{"id":3695,"date":"2025-05-08T14:08:36","date_gmt":"2025-05-08T12:08:36","guid":{"rendered":"https:\/\/enthec.com\/?p=3695"},"modified":"2025-05-08T14:19:48","modified_gmt":"2025-05-08T12:19:48","slug":"what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/","title":{"rendered":"What is doxing, and how to prevent your personal data from being exposed on the Internet"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The Internet is a space where we share information daily. Social networks, forms, online purchases\u2026 Each action leaves a slight <\/span><a href=\"https:\/\/enthec.com\/en\/how-to-erase-or-reduce-your-digital-footprint-and-minimize-the-risk-of-cyberattacks\/\"><span style=\"font-weight: 400;\">digital trace. <\/span><\/a><span style=\"font-weight: 400;\">Most of the time, we are unaware of how much we reveal about ourselves. This is where an increasingly well-known (and feared) concept comes into play: <\/span><b>doxing<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>What is doxing, and why should you care?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Doxing<\/span> <span style=\"font-weight: 400;\">(abbreviation of<\/span> <i><span style=\"font-weight: 400;\">dropping dox or<\/span><\/i> <i><span style=\"font-weight: 400;\">&#8216;release documents&#8217;<\/span><\/i>) <span style=\"font-weight: 400;\">refers to the <\/span><b>public exposure of a person&#8217;s data <\/b><span style=\"font-weight: 400;\"> without their consent. We talk about addresses, telephone numbers, workplaces, private photos, emails, real names, and even financial or family information. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">These types of attacks, which initially emerged in particular online communities, have spread in recent years and can have<\/span> <b>serious consequences:<\/b> <span style=\"font-weight: 400;\">from harassment, threats, and<\/span> <a href=\"https:\/\/enthec.com\/en\/how-to-prevent-social-media-phishing\/\"><span style=\"font-weight: 400;\">identity theft,<\/span><\/a> <span style=\"font-weight: 400;\">to the loss of employment or the appearance of legal problems.<\/span><\/p>\n<p><b>Doxing on the Internet is not a simple hacker&#8217;s game:<\/b><span style=\"font-weight: 400;\">It is a form of digital violence. And it can affect anyone. <\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Qondar: a solution that helps you protect your digital privacy<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Before continuing, it is worth stopping at our featured tool:<\/span> <b>Qondar,<\/b> <span style=\"font-weight: 400;\">a solution for <\/span><b>personal cyber surveillance.<\/b><\/p>\n<p><a href=\"https:\/\/enthec.com\/en\/qondar\/\"><span style=\"font-weight: 400;\">Qondar<\/span><\/a><span style=\"font-weight: 400;\">\u00a0has been developed for anyone who wants to maintain control over their information on the network without needing advanced technical knowledge. It works like a <\/span><b>Continuous Threat Exposure Management (CTEM) platform.<\/b> <span style=\"font-weight: 400;\">It lets you detect if your data is being shared without permission in forums, leaked databases, social networks, or even the dark web.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Even if you don&#8217;t know what doxing on the internet is, you too may suffer from an attack. If so, <\/span><b>Qondar will tell you before it&#8217;s too late<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Why does someone decide to dox another person?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">There is no single attacker profile, nor a single motivation. Doxing, as this phenomenon is also known, can have many faces: <\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Personal revenge:<\/b> <span style=\"font-weight: 400;\">Ex-partners, ex-friends, or work conflicts can lead to malicious leaks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Extreme ideology or activism:<\/b> <span style=\"font-weight: 400;\">Some users publish data about opponents to intimidate or silence them in political or social debates.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Practical jokes or viral challenges<\/b>: <span style=\"font-weight: 400;\">especially among teenagers or in toxic online communities.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Extortion and blackmail:<\/b> <span style=\"font-weight: 400;\">Once they have your data, some attackers try to obtain money or favors in exchange for not disclosing it.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Whatever the reason, the result is the same: your<\/span> <a href=\"https:\/\/enthec.com\/en\/importance-of-personal-privacy-in-the-digital-age\/\"><span style=\"font-weight: 400;\">privacy<\/span><\/a> <span style=\"font-weight: 400;\">and<\/span> <b>security are compromised<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-3690 aligncenter\" src=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/que-es-doxear.jpg\" alt=\"what is doxing\" width=\"650\" height=\"434\" srcset=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/que-es-doxear.jpg 650w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/que-es-doxear-300x200.jpg 300w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/que-es-doxear-350x234.jpg 350w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><b>What type of data is typically exposed when doxing?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Although the degree of exposure varies, the most common data that is published or sold in doxing cases are:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Full name and physical address<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Phone number<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Email<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Profiles on social networks<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Personal photos<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Information about the family environment<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Employment or academic data<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Purchase or search history<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">A simple search in filtered databases (such as those found on the dark web) can be enough to create a detailed profile of a person. That&#8217;s why <\/span><b>prevention is key<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>How to avoid being doxed: good practices to protect your privacy<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">To know<\/span> <b>how to protect yourself from doxing involves changing certain digital habits.