{"id":790,"date":"2020-03-26T12:30:00","date_gmt":"2020-03-26T12:30:00","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=790"},"modified":"2025-04-28T12:22:42","modified_gmt":"2025-04-28T12:22:42","slug":"what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\/","title":{"rendered":"What Is Doxxing? 5 Examples of Doxxing and How to Prevent It"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Doxxing is a cyber threat without boundaries \u2014 anyone can be a victim of doxxing regardless of their age, race, nationality, gender, or religion&nbsp; <\/h2>\n\n\n\n<p>The internet is a double-edged sword: It\u2019s a great place for people to interact and share information on a global scale, but it\u2019s also used to troll, offend, and bully others.  You might have heard of high-profile celebrities getting doxxed. So, what is doxxing and what does such an act entail? Can it happen to you too? And, most importantly, how can you prevent it? <\/p>\n\n\n\n<p>In this article, we\u2019ll answer all these burning questions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is Doxxing and Why Should I Care? <\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"640\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/03\/doxxing-example-1024x640.jpg\" alt=\"Graphic: Images of a woman online, example of researching a person for doxxing\" class=\"wp-image-792\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/03\/doxxing-example-1024x640.jpg 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/03\/doxxing-example-300x188.jpg 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/03\/doxxing-example-560x350.jpg 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/03\/doxxing-example-1536x960.jpg 1536w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/03\/doxxing-example-2048x1280.jpg 2048w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/03\/doxxing-example-940x588.jpg 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/03\/doxxing-example-480x300.jpg 480w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>Doxxing, which stands for \u201cdocs\u201d (sometimes spelled \u201cdoxing&#8221;), is a type of cybercrime that involves a person&#8217;s information being released online <strong>without their consent<\/strong>.<\/p>\n\n\n\n<p>Unlike other cybercrimes, which are committed to get financial gains, <a aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" href=\"https:\/\/www.komando.com\/privacy\/people-use-doxing-to-get-revenge-online-protect-yourself\/560317\/\" target=\"_blank\">doxxing is typically committed<\/a> for the purpose of <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>victim shaming, <\/li><li>personal revenge, <\/li><li>publicity, <\/li><li>demonstrating anger or disagreement with a particular community\/cause, or <\/li><li>for scaring or intimidating victims. <\/li><\/ul>\n\n\n\n<p>Sometimes people use doxing just for fun or to get sadistic pleasure from harming others! <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Does it Mean to Get Doxxed?<\/h2>\n\n\n\n<p>As we mentioned earlier, in doxxing, someone leaks your sensitive information online without your knowledge or consent for taking personal revenge on you, harassing, or proving their point. <\/p>\n\n\n\n<p>First of all, the doxer (the person that deploys doxxing, also spelled as &#8220;doxxer&#8221;) gathers your information by<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>pulling data from a <strong>leaky database<\/strong>,<\/li><li>executing sophisticated phishing and spoofing attacks to<strong> manipulate you into sharing <\/strong>your information,<\/li><li><strong>hacking<\/strong> the system to gain unauthorized access to information\/media stored on your PC or mobile device,<\/li><li>stalking your and your friends\/relatives\u2019 social media profiles, or from physical stalking, online directories, and public databases, etc.<\/li><\/ul>\n\n\n\n<p>However, sometimes the doxxer doesn\u2019t need to hunt for your information online. In cases of personal revenge, the doxer might be someone you personally know, like a friend, colleague, neighbor, etc., who already knows your phone number, home address, email address, etc.