Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Doxing

From Wikipedia, the free encyclopedia
(Redirected fromDoxxing)
Publication of the private details of individuals, often on the Internet
"Doxes" redirects here. For the singular of doxes, seeDox (disambiguation).
Globe icon.
The examples and perspective in this articledeal primarily with the United States, with some coverage of other countries, and do not represent aworldwide view of the subject. You mayimprove this article, discuss the issue on thetalk page, orcreate a new article, as appropriate.(April 2023) (Learn how and when to remove this message)
A fictional example of a doxing post on social media. In this case, the victim's personal name and address are shown.

Doxing ordoxxing is the act of publicly providingpersonally identifiable information about an individual or organization, usually via theInternet and without their consent.[1][2][3] Historically, the term has been used to refer to both the aggregation of this information from public databases andsocial media websites (likeFacebook), and the publication of previously private information obtained through criminal or otherwise fraudulent means (such ashacking andsocial engineering).[citation needed]

The aggregation and provision of previously published material is generally legal, though it may be subject to laws concerningstalking andintimidation.[4] Doxing may be carried out for reasons such asonline shaming,extortion, andvigilante aid to law enforcement.[5][6]

Etymology

[edit]

"Doxing" is aneologism. It originates from a spelling alteration of the abbreviation "docs", for "documents", and refers to "compiling and releasing a dossier of personal information on someone".[7] Essentially, doxing is revealing and publicizing the records of an individual, which were previously private or difficult to obtain.

The term dox derives from the slang "dropping dox", which, according toWired contributor Mat Honan, was "an old-school revenge tactic that emerged from hacker culture in 1990s". Hackers operating outside the law in that era used the breach of an opponent'sanonymity as a means to expose them to harassment or legal repercussions.[7] Consequently, doxing often carries a negative connotation because it can be a means of revenge via the violation ofprivacy.[8]

History

[edit]
See also:Human flesh search engine § History

The practice of publishing personal information about individuals as a form of vigilantism predates the Internet, via physical media such as newspapers and pamphlets. For example, in response to theStamp Act 1765 in theThirteen Colonies, radical groups such as theSons of Liberty harassed tax collectors and those who did not comply with boycotts on British goods by publishing their names in pamphlets and newspaper articles.[9][10]

Outside of hacker communities, the first prominent examples of doxing took place on internet discussion forums onUsenet in the late 1990s, including users circulating lists of suspectedneo-Nazis,[11] laterracists.[12] Also in the late 1990s, a website called theNuremberg Files had launched, featuring the home addresses ofabortion providers and language that implied website visitors should stalk and kill the people listed.[11]

In 2012, when then-Gawker reporterAdrian Chen revealed the identity ofReddit troll Violentacrez as Michael Brutsch, Reddit users accused Chen of doxing Brutsch and declared "war" onGawker. In the mid-2010s, the events of theGamergate harassment campaign brought the term into wider public use. Participants in Gamergate became known for releasing sensitive information about their targets to the public, sometimes with the intent of causing the targets in question physical harm. Caroline Sinders, a research fellow at theCenter for Democracy and Technology, said that "Gamergate, for a lot of people, for mainstream culture, was the introduction to what doxxing is".[11]

According toThe Atlantic, from 2014 to 2020, "the doxxing conversation was dominated by debate around whether unmasking a pseudonymous person with a sizable following was an unnecessary and dangerous invasion of their privacy."[13] In 2014, whenNewsweek attempted to search for thepseudonymous developer ofBitcoin, the magazine was accused of doxing bycryptocurrency enthusiasts. In 2016, when anItalian journalist attempted to search for the identity of the pseudonymous ItaliannovelistElena Ferrante, the journalist was accused of gendered harassment andVox referred to the search as "the doxxing of Elena Ferrante." In 2020, whenThe New York Times indicated that it was planning on publishing the real name of theCalifornia psychiatrist running theSlate Star Codex blog, fans of the blog accused theTimes of doxing. The person behind the blog accused theTimes of threatening his safety and claimed that he started a "major scandal" that resulted in theTimes losing hundreds or thousands of subscriptions.[11]

In 2022,BuzzFeed News reporter Katie Notopoulos used public business records to identify the previously pseudonymous founders of theBored Ape Yacht Club. Greg Solano, one of the founders of the club, claimed that he "got doxxed against [his] will".[11]

In April 2022,The Washington Post reporterTaylor Lorenz revealed the identity of the person behind theTwitter accountLibs of TikTok as Chaya Raichik, who works inreal estate. This resulted in Raichik and right-wingers accusing Lorenz of doxing.[11]

Pro-Israel NGOs including theIsrael on Campus Coalition andCanary Mission have been accused of doxing Palestinian activists by releasing public dossiers documenting their activism.[14][15] TheGaza war saw a surge[citation needed] in doxing activities in the United States. Right wing advocacy groupAccuracy in Media sent trucks toYale University andColumbia University, displaying the names and faces of students involved in anti-Israel activism under a banner labeling them "leading antisemites" on campus.[16][17] Similarly, Canary Mission published the identities and images ofHarvard University students involved in the circulation of an open letter, published on October 7th, that held "the Israeli regime entirely responsible for all unfolding violence".[18][19]

Doxware

[edit]

Doxware is acryptovirology attack invented by Adam Young and further developed with Moti Yung that carries out doxing extortion viamalware. It was first presented atWest Point in 2003. The attack is rooted in game theory and was originally dubbed "non-zero-sum games and survivable malware".[20]

The attack is summarized in the bookMalicious Cryptography as follows:

The attack differs from the extortion attack in the following way. In the extortion attack, the victim is denied access to its own valuable information and has to pay to get it back, where in the attack that is presented here the victim retains access to the information but its disclosure is at the discretion of the computer virus.[21]