<\/b><span style=\"font-weight: 400;\">. Here are some practical tips that you can start applying today, now that you understand what doxing is:<\/span><\/p>\n<h3><b>1. Check your social networks<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use strict privacy settings.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Avoid sharing personal information such as your address or your children&#8217;s school.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not post photos of documents or screenshots with sensitive data.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">You may be interested\u2192<\/span><a href=\"https:\/\/enthec.com\/en\/5-social-media-security-strategies\/\"> <span style=\"font-weight: 400;\">5 security strategies on social networks<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3><b>2. Use strong and unique passwords<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Don&#8217;t repeat passwords across multiple services.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enable two-step authentication (2FA) whenever possible.<\/span><\/li>\n<\/ul>\n<h3><b>3. Be careful with online forms and contests<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do you need to give out your phone number to enter that giveaway?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use secondary or temporary emails when possible.<\/span><\/li>\n<\/ul>\n<h3><b>4. Avoid heated discussions in public forums<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Many victims of doxing end up being attacked for their opinions.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Participate respectfully and avoid sharing unnecessary details.<\/span><\/li>\n<\/ul>\n<h3><b>5. Do searches about yourself<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Type your first and last name in search engines to see what appears.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use tools like Qondar to get a complete view of your online exposure and receive alerts if anything changes.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><b>What do you do if you have been doxed?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">It may finally happen even if you have done everything possible to avoid being doxed. In this case, the most important thing is to act quickly: <\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Document everything<\/b> <span style=\"font-weight: 400;\">that has been published (captures, links, etc.).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Contact the platforms <\/b><span style=\"font-weight: 400;\">where the information has been disclosed and request immediate withdrawal.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Report the case to the Police and authorities, <\/b><span style=\"font-weight: 400;\">especially if there are threats or blackmail.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Go to your national Data Protection Agency<\/b><span style=\"font-weight: 400;\"> if your rights have been violated.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Receive psychological support<\/b><span style=\"font-weight: 400;\"> if the emotional impact has been substantial. Digital bullying can seriously affect mental health. <\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h2><b>Is there a definitive solution?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The reality is that there is no 100% foolproof barrier. But yes, you can <\/span><b>minimize your exposure<\/b> <span style=\"font-weight: 400;\">and protect yourself from doxing\u200b to be prepared for any threat.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is where Continuous Threat Exposure Management (CTEM) solutions, like Qondar, come into play. This tool offers you something that few solutions provide: active and personalized digital identity monitoring. <\/span><\/p>\n<p><b>Knowing when and where your information appears<\/b><span style=\"font-weight: 400;\"> allows you to act before it&#8217;s too late. What is not controlled on the Internet can get out of hand in seconds. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now that you know what doxing is, it is not a distant concept exclusive to celebrities or public figures. Anyone can be a victim. And in a society as hyperconnected as the current one, shielding our personal information has become a necessity, not a luxury. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Luckily, there are tools available to everyone to avoid this. If you are looking for an effective way to <\/span><b>protect yourself from doxing<\/b> <span style=\"font-weight: 400;\">and <\/span><b>keep your digital identity under control<\/b>, <span style=\"font-weight: 400;\">Qondar by<\/span> <a href=\"https:\/\/enthec.com\/en\/\"><span style=\"font-weight: 400;\">Enthec<\/span><\/a><span style=\"font-weight: 400;\"> is a solution that can help you sleep more peacefully.<\/span><\/p>\n<p><b>Your privacy is not a simple detail to consider; it is part of your security. Start caring for her today with Qondar. <\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Internet is a space where we share information daily. Social networks, forms, online purchases\u2026 Each action leaves a slight [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":3694,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[25,33,35,39],"class_list":["post-3695","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-en","tag-persons","tag-risks","tag-privacy","tag-social-media"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u25b7 What is doxing: Keys to protect yourself | Enthec<\/title>\n<meta name=\"description\" content=\"Knowing what doxing is can help you prevent online risks \u27a1\ufe0f Qondar offers you a simple way to protect your information\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u25b7 What is doxing: Keys to protect yourself | Enthec\" \/>\n<meta property=\"og:description\" content=\"Knowing what doxing is can help you prevent online risks \u27a1\ufe0f Qondar offers you a simple way to protect your information\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-08T12:08:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-08T12:19:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/doxear-que-es-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1520\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enthec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enthec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/\"},\"author\":{\"name\":\"Enthec\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\"},\"headline\":\"What is doxing, and how to prevent your personal data from being exposed on the Internet\",\"datePublished\":\"2025-05-08T12:08:36+00:00\",\"dateModified\":\"2025-05-08T12:19:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/\"},\"wordCount\":980,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/doxear-que-es-scaled.jpg\",\"keywords\":[\"Persons\",\"Risks\",\"Privacy\",\"Social Media\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/\",\"url\":\"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/\",\"name\":\"\u25b7 What is doxing: Keys to protect yourself | Enthec\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/doxear-que-es-scaled.jpg\",\"datePublished\":\"2025-05-08T12:08:36+00:00\",\"dateModified\":\"2025-05-08T12:19:48+00:00\",\"description\":\"Knowing what doxing is can help you prevent online risks \u27a1\ufe0f Qondar offers you a simple way to protect your information\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/#primaryimage\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/doxear-que-es-scaled.jpg\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/doxear-que-es-scaled.jpg\",\"width\":2560,\"height\":1520,\"caption\":\"Human resource management concept. Businessman filling out online employee appraisal form. Human resource management (HR), recruiting, leadership and team building.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is doxing, and how to prevent your personal data from being exposed on the Internet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC\",\"description\":\"Advanced AI-driven Cyber-Surveillance Platform\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\",\"name\":\"Enthec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"caption\":\"Enthec\"},\"url\":\"https:\/\/enthec.com\/en\/author\/enthec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u25b7 What is doxing: Keys to protect yourself | Enthec","description":"Knowing what doxing is can help you prevent online risks \u27a1\ufe0f Qondar offers you a simple way to protect your information","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/","og_locale":"en_US","og_type":"article","og_title":"\u25b7 What is doxing: Keys to protect yourself | Enthec","og_description":"Knowing what doxing is can help you prevent online risks \u27a1\ufe0f Qondar offers you a simple way to protect your information","og_url":"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","article_published_time":"2025-05-08T12:08:36+00:00","article_modified_time":"2025-05-08T12:19:48+00:00","og_image":[{"width":2560,"height":1520,"url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/doxear-que-es-scaled.jpg","type":"image\/jpeg"}],"author":"Enthec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enthec","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/#article","isPartOf":{"@id":"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/"},"author":{"name":"Enthec","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1"},"headline":"What is doxing, and how to prevent your personal data from being exposed on the Internet","datePublished":"2025-05-08T12:08:36+00:00","dateModified":"2025-05-08T12:19:48+00:00","mainEntityOfPage":{"@id":"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/"},"wordCount":980,"commentCount":0,"publisher":{"@id":"https:\/\/enthec.com\/#organization"},"image":{"@id":"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/doxear-que-es-scaled.jpg","keywords":["Persons","Risks","Privacy","Social Media"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/","url":"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/","name":"\u25b7 What is doxing: Keys to protect yourself | Enthec","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/#primaryimage"},"image":{"@id":"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/doxear-que-es-scaled.jpg","datePublished":"2025-05-08T12:08:36+00:00","dateModified":"2025-05-08T12:19:48+00:00","description":"Knowing what doxing is can help you prevent online risks \u27a1\ufe0f Qondar offers you a simple way to protect your information","breadcrumb":{"@id":"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/#primaryimage","url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/doxear-que-es-scaled.jpg","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/05\/doxear-que-es-scaled.jpg","width":2560,"height":1520,"caption":"Human resource management concept. Businessman filling out online employee appraisal form. Human resource management (HR), recruiting, leadership and team building."},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/en\/what-is-doxing-and-how-to-prevent-your-personal-data-from-being-exposed-on-the-internet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/en\/"},{"@type":"ListItem","position":2,"name":"What is doxing, and how to prevent your personal data from being exposed on the Internet"}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC","description":"Advanced AI-driven Cyber-Surveillance Platform","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1","name":"Enthec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","caption":"Enthec"},"url":"https:\/\/enthec.com\/en\/author\/enthec\/"}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/3695","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/comments?post=3695"}],"version-history":[{"count":0,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/3695\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media\/3694"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media?parent=3695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/categories?post=3695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/tags?post=3695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}