiliations, and more.
And even if your Facebook privacy settings are maxxed out, you’re not as secure as you think. Even if someone got hold of just one thing about you, they could identify you through the 

Protecting Yourself Against Doxing

So what can you do to best protect yourself against doxing attempts? First, here are some of the most commonly targeted pieces of information that can be freely gleaned from the Internet and used to identify you:
  • Full name
  • Gender, birthday, and age
  • Location
  • Email addresses
  • IP addresses
  • Usernames
  • Social networking profiles
  • Websites and blogs
Whenever possible, keep these information bits private and hidden. Sometimes you can’t, but whenever possible, do it. As for specific steps that you can take, here are some of the more effective ones:

Make All Internet Profiles Private

This means that you need to go on Google, Bing, Yahoo!, and whatever else search engine and type in your usernames, your full name, your email addresses, etc. Pretend as if you were doxing yourself. Find all the instances of your data online, then go and make those profiles private! If you can, delete them.

Maximize Social Network Privacy Settings

Tina once compiled a list of 5 must-know critical Facebook privacy tips. Live by those tips. Set as much as you can to private. If there are social networking sites you no longer use, delete or disable those profiles. Organize your information and don’t post any sensitive information in your profile fields. ROUNDUP: 5 Must-Know Critical Facebook Privacy TipsMakeUseOf has published countless articles on Facebook privacy and security settings. Facebook continuously updates and changes privacy settings and options. For this post I have revisited previous stories to MakeUseOf has published countless articles on Facebook privacy and security settings. Facebook continuously updates and changes privacy settings and options. For this post I have revisited previous stories to collect the best tips and update instructions to reflect current options. If you have lost track, this is your chance to catch up and bring your Facebook privacy settings up to speed.

Comments

Popular posts from this blog

Top 20 Tools for hacking 2018

What are Hacking Tools? Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in computer systems, web applications, servers and networks. There is a variety of such tools available on the market. Some of them are open source while others are commercial solution. In this list we highlight the top 20 tools for Ethical Hacking of web applications, servers and networks 1)  Netsparker Netsparker  is an easy to use web application security scanner that can automatically find SQL Injection, XSS and other vulnerabilities in your web applications and web services. It is available as on-premises and SAAS solution. Features Dead accurate vulnerability detection with the unique Proof-Based Scanning Technology. Minimal configuration required. Scanner automatically detects URL rewrite rules, custom 404 error pages. REST API for seamless integration with the SDLC, bug tracking systems etc. Fully scalable solution.

EMBEDDED BACKDOOR WITH IMAGE USING FAKE IMAGE EXPLOITER

In this article we are introducing a newly launched hacking tool “ Fake Image Exploiter ”. It is design so that it becomes easier for attackers to perform phishing or social engineering attacks by generating a fake image with hidden malicious .bat/.exe file inside it. Let’s start! Open the terminal inside your kali Linux and type following command to download it from github. Git clone https://github.com/r00t-3xp10it/FakeImageExploiter.git Once it gets downloaded then opens the folder and selects the file “ settings ” for configuration before running the program as shown the given screenshot. Now made some changes inside setting file as shown the screenshot: Here you have to declare the type of payload extension you will use to hide it inside the image. You can set any exetension among these four : ps1, bat, txt, exe.  I had set  PAYLOAD_EXETNSION=bat  similarly set  BYPASS_RH=NO   and scroll down for next configration. In same way set these two values also as show

Wifi Post Exploitation on Remote PC

Hello readers! Today you will be learning about different ways to get basic service sets information of remote user’s Wi-Fi as well as current network connection information, and how to extract saved Wireless LAN profiles of remote pc after that you will be disconnecting target user’s Wi-Fi too. First Hack the Victim PC Using Metasploit ( tutorial how to hack remote pc ) after that get admin access through Bypassuac ( click here ), once you have victim’s meterpreter session run given below post exploit  one-by-one.  Get BSS information of a remote user’s Wi-Fi connection This module gathers information about the wireless Basic Service Sets available to the victim machine. e.g. this will give you SSID and other important  information regarding wireless connection. msf > use post/windows/wlan/wlan_bss_list msf post( wlan_bss_list ) > set session 5 msf post( wlan_bss_list ) > exploit From given below image you can observe that here it has found “5 networks” suc