Anti-Doxxing Field Guide: How to Protect Your Identity Before You Become a Target
A comprehensive guide to protecting your personal information before you become a doxxing target. Covers data broker removal, social media lockdown, address privacy, and ongoing maintenance strategies.

You don't have to be famous to get doxxed. Researchers, journalists, activists, gamers, and ordinary people become targets every day. This guide covers practical steps to reduce your digital footprint and protect your personal information before someone decides to expose it.
Understanding the Threat
Doxxing—the practice of researching and publicly releasing someone's private information—has become a weapon of choice for online harassers. Once your data is out there, it's nearly impossible to remove. The key is prevention.
What Doxxers Look For
- Full legal name and any aliases
- Home address (current and previous)
- Phone numbers (personal, work, family)
- Email addresses
- Workplace information
- Family members' identities
- Social media accounts
- Photos (for facial recognition and location metadata)
- Vehicle information
- Financial records
Phase 1: Audit Your Digital Footprint
Google Yourself
Start by searching for your own information the way an attacker would:
- Search your full name in quotes:
"John Michael Smith" - Search your name + city:
"John Smith" Chicago - Search your email addresses
- Search your usernames across platforms
- Search your phone number
- Use Google Images reverse search on your profile photos
Check Data Broker Sites
Your information is likely already for sale. Check these sites and request removal:
- Spokeo – spokeo.com/optout
- WhitePages – whitepages.com/suppression-requests
- BeenVerified – beenverified.com/f/optout/search
- Intelius – intelius.com/opt-out
- PeopleFinder – peoplefinder.com/optout.php
- TruePeopleSearch – truepeoplesearch.com/removal
- FastPeopleSearch – fastpeoplesearch.com/removal
Note: Opt-out requests can take 2-4 weeks. You'll need to repeat this process periodically as your data gets re-added from public records.
Phase 2: Lock Down Social Media
Privacy Settings Checklist
Facebook:
- Set profile to Friends Only
- Disable "Public search results"
- Remove phone number and address
- Disable facial recognition tagging
- Review all tagged photos and posts
- Limit who can see your friends list
Instagram:
- Switch to Private account
- Disable "Activity Status"
- Remove location tags from existing posts
- Don't link to other social accounts
Twitter/X:
- Remove location from profile
- Disable "Discoverability" by phone/email
- Consider using a pseudonym
- Don't tweet photos with location metadata
LinkedIn:
- Limit profile visibility to connections
- Hide your connections list
- Use generic job titles if possible
- Disable "Profile viewing options"
Username Hygiene
- Never reuse usernames across platforms—this links your accounts
- Use different email addresses for different purposes
- Consider using a password manager to generate random usernames
Phase 3: Protect Your Physical Location
Address Privacy
- Use a PO Box or mail forwarding service for deliveries
- Register vehicles to an LLC if your state allows it
- Use a virtual mailbox service (Traveling Mailbox, Earth Class Mail) for a different state address
- Remove your address from voter registration if your state allows confidential registration
Photo Metadata
Photos taken with smartphones contain EXIF data including GPS coordinates. Before posting any photo:
- Strip metadata using tools like ExifTool or ImageOptim
- Enable "Remove location data" in your phone's camera settings
- Be aware of background details that reveal location (street signs, landmarks, mail)
Phase 4: Communication Security
Email Strategy
- Primary email: Never shared publicly, used only for banking/critical accounts
- Secondary email: For subscriptions and services
- Burner email: For one-time signups (use SimpleLogin, AnonAddy, or Firefox Relay)
Phone Number Protection
- Get a VoIP number (Google Voice, MySudo, Hushed) for public use
- Never give your real number to websites or services that don't require it
- Use the VoIP number for two-factor authentication when possible
Phase 5: Ongoing Maintenance
Set Up Alerts
- Google Alerts for your name, address, and phone number
- Have I Been Pwned alerts for email addresses
- Credit monitoring for financial identity theft
Regular Audits
Schedule quarterly reviews:
- Re-check data broker sites (your info gets re-added)
- Review social media privacy settings (platforms change defaults)
- Audit account recovery options (old phone numbers, emails)
- Check for new accounts using your information
If You're Already Being Targeted
If you discover you're being doxxed:
- Document everything—screenshots with timestamps
- Report to platforms—most have policies against doxxing
- Contact local police—file a report even if they can't act immediately
- Alert family members—they may be contacted or targeted
- Notify your employer—prevent social engineering attacks
- Consider legal action—consult an attorney about harassment laws in your jurisdiction
Tools and Resources
- DeleteMe – Paid service that handles data broker removal
- Privacy Duck – Opt-out guides and monitoring
- Jumbo Privacy – App that automates privacy settings
- EFF's Surveillance Self-Defense – ssd.eff.org
- Access Now Digital Security Helpline – For activists and journalists
Covering the underground since 2020.

The Truth About Cyber Doxxing: Why IP Tracing Doesn’t Work Like in the Movies
🔥 The Realities of Cyber Doxxing & IP Tracking 🔥 In the world of cybersecurity, misinformation is just as dangerous as any cyberattack. One of the biggest myths floating around? The idea that...

Social Engineering Defense: How to Recognize and Resist Manipulation Attacks
Learn to recognize and defend against social engineering attacks. Covers phishing, vishing, pretexting, and the psychological triggers attackers exploit to manipulate victims.

Secure Communications Guide: Encrypted Messaging and Email for the Privacy-Conscious
A practical guide to secure messaging and email. Covers Signal, ProtonMail, PGP, and operational security principles for protecting your communications from surveillance and interception.