<\/p>\n\n\n\n<p>Then, the doxxers decide which information they want to reveal, on which platform, and the method of revelation. They generally leak your personal information such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>social security number (SSN), <\/li><li>physical address, <\/li><li>payment card information, <\/li><li>phone number, <\/li><li>pictures, <\/li><li>mortgage details, <\/li><li>credit reports, etc. <\/li><\/ul>\n\n\n\n<p>Doxxing can <strong>permanently tarnish the victim\u2019s reputation, cause employment loss or embarrassment in front of friends and family members<\/strong>. <\/p>\n\n\n\n<p>The victims will be vulnerable to various <strong>cyber-attacks once their financial details or PII are available online<\/strong>, even after the platform used for doxing removes such information. <\/p>\n\n\n\n<p>As you\u2019ll read later, the consequences of doxing can not only be harmful to victims, but <strong>it can also be lethal<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">5 Examples of Doxxing<\/h2>\n\n\n\n<p>To further understand and answer your question about \u201cwhat doxxing?\u201d\nand the motives behind this type of cybercrime, let\u2019s explore some real-world\nexamples: <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Celebrity Doxxing <\/h3>\n\n\n\n<p>It\u2019s\nnot uncommon for journalists to find out a celebrity\u2019s personal life\ninformation and to publish such gossip on their media platforms. However, doxxing\nisn\u2019t your regular entertainment news. Here, the hacker publishes the\ncelebrity\u2019s sensitive information such as their payment card info, email\naddress, social security number or phone numbers.<\/p>\n\n\n\n<p>Celebrities\nlike Paris Hilton, Kim Kardashian, Joe Biden, Hillary Clinton, and President Donald\nTrump \u2014 as well as many others \u2014 have been victims of doxxing. &nbsp;<\/p>\n\n\n\n<p><strong>Example<\/strong>: In 2013, TMZ, <a href=\"https:\/\/www.tmz.com\/2013\/03\/11\/12-joe-biden-ashton-kutcher-jay-z-beyonce-hillary-clinton-celebs-hacked-credit-report-finances-exposed\/?adid=hero3\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">reported<\/a> that a group of Russian hackers doxed 12 high-profile celebrities and politicians by releasing their SSNs, mortgage amounts, credit card info, car loans, banking and other information on a website. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Faulty Doxxing<\/h3>\n\n\n\n<p>Sometimes, doxxing is done by\ninternet vigilantes who can\u2019t be bothered to properly research or investigate\ntheir victims to ensure they have the right person. Instead, they wrongly link\npeople to activities or situations that are unrelated to them. Due to such \u201cfaulty\u201d\ndoxing, hence the name, innocent people face: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>reputation loss, <\/li><li>employment loss, <\/li><li>harassment, <\/li><li>physical harm, or <\/li><li>loss of life. <\/li><\/ul>\n\n\n\n<p>Let&#8217;s better understand faulty\ndoxing with the following real-life examples.<\/p>\n\n\n\n<p><strong>Example 1<\/strong>:&nbsp; In August 2017, a march was held by neo-Nazi white nationalists on the campus of the University of Virginia. Someone on social media <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/twitter.com\/YoungWaxGod\/status\/896828977469431808?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E896828977469431808&amp;ref_url=https%3A%2F%2Fwww.nytimes.com%2F2017%2F08%2F14%2Fus%2Fcharlottesville-doxxing.html\" target=\"_blank\">incorrectly identified<\/a> one of the participants as Kyle Quinn, a professor running an engineering laboratory in Arkansas. Throughout the night, thousands of people shared his image \u2014 and even his address \u2014 on social media. They also sent him hate messages and demanded his resignation from his job at the university. Later, it was discovered that Quinn has nothing to do with the Virginia rally, and that he was just a victim of such <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.nytimes.com\/2017\/08\/14\/us\/charlottesville-doxxing.html\" target=\"_blank\">faulty doxxing<\/a>.<\/p>\n\n\n\n<p><strong>Example 2<\/strong>: In 2013, some vigilantes on <a href=\"https:\/\/www.reddit.com\/r\/inthenews\/comments\/1co5o1\/we_owe_sunil_tripathis_family_an_outpouring_of\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Reddit<\/a> misidentified an innocent student, Sunil Tripathi, as a <a href=\"https:\/\/www.nbcnews.com\/news\/asian-america\/wrongly-accused-boston-bombing-sunil-tripathys-story-now-being-told-n373141\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">suspect of the Boston Marathon bombing<\/a>. Tripathi went missing and, according to his <a href=\"https:\/\/www.facebook.com\/pg\/Help-Us-Find-Sunil-Tripathi-403275636436466\/about\/?ref=page_internal\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">family\u2019s social media page<\/a>, his body was found in the water near a park in Rhode Island. His cause of death was ruled a suicide, which was believed to be the result of public shaming caused by faulty doxxing. