FRONTLINEPRIVACY
Threat

Doxxing through social media

A photo of your back porch, a check-in at your gym, a tagged post at your kid's baseball game — strung together, they reach your home.

Run a free scan. No signup.

What this is

Social media doxxing doesn't need a Spokeo page to work — the data is on your own accounts. A photo of your back porch with a recognizable cross-street. A check-in at your gym. A tagged post at your kid's baseball game. A LinkedIn entry showing your employer. A Facebook profile listing your spouse.

OSINT — open-source intelligence — is the discipline of stitching these together to identify a person, their home, their schedule, and their family. It's not a hack. It's pattern matching with public data, often automated, sometimes done by hand.

Why first responders catch this more

You don't need to post anything specific to be vulnerable. A handful of innocuous posts over months — a sunset photo from your front yard, a 5K race time, a birthday post for your kid — adds up. Anyone willing to spend an hour can usually triangulate.

For undercover and federal LE, the social-media exposure can compromise more than home safety. Old college tags, a sibling's family photos including you, a high-school reunion post — any of it can connect a current cover identity back to a real one.

What we sweep that prevents the chain

We don't operate your social accounts. That part is on you — lock down what you control: privacy settings, location tagging, removal of geotagged photos, removal of tags by family members.

What we do handle is the broker side. Even when someone has done the OSINT work to identify you, the address still usually comes from a broker page. We close that loop. Standard opt-outs across 200+ broker sites, re-checked every two weeks.