{"id":46812,"date":"2023-01-16T05:24:38","date_gmt":"2023-01-16T10:24:38","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=46812"},"modified":"2023-01-16T05:24:38","modified_gmt":"2023-01-16T10:24:38","slug":"doxing-of-women","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/doxing-of-women\/46812\/","title":{"rendered":"Doxing \u2014 another online danger for women"},"content":{"rendered":"<p>Tech-abuse continues to be a growing problem for many people. Cyberbullying and online stalking remain a widespread issue among internet users \u2014 particularly women \u2014 and they\u2019re forced to think about it on a day-to-day basis.<\/p>\n<p>One issue women often face is <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/doxxing\/\" target=\"_blank\" rel=\"noopener\">doxing<\/a> \u2014 the collection and publication of personal information without the owner\u2019s consent. And like many other tech-abuse problems, it might even move over from the digital world to the physical one.<\/p>\n<p>To help fight this problem, Kaspersky recently partnered with the Singapore Council of Women\u2019s Organizations (SCWO) for a collaborative workshop. You can watch the recording of this workshop <a href=\"https:\/\/www.youtube.com\/watch?v=f0n8zqkvv3I\" target=\"_blank\" rel=\"nofollow noopener\">here<\/a>, or read the rest of this post to learn how to avoid becoming a victim of doxing.<\/p>\n<h2>What is doxing and how does it harm women?<\/h2>\n<p>Basically, the aim of the doxer is to build up a detailed dossier about a user and then post it online or threaten to do it. To do this, a person needs no professional tools. Pretty much anyone can gather personal information with just search engines. Doxers do this for a whole bunch of reasons: to intimidate, humiliate, extort money, punish \u2014 you name it.<\/p>\n<p>Consequences of such actions can vary a lot too \u2014 and can become quite brutal. Some women were even forced to move house. For example, recently a popular Twitch streamer, Wolfabelle, <a href=\"https:\/\/www.ginx.tv\/en\/twitch\/twitch-streamer-wolfabelle-doxed-blackmailed-sexual-favors\" target=\"_blank\" rel=\"nofollow noopener\">was blackmailed<\/a> for for sexual favors by an online doxer. The attacker identified where she lived and threatened to publish her address and other private information unless she submits to his sexual demands. The doxer even went so far as to prowl around her home and take pictures of it, which he then sent her.<\/p>\n<p>In other cases, doxing may harm not only the person whose information was collected. Sometimes doxers use a person\u2019s dossier for <a href=\"https:\/\/en.wikipedia.org\/wiki\/Catfishing\" target=\"_blank\" rel=\"nofollow noopener\">catfishing<\/a> \u2014 creation of a fake identity on social networking sites or dating apps. A victim of catfishing believes that they\u2019re communicating with a person whose personal information (primarily \u2014 photos) was used to create <a href=\"https:\/\/www.kaspersky.com\/blog\/stolen-face-story\/14592\/\" target=\"_blank\" rel=\"noopener nofollow\">a profile<\/a> on a social network. However, in most cases catfishers don\u2019t really fake the identity of a real person \u2014 they just upload someone else\u2019s portrait as an avatar.<\/p>\n<h2>Doxing is an inclusive malicious activity<\/h2>\n<p>Doxing doesn\u2019t discriminate \u2014 you don\u2019t have to be a popular streamer, a celebrity or even an activist to get doxed. Often users who end up being victims of tech-enabled abuse lead rather quiet lives, and may even have private accounts on social networking sites.<\/p>\n<p>Sometimes victims are folks who were misidentified and wrongly accused of something they didn\u2019t do. This <a href=\"https:\/\/www.abc.net.au\/news\/2021-03-26\/canberra-family-doxxed-sent-death-threats-after-social-video\/100014706\" target=\"_blank\" rel=\"nofollow noopener\">happened to Lucy from Canberra<\/a>, who was misidentified as a person in a video containing racist statements. Within hours, Lucy\u2019s personal data was spread online. After that, Lucy and her family received numerous death threats online and didn\u2019t feel safe for weeks.<\/p>\n<h2>Check it for yourself<\/h2>\n<p>You can test how easy it is to dox a person by trying to build a portfolio about yourself or your close ones (with their consent, of course) \u2014 and see how much you can find. To do this, google the person and explore what you can find using their nickname and\/or actual name on social media and other websites. You may be surprised by how much you discover.<\/p>\n<h2>What should I do to protect myself?<\/h2>\n<p>The best way to avoid doxing is to prepare for it. We\u2019ve compiled some simple pieces of advice that will help you to do that:<\/p>\n<h3>Make your profile private, and check who follows you<\/h3>\n<p>This way at the very least you\u2019ll be able to control who sees your posts. Just making your profile private isn\u2019t enough though. Consider who follows you \u2014 do you know all of them? Do you trust them? Remember, any one of them can take a screenshot of what you\u2019ve posted, and that screenshot will no longer be limited to your \u201cprivate\u201d space online.<\/p>\n<h3>Think for 30 seconds before you post or share<\/h3>\n<p>Nothing on the internet is temporary \u2014 a post you made on Instagram and later deleted could have been saved on some website that mirrors the social network. Edits to posts can also be tracked. And, of course, the audience of your post can save it too.<\/p>\n<p>So, before posting anything online or agreeing to share your information with any online platform, think twice \u2014 or even thrice if we are talking about especially sensitive data (more about that later). And remember, something you might deem useless (like which websites you visited) may be exploited by doxers and used to profile you.