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Revenge Doxxing<\/h3>\n\n\n\n<p>Sometimes, people <a href=\"https:\/\/www.komando.com\/privacy\/people-use-doxing-to-get-revenge-online-protect-yourself\/560317\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">use doxing as a means of taking revenge<\/a>. They publish their enemy&#8217;s some publicly identifying information online to cause them shame.<\/p>\n\n\n\n<p><strong>Example: <\/strong>In March 2015, Curt Schilling, a former Major League Baseball player, took revenge against the people who posted sexually offensive comments about his daughter on Twitter. Schilling investigated the real faces behind the troll Twitter profiles and doxxed them by <a href=\"https:\/\/38pitches.wordpress.com\/2015\/03\/01\/the-world-we-live-in-man-has-it-changed\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">posting<\/a> their real identities online. As a result, <a href=\"https:\/\/nakedsecurity.sophos.com\/2015\/03\/05\/twitter-troll-fired-another-suspended-after-curt-schilling-names-and-shames-them\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">one bully got fired from his job<\/a>, and another was suspended from his community college. Other bullies, whose identities were not published, got scared from this doxing, and posted apologizing messages. In this case, Schilling used doxing for online vigilante justice.&nbsp;&nbsp; <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Swatting Doxxing<\/h3>\n\n\n\n<p>Another method of doxing is known as \u201c<a href=\"https:\/\/theconversation.com\/doxxing-swatting-and-the-new-trends-in-online-harassment-40234\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">swatting<\/a>.\u201d This occurs when a person wrongly accuses someone of a crime and sends police (or a SWAT team, hence \u201cswatting\u201d) to the victim&#8217;s address to cause them harassment. However, often such doxxing can prove fatal for the victim. <\/p>\n\n\n\n<p>Example: In December 2017, while playing an online video game, Tyler Barriss was involved in a conflict between two other gamers, Casey Viner and Shane Gaskill. According to <a href=\"https:\/\/www.nbcnews.com\/news\/us-news\/serial-swatter-tyler-barriss-sentenced-20-years-death-kansas-man-n978291\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">NBC News<\/a>, Viner asked Barriss to swat Gaskill, and Gaskill challenged him to do it, providing his previous home address \u2014 one that was now occupied by the family of a man named Andrew Finch. <\/p>\n\n\n\n<p>Barriss doxxed Gaskill by making a prank call to police. Pretending\nto be him, Barriss told the police he\u2019d killed his father and was holding the\nrest of his family hostage. Finch was killed by one of the responding police\nofficers after being called outside. Barriss has since been sentenced to 20\nyears in prison for the phony call.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Crime Doxxing <\/h3>\n\n\n\n<p>While the swatting is done for fun, there are some people that\nuse doxxing to execute serious crimes like murder. They reveal their enemies\u2019\npersonal information online and provoke others to harm them. The motive can be\npersonal revenge or showing disagreement or hatred towards any specific cause,\nreligion, activity or race.<\/p>\n\n\n\n<p><strong>Example:<\/strong> In the late 90s and early 2000s, anti-abortion activist Neal Horsley collected names, pictures, and home addresses of abortion providers and published them on a website called the <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/slate.com\/news-and-politics\/2015\/05\/neal-horsley-of-nuremberg-files-died-true-threats-case-reconsidered-by-supreme-court-in-elonis.html\" target=\"_blank\">Nuremberg Files<\/a>. He labeled that list as a &#8220;hit list.&#8221; Eight doctors from the Nuremberg&#8217;s listings have been killed so far. The website celebrated the death of such murders and encouraged pro-life activists to continue killing other doctors from the hit list. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Prevent Doxxing <\/h2>\n\n\n\n<p>As you can see, no one is immune to\na doxxing attack. Whether it&#8217;s an ordinary person like you and me or a big\ncelebrity, we\u2019re all at risk. This is why we have to take steps to protect\nourselves. <\/p>\n\n\n\n<p>Most of the time, attackers\nresearch on the internet to gain sensitive information about their victim. So,\nthe best way to prevent doxxing is to limit what you share online. