DEFINITION of 'Doxing'

The means by which a person’s true identity is intentionally exposed online. Doxing is a method by which hackers obtain quasi-identifiers or personally identifiable information of individuals or businesses. The data obtained is then broadcast over the internet without the victim’s permission. Although doxing is normally attributed to cyber-hacking, journalists led by a cause or trying to make a broader point might also partake of this activity.

Doxing is also spelt ‘Doxxing’ and is short for document (docs) dropping.


As the popularity of social media forums gain traction and big data obtained from the forums by companies are shared across sectors and industries, cyber hackers can steal important information about an entity and sell it in underground marketplaces or distribute it online. The latter process is known as Doxing.

Doxing involves the purposeful act of seeking out a person’s identity and revealing it to the public without the individual’s consent. The practice is usually carried out for malicious intent, for fun, or in a vigilante effort to reveal the identity of an infamous person. Ashley Madison, an online dating site for people interested in extramarital affairs, was the target of a doxing act in 2015. The anonymous group responsible for hacking the users’ data questioned the morals of the online company and requested that the website be shut down. When this request was not honored by Ashley Madison, the hacking group made public over 30 million Ashley Madison users’ data including their email addresses, names, credit card details, mailing addresses, phone numbers and sexual preferences. Malicious spectators who got hold of the publicly available information went on a blackmailing spree to extort the victims of money in return for not sharing the information any further.

Michael Brutsch had his identity doxed in 2012 when a Gawker writer exposed him online. Brutsch was a popular Reddit user known for making inappropriate posts and comments on issues of child pornography and incest. The public revelation of his identity lost him his job but the public perception to his exposure was two-fold. While some applauded the bravery of the Gawker writer, others scrutinized the vigilante doxing act and found it meddling on anonymity.

A doxxer can acquire information about people from multiple sources. One source is through underground marketplaces. As data becomes an increasingly valuable commodity on digital platforms, cyber hackers and identity thieves are inventing new ways to access the data. The data stolen can then be sold through underground websites that operate with private and anonymized networks like Tor Network. A doxxer who buys the data from such marketplaces can then publicize the information on the internet. Data can also be obtained through legitimate sources online. If a doxxer can get quasi-identifiers such as postal code, race, sex, date of birth, etc. and effectively piece these identifiers together, she or he will be able to personally identify the individual bearing the identifiers. This could also be seen as a de-anonymizing technique whereby pieces of information from separate anonymized data sets are matched together to identify an entity.

Internet users have to be mindful of what sites they visit and ensure the sites have rigorous security checks in place before providing important data. Although online businesses strive to anonymize the profiles of their users using stringent security techniques, the ability of hackers and doxxers to de-anonymize data is proof that all online activities leave a trail.

  1. Data Breach

    A data breach is an unauthorized access and retrieval of sensitive ...
  2. Cyber Identity

    Cyber identity refers to the personality or personalities that ...
  3. Data Anonymization

    A data privacy technique that seeks to protect private or sensitive ...
  4. Identity Theft

    The crime of obtaining the personal or financial information ...
  5. Personally Identifiable Information ...

    Personally Identifiable Information (PII) is information that, ...
  6. Silk Road

    A digital platform that was popular for hosting money laundering ...
Related Articles
  1. Tech

    Whose Fault Is Identity Theft?

    You've been so careful, so how did they get your information? Who is really to blame for your identity being stolen?
  2. Tech

    Microsoft Will Use Blockchain To Build New Digital Identity

    Microsoft plans to use blockchain to build a new digital identity that gives users control over their personal details.
  3. Tech

    Is It Safe to Send Money Through Facebook?

    Learn how Facebook employs strong measures to keep your information safe when sending money, but understand the rare threats that still exist.
  4. Insights

    Pros And Cons Of Credit Monitoring Services

    Identity theft is a complex problem. Learn if credit monitoring services are the solution.
  5. Tech

    6 Tips for Protecting Your Identity

    Taking these six steps can help prevent you from falling victim to a data breach.
  6. Investing

    The Story Behind Sports Direct Founder Mike Ashley

    Before he was a businessman and the founder of the UK sporting giant Sports Direct, Mike Ashley was a squash player and coach.
  7. Tech

    Cybersecurity: Protect Yourself This Tax Season

    Take a little extra time to review online communications and avoid becoming a cybercrime victim.
  8. Tech

    How Blockchain Tech Can Fight Data Breaches

    In the wake of major data breaches, blockchain's ability to anonymize users is touted as a possible solution to rampant identity theft.
  9. Retirement

    Are Do-it-Yourself Online Wills Right for You?

    An online will site can be an inexpensive and fast way to get that all-important will completed. Find out if this is the right solution for your situation.
  10. Tech

    Staying Safe After the Equifax Data Breach

    The recent Equifax breach illustrates why you need to protect your identity. Here's how.
  1. Why would someone change their Social Security number?

    Learn the reasons a person might choose to change his Social Security number, including identity theft and abuse, and discover ... Read Answer >>
  2. How do Internet companies profit if they give away their services for free?

    Learn how companies in the Internet sector make a profit when service, content and user applications are offered at no cost ... Read Answer >>
  3. What are the primary risks an investor should consider when investing in the Internet ...

    Learn what risks to look out for when considering investments in the Internet sector in order to maximize potential profits ... Read Answer >>
  4. What are the top Social Security scams targeted at the elderly?

    Prevent Social Security scams by learning to recognize the most common types of scams that target senior citizens receiving ... Read Answer >>
Hot Definitions
  1. Money Market

    The money market is a segment of the financial market in which financial instruments with high liquidity and very short maturities ...
  2. Perfect Competition

    Pure or perfect competition is a theoretical market structure in which a number of criteria such as perfect information and ...
  3. Compound Interest

    Compound Interest is interest calculated on the initial principal and also on the accumulated interest of previous periods ...
  4. Income Statement

    A financial statement that measures a company's financial performance over a specific accounting period. Financial performance ...
  5. Leverage Ratio

    A leverage ratio is any one of several financial measurements that look at how much capital comes in the form of debt, or ...
  6. Annuity

    An annuity is a financial product that pays out a fixed stream of payments to an individual, primarily used as an income ...
Trading Center