<\/p>\n<h3>Reconsider your understanding of personal data<\/h3>\n<p>Once you\u2019ve been doxed, the harm is hardly reversible (but we\u2019ll talk about the ways you can minimize the damage later). The first thing any user should do is reconsider their attitude toward personal data \u2014 and what is understood by the term.<\/p>\n<p>Personal data is any data that can identify you in a direct or indirect way. For instance, your photo and surname identify you directly, but your email address, phone number, and even the location of your workplace can also identify you.<\/p>\n<p>Some personal data might be more sensitive than others. For example, exposure of religious beliefs, ethnicity, or health data can cause serious problems under certain circumstances. That\u2019s why the decision on publishing this data anywhere requires extra thought.<\/p>\n<p>Of course, there are laws in place that are meant to protect your personal data. In the EU it\u2019s a pretty harsh law called the GDPR. GDPR forces <em>organizations<\/em> to take better care of personal data. Yet this doesn\u2019t stop individuals from simply gathering personal information about somebody they\u2019ve published themselves, consciously or not.<\/p>\n<h3>Do not share your location<\/h3>\n<p>Information about places you often visit or where you live might be the most sensitive because it may be easily exploited by an offline stalker. So it\u2019s crucial to restrict access to this data as much as possible. In this spirit, rethinking your geotagging policy would be a good idea too. But social media is not the only source of geolocation data.<\/p>\n<p>Sometimes our location can be revealed by the apps we use. One of our researchers used a jogging app that allows to track running exercises. Soon it turned out that other users of this app could see the exact running rout\u0435 of our researcher. This information, along with photo and username was shared by the app online.<\/p>\n<p>The conclusion is simple: check all your apps and make sure your location is not shared unnecessarily. Apple devices actually help with this and will notify you about your geolocation settings when you start using a new app. But in case of already installed applications, or if you are using other platforms, you\u2019ll have to check settings manually.<\/p>\n<h2>I\u2019ve been doxed. What to do?<\/h2>\n<p>If you or your close ones have been doxed, there are still some things you can do to minimize the damage:<\/p>\n<ul>\n<li><strong>Report all the posts that are spreading your personal information.<\/strong>. Social media platforms usually deem the spread of such information as a violation, so chances are you\u2019ll be able to take the posts down. Also asking your friends to report them might help speed up the process.<\/li>\n<li><strong>Gather the evidence.<\/strong> Save all threatening emails, posts by other users, phone calls, and any other related interactions. Document everything in detail \u2014 this will help when you report abuse not only to social media, but also to the police.<\/li>\n<li><strong>Contact law enforcement.<\/strong> Your local police station may not know what doxing is, but hopefully they\u2019ll understand the danger from online abuse and threats. Share with them all you know and seek action.<\/li>\n<li><strong>Get support.<\/strong> Get in touch with your friends and family to get their support. Also, don\u2019t hesitate to reach out to your local NGO that helps victims of online abuse; for example, in Singapore, that would be SCWO.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Why it\u2019s important to think about what data you share online, how to prevent being doxed, and what to do if you fail.<\/p>\n","protected":false},"author":2632,"featured_media":46813,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1788],"tags":[4043,363,43],"class_list":{"0":"post-46812","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"tag-doxing","9":"tag-personal-data","10":"tag-privacy"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/doxing-of-women\/46812\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/doxing-of-women\/25077\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/doxing-of-women\/20571\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/doxing-of-women\/10391\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/doxing-of-women\/27660\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/doxing-of-women\/25400\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/doxing-of-women\/25729\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/doxing-of-women\/28314\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/doxing-of-women\/34536\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/doxing-of-women\/11236\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/doxing-of-women\/20024\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/doxing-of-women\/20652\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/doxing-of-women\/29672\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/doxing-of-women\/33143\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/doxing-of-women\/25766\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/doxing-of-women\/31440\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/doxing-of-women\/31153\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/doxing\/","name":"doxing"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/46812","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2632"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=46812"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/46812\/revisions"}],"predecessor-version":[{"id":46815,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/46812\/revisions\/46815"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/46813"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=46812"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=46812"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=46812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}