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How to Prevent Doxxing: A User\u2019s Guide<\/h3>\n\n\n\n<p>Here are a few tips to help individuals protect their\npersonal information while using the internet:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Social media<\/strong>: Don\u2019t overshare details about yourself on social media and online forums like Reddit, Quora, etc. <\/li><li><strong>Microsoft Office<\/strong>: If you are sharing Microsoft word files, excel spreadsheets, PowerPoint slides, etc. online, <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/support.office.com\/en-us\/article\/remove-hidden-data-and-personal-information-by-inspecting-documents-presentations-or-workbooks-356b7b5d-77af-44fe-a07f-9aa4d085966f?ui=en-US&amp;rs=en-US&amp;ad=US\" target=\"_blank\">restrict<\/a> the files\u2019 metadata, which contains information such as author&#8217;s name, contributor&#8217;s name, date of starting the document, revisions, etc. &nbsp;<\/li><li><strong>Passwords:<\/strong> Don\u2019t use easily guessable passwords, which contain your names or date of birth of your pet, spouse, parents, partner, children, etc. Such details can be readily available online, and anyone can guess them. Once the doxxer gets into your email account or social media profile, your other PII, personal conversations, or even financial details are accessible to them. <\/li><li><strong>Registration:<\/strong> When you want to access a new app or website, don&#8217;t take the option of &#8220;Register using Gmail&#8221; or &#8220;Register using Facebook.&#8221; It will give app\/website access to your contact information, phone number, location, friends list, etc. <\/li><li><strong>Online directories<\/strong>: You might not be aware of it, but websites like <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"http:\/\/www.peoplefinder.com\/\" target=\"_blank\">peoplefinder.com<\/a><strong>, <\/strong><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"http:\/\/www.whitepages.com\/\" target=\"_blank\">whitepages.com<\/a>, etc. will be containing a lot of sensitive information about you. Anyone on the internet can access that information for free or just by paying a small fee. You can request such sites remove your information from their platform, and they are legally obliged to follow your request for privacy.<\/li><li><strong>Search engines<\/strong>: Frequently delete your activity history from google and other browsers. Also, remove your data from the <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.google.com\/maps\/timeline\" target=\"_blank\">Google Maps Timeline<\/a>.<\/li><li><strong>IP address<\/strong>: Use a virtual private network (VPN) to hide your IP address. Just by knowing an IP address, a person can find out a device\u2019s geographical location, internet provider\u2019s name, local time, and even the users\u2019 web browsing behaviors.<\/li><li><strong>WebRTC:<\/strong> If you use WebRTC, it\u2019s important to note that it does have a vulnerability that can reveal your true IP address. To mitigate this vulnerability, you can install an add-on or extension for your browser. Of course, the steps involved are different from one browser to the next. So, we\u2019ll cover how to install these components in the two leading browsers, Mozilla Firefox and Google Chrome:<\/li><\/ul>\n\n\n\n<p><strong>How to Install a WebRTC Extension or Add-on\nin Mozilla Firefox<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Type<strong>&nbsp;<\/strong><em><strong>about:addons<\/strong><\/em><strong>&nbsp;<\/strong>in the Firefox address\nbar.<\/li><li>Type<strong>&nbsp;<\/strong><em><strong>WebRTC<\/strong><\/em><strong>&nbsp;<\/strong>into the search bar at\nthe top and hit <strong>Enter<\/strong>.<\/li><li>A\nnew tab will pop up with a variety of results. Select one of the suitable\nadd-ons to bring up its individual page, then add it to your Firefox browser by\nclicking on <strong>+ Add to Firefox<\/strong>.<\/li><li>Enable\nthe add-on after it has successfully installed.<\/li><\/ol>\n\n\n\n<p><strong>How to Install\na WebRTC Extension or Add-on in Google Chrome<\/strong><strong><\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>In the Chrome browser, visit the&nbsp;<a aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" href=\"https:\/\/chrome.google.com\/webstore\/search\/webrtc?hl=en-US\" target=\"_blank\">Chrome Web Store<\/a><strong>.<\/strong><\/li><li>Search for <strong>WebRTC<\/strong>.