DiFü-logo
Start Home
Please enter a valid email address
Please enter your password
Lost password?

Create an account and save your progress

Please enter a valid email address
Please enter a password

To issue certificates, we also need your name and date of birth

Please enter your name
Please accept our terms and conditions to proceed
Exam Topic exam

E4 | Doxing

Here you will learn about doxing, how to protect yourself from it, and what to do if you are affected by it.

  • The term doxing or doxxing derives from the word “docs,” which is the short form of “documents.” Doxing involves collecting someone’s personal documents or data and publishing them online. These documents can include forms of identification, private addresses, telephone numbers, bank details, or also personal data from companies.

    Public figures, such as politicians or stars, are often affected by doxing. Their personal information is usually published on social networks or through anonymous uploading sites. This can lead to compromises of safety and privacy, such as when the private address of politicians or celebrities published online leads to threats at their home. Doxing also promotes identity theft.

    When doxing occurs on a corporate level, this is sometimes referred to as whistleblowing. Whistleblowers gather and publish corporate documents to expose illegal activities.

    Doxing can also have positive consequences, such as when the publication of secret documents exposes scandals or abuse, or if an anonymous social media account that spreads hate speech is uncovered.

  • Because of the sheer amount of personal data that exists online, it is becoming increasingly difficult to protect yourself from doxing. You can use the following steps to protect yourself as much as possible:

    Revealing as little about yourself online as possible limits the personal information that can be revealed through doxing.

    When it comes to your social media profiles, make sure that your data is only visible to a limited extent. You should think carefully about friend requests from strangers, and research them thoroughly before accepting them. When using social networks in your private life, you should never reveal information about your profession or employer.

     

    The same settings that protect you from online schemes will help protect you from doxing, including secure passwords and two-factor authentication. To set this up, take a look at the Logins and Passwords section of Module D. Regular system updates will protect you. Information on this topic can be found in the Updates section of Module E.

    Data Brokers

    So-called data brokers search the internet specifically for personal information that they can compile and sell. Even small bits and pieces of information gathered by data brokers can tell a lot about you and be sold to companies or advertising agencies for a profit.

  • If you become a victim of doxing, you will usually find out from the perpetrators themselves, who will likely send you messages detailing your personal information that they have published. Doxing is punishable by law, and you should respond to it with the following steps:

    Although sharing your experience does not help combat the actual doxing, it is important to gather the support of your close contacts at this point. They can also assist you with the following points.

    If your data was published on a social network, report the post to the operator. Doxing posts are usually deleted quickly.

    Take screenshots of any doxing detailing the personal information that was posted, preferably containing the person’s username and the date it occurred.

    You can take the evidence you collected to the police to file a complaint. If more information is required, the police will guide you through this process.

    It is important to note that doxing only refers to stolen personal data that is not freely accessible. If you’ve already published your mobile phone number on X (formerly known as “Twitter”), for example, then it’s not considered doxing if this information is shared by a third party.