<\/li><li>Choose the extension you wish to install on your browser. After that, simply press the&nbsp;<strong>Add to Chrome&nbsp;button <\/strong>and activate it.<\/li><\/ol>\n\n\n\n<p><strong>Use the internet with wisdom:<\/strong>  Don&#8217;t use the internet and anonymity as a means to bully, offend, or spread hate. You have all the right to hold your beliefs and opinions on different subjects. But if possible, don\u2019t indulge yourself in unnecessary arguments on sensitive topics such as religion, gender, politics, or race.<\/p>\n\n\n\n<p>When you post something controversial online, it can spread on the internet like a wildfire. You might think it&#8217;s just a tweet or &#8220;funny comment,&#8221; and just minutes later, you may see thousands of people getting offended by the same message. Such incidents motivate people to execute doxxing against you to take revenge or &#8220;win the argument.&#8221; &nbsp;Thus, <strong>one of the best ways to protect yourself from doxxing is not to provoke someone and to protect your information as much as possible. <\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How to Prevent Doxxing: Website Owner\u2019s Guide<\/h3>\n\n\n\n<p>Here are a few tips for individuals who own websites and want\nto protect their and their users\u2019 personal information:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Hide your WHOIS records<\/strong>: WHOIS records store the domain owner\u2019s PII which is publicly available to all. If you buy the \u201cdomain privacy\u201d service by paying a small fee, your domain provider will hide that information from WHOIS records. &nbsp;<\/li><li><strong>Use encryption.<\/strong> Always use <a href=\"https:\/\/sectigostore.com\/ssl-types\">SSL\/TLS certificates<\/a> and <a href=\"https:\/\/sectigostore.com\/id\/email-signing-certificate\">email signing certificates<\/a> to protect your organization from the eavesdropping and data breach incidents via your website or email accounts. If your users\u2019 or employees\u2019 financial information, PII or sensitive internal communications get leaked, they become vulnerable for doxxing attacks. <\/li><li><strong>Train your employees.<\/strong> Provide cyber awareness training to your employee so that they don&#8217;t fall for social engineering and phishing scams, etc.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Legal Protections Against Doxxing<\/h3>\n\n\n\n<p>Do you have the <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.robertreeveslaw.com\/blog\/doxing-arrested\/\" target=\"_blank\">right to protect yourself against doxxing<\/a>? Absolutely, depending on where you live! The <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.eugdpr.org\/\" target=\"_blank\">European Union&#8217;s General Data Protection Regulation<\/a> (GDPR) can help you limit what personal information companies have about you, and the U.S. federal laws against stalking (<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.govinfo.gov\/app\/details\/USCODE-2010-title18\/USCODE-2010-title18-partI-chap110A-sec2261A\" target=\"_blank\">18 U.S. Code \u00a7 2261A<\/a>) and protections against making restricted personal information public (<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.govinfo.gov\/app\/details\/USCODE-2011-title18\/USCODE-2011-title18-partI-chap7-sec119\" target=\"_blank\">18 U.S. Code \u00a7 119<\/a>) are useful in helping you fight back against doxxers. <\/p>\n\n\n\n<p>Each state has\nits own laws for citizens\u2019 security, in which doxxing might be categorized\nunder cyber stalking, harassment or threats. You can also file complaint for\nextortion if doxxer is threating you to leak your sensitive information if\nmoney is not paid. You can also file a civil suit against doxxer. &nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Still, it will take a lengthy legal battle, probably long enough to spread your information to a large population and cause the damage. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Vulnerability in Doxxing <\/h2>\n\n\n\n<p>Even though there are a handful of steps you can take to\nhide your private information online, you\u2019re still vulnerable to doxxing\nattacks through one major source: data breaches. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Data Breaches <\/h3>\n\n\n\n<p>Your information is stored on the third-party platforms like\ngovernment agencies, universities, health-care organizations, or ecommerce site\nwhere you engage in transactions. Unfortunately, not all of these platforms are\nserious about protecting your personal data.<\/p>\n\n\n\n<p>There are numerous examples, such as the <a href=\"https:\/\/www.capitalone.com\/facts2019\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Capital One breach<\/a>, <a href=\"https:\/\/rainbowtabl.es\/2019\/07\/31\/honda-motor-company-leak\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Honda breach<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/2019\/05\/first-american-financial-corp-leaked-hundreds-of-millions-of-title-insurance-records\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">First American Financial Corporation breach<\/a> and many other incidents where customers\u2019 sensitive information got leaked by organizations. Even the government organizations play carelessly while protecting their citizen&#8217;s information. Notable examples of such data breaches disclosed the personal information of<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>20 million <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.comparitech.com\/blog\/vpn-privacy\/russian-tax-records-exposed-online\/\" target=\"_blank\" rel=\"noreferrer noopener\">Russian citizens<\/a> <a href=\"https:\/\/www.comparitech.com\/blog\/vpn-privacy\/russian-tax-records-exposed-online\/\"><\/a><\/li><li>275 million <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/securitydiscovery.com\/database-with-millions-of-indian-personal-records-exposed-and-hijacked\/\" target=\"_blank\" rel=\"noreferrer noopener\">Indian citizens<\/a> <a href=\"https:\/\/securitydiscovery.com\/database-with-millions-of-indian-personal-records-exposed-and-hijacked\/\"><\/a><\/li><li>14 million <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.zdnet.com\/article\/voter-records-for-80-of-chiles-population-left-exposed-online\/\" target=\"_blank\" rel=\"noreferrer noopener\">Chilean citizens<\/a><\/li><li>20 million <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.nytimes.com\/2019\/09\/17\/world\/americas\/ecuador-data-leak.html\" target=\"_blank\" rel=\"noreferrer noopener\">Ecuador citizens<\/a> <\/li><\/ul>\n\n\n\n<p>So, at the end of the day, if a doxer is tech-savvy, they\ncan get your information from such data leaks or even by buying it on the dark\nweb. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Final Word<\/h2>\n\n\n\n<p>As we have learned that even though there are many things you can try to hide your personal information online, you\u2019re still vulnerable to doxxing. For doxxing, sometimes, prevention is better than cure. Not provoking someone online and stay away from controversial discussions might be the best doxxing prevention tip. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Doxxing is a cyber threat without boundaries \u2014 anyone can be a victim of doxxing regardless of their age, race, nationality, gender, or religion&nbsp; The internet is a double-edged sword:&#8230;<\/p>\n","protected":false},"author":6,"featured_media":791,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[40,50,51],"class_list":["post-790","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cyber-attacks","tag-doxxing","tag-identity","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is Doxxing? 5 Examples of Doxxing and How to Prevent It<\/title>\n<meta name=\"description\" content=\"What is doxxing (or &quot;doxing&quot;) and how do people get doxxed? Check out these 5 examples of doxxing methods and some tips to prevent it\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Doxxing? 5 Examples of Doxxing and How to Prevent It\" \/>\n<meta property=\"og:description\" content=\"What is doxxing (or &quot;doxing&quot;) and how do people get doxxed? Check out these 5 examples of doxxing methods and some tips to prevent it\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-26T12:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-28T12:22:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/03\/what-is-doxxing.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Medha Mehta\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Medha Mehta\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\\\/\"},\"author\":{\"name\":\"Medha Mehta\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\"},\"headline\":\"What Is Doxxing? 5 Examples of Doxxing and How to Prevent It\",\"datePublished\":\"2020-03-26T12:30:00+00:00\",\"dateModified\":\"2025-04-28T12:22:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\\\/\"},\"wordCount\":2483,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/what-is-doxxing.jpg\",\"keywords\":[\"cyber attacks\",\"doxxing\",\"identity\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\\\/\",\"name\":\"What Is Doxxing? 5 Examples of Doxxing and How to Prevent It\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/what-is-doxxing.jpg\",\"datePublished\":\"2020-03-26T12:30:00+00:00\",\"dateModified\":\"2025-04-28T12:22:42+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\"},\"description\":\"What is doxxing (or \\\"doxing\\\") and how do people get doxxed? Check out these 5 examples of doxxing methods and some tips to prevent it\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/what-is-doxxing.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/what-is-doxxing.jpg\",\"width\":1600,\"height\":1000,\"caption\":\"Graphic: What is doxxing? Photo of a man looking up info about another person online\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is Doxxing? 5 Examples of Doxxing and How to Prevent It\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\",\"name\":\"Medha Mehta\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"caption\":\"Medha Mehta\"},\"description\":\"Medha is a regular contributor to InfoSec Insights. She's a tech enthusiast and writes about technology, website security, cryptography, cyber security, and data protection.\",\"sameAs\":[\"https:\\\/\\\/sectigostore.com\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is Doxxing? 5 Examples of Doxxing and How to Prevent It","description":"What is doxxing (or \"doxing\") and how do people get doxxed? Check out these 5 examples of doxxing methods and some tips to prevent it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\/","og_locale":"en_US","og_type":"article","og_title":"What Is Doxxing? 5 Examples of Doxxing and How to Prevent It","og_description":"What is doxxing (or \"doxing\") and how do people get doxxed? Check out these 5 examples of doxxing methods and some tips to prevent it","og_url":"https:\/\/sectigostore.com\/blog\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\/","og_site_name":"InfoSec Insights","article_published_time":"2020-03-26T12:30:00+00:00","article_modified_time":"2025-04-28T12:22:42+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/03\/what-is-doxxing.jpg","type":"image\/jpeg"}],"author":"Medha Mehta","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Medha Mehta","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\/"},"author":{"name":"Medha Mehta","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15"},"headline":"What Is Doxxing? 5 Examples of Doxxing and How to Prevent It","datePublished":"2020-03-26T12:30:00+00:00","dateModified":"2025-04-28T12:22:42+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\/"},"wordCount":2483,"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/03\/what-is-doxxing.jpg","keywords":["cyber attacks","doxxing","identity"],"articleSection":["Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\/","url":"https:\/\/sectigostore.com\/blog\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\/","name":"What Is Doxxing? 5 Examples of Doxxing and How to Prevent It","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/03\/what-is-doxxing.jpg","datePublished":"2020-03-26T12:30:00+00:00","dateModified":"2025-04-28T12:22:42+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15"},"description":"What is doxxing (or \"doxing\") and how do people get doxxed? Check out these 5 examples of doxxing methods and some tips to prevent it","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/03\/what-is-doxxing.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/03\/what-is-doxxing.jpg","width":1600,"height":1000,"caption":"Graphic: What is doxxing? Photo of a man looking up info about another person online"},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Is Doxxing? 5 Examples of Doxxing and How to Prevent It"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15","name":"Medha Mehta","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","caption":"Medha Mehta"},"description":"Medha is a regular contributor to InfoSec Insights. She's a tech enthusiast and writes about technology, website security, cryptography, cyber security, and data protection.","sameAs":["https:\/\/sectigostore.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=790"}],"version-history":[{"count":10,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/790\/revisions"}],"predecessor-version":[{"id":2575,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/790\/revisions\/2575"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/791"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}