Doxware is the converse ofransomware. In a ransomware attack (originally called cryptoviral extortion), themalware encrypts the victim's data and demands payment to provide the needed decryption key. In the doxware cryptovirology attack, the attacker or malware steals the victim's data and threatens to publish it unless a fee is paid.[22]

Common techniques

[edit]

Once people have been exposed through doxing, they may be targeted for harassment through methods such as actual harassment in person, fake signups for mail subscriptions, food deliveries, bombarding the address with letters, or through “swatting”—the intentional dispatching of armed police teams (S.W.A.T.) to a person's address via falsely reported tips or through fake emergency services phone calls. The act of reporting a false tip to police—and the subsequent summoning of an emergency response team (ERT)—is an illegal, punishable offense in most jurisdictions, due to ERTs being compromised and potentially unavailable for real emergencies.[23] It is, at the very least, aninfraction in most US states (for first-time offenders); if multiple attempts are made, the charge increases to amisdemeanor (especially when the intention is harassment-based). Further repercussions include fines ranging from as low as US$50 up to US$2,000, six months spent in county jail, or both the fine and imprisonment.[24]

A hacker may obtain an individual's dox without making the information public. A hacker may look for this information to extort or coerce a known or unknown target. A hacker may also harvest a victim's information to break into their Internet accounts or take over their social media accounts.[7]

Doxing has also occurred indating apps. In a survey conducted in 2021, 16% of respondents reported suffering doxing because of them.[25] In a 2018 qualitative study aboutintimate partner violence, 28 out of 89 participants (both professionals and survivors) reported the exposure of the victim's private information to third parties through digital technologies as a form of humiliation, shaming or harm frequently practiced by abusers, that may include thedisclosure of intimate images andimpersonation of the victim.[26]

Victims may also be shown their details as proof that they have been doxed as a form of intimidation. The perpetrator may use this fear to gain power over victims in order to extort or coerce. Doxing is therefore a standard tactic of online harassment and has been used by people associated with theGamergate andvaccine controversies.[27]

There are different motivations for doxing. They include doing it to reveal harmful behavior and hold the offender accountable. Others use it to embarrass, scare, threaten, or punish someone. It's also often used forcyberstalking, which could result in making someone fear for their safety. Researchers have pointed out that some instances of doxing can be justified, such as when it reveals harmful behavior, but only if the act of doxing also aligns with the public.[28]

Anti-doxing services

[edit]

Parallel to the rise of doxing has been the evolution ofcybersecurity,internet privacy, theOnline Privacy Alliance, and companies that provide anti-doxing services. Most recently, high-profile groups like theUniversity of California Berkeley[29] have made online guidance for protecting its community members from doxing.Wired published an article on dealing with doxing, in whichEva Galperin, from theElectronic Frontier Foundation, advised people to "Google yourself, lock yourself down, make it harder to access information about you."[30]

Legislation

[edit]

Australia

[edit]

In 2024, the Australian government announced they would introduce new legislation to criminalise doxing due to an incident in which the personal details of over 600 people from aWhatsApp group of Jewish Australians was leaked. Some of the people whose details were leaked received threats to harm their reputation as well as death threats.[31][32] The proposed legislation, which includes a law that makes doxing punishable by jail time, has received bipartisan support, and support fromPrime MinisterAnthony Albanese.[31][33]

Austria

[edit]

In 2006 Austria passed its anti-stalking law, and in 2016 cyber-mobbing became a criminal offense.[34] While as of the end of 2024 doxing is no specific offense, the laws mentioned are used in cases of online violence.[35] Since Austria is anEU-member state,EU law (DSGVO) applies.[36]

Mainland China

[edit]

From March 1, 2020, the People's Republic of China's "Regulations on the Ecological Governance of Online Information Content" has been implemented, clarifying that users and producers of online information content services and platforms must not engage in online violence, doxing, deep forgery, data fraud, account manipulation and other illegal activities.[37]

Hong Kong

[edit]

As of 2021, it is a criminal offense inHong Kong to dox, where doxing is defined as releasing private or non-public information on a person for the purposes of "threatening, intimidation, harassment or to cause psychological harm". Persons convicted under this statute are liable to imprisonment for up to 5 years, and a fine of HK$1,000,000 (US$128,324.40).[38]

Germany

[edit]

In Germany, doxing was added to the criminal code in September 2021 asEndangering Dissemination of Personal Data [de] (Section 126a of theCriminal Code). Since then, the publication of freely accessible data is punishable by a prison sentence of up to two years or a fine, and the publication of data that is not freely accessible is punishable by a prison sentence of up to three years or a fine. The dissemination of the data and its content must be suitable and, under the circumstances, intended to expose the person concerned or persons close to them to a crime directed against them or another unlawful act against sexual self-determination, physical integrity, personal freedom or against an object of significant value. By referring to Section 86 of the Criminal Code, which criminalizes theDissemination of Propaganda Material of Unconstitutional and Terrorist Organizations [de], theEndangering Dissemination of Personal Data is not punishable if it is socially appropriate and "the act serves civic education, the defense against unconstitutional efforts, art or science, research or teaching, the reporting on current events or history or similar purposes" (Section 86 Paragraph 4 of the Criminal Code).[39]

Netherlands

[edit]

In 2021, due to increasing doxing incidents targeting Dutch activists, politicians, journalists and others, a new law against doxing was proposed by thenMinister of Justice and SecurityFerdinand Grapperhaus. The law states it is a felony to share personal data with the intent of intimidation, harassment or work-hindering and carries a maximum penalty of a two-years prison sentence or a fine of €25,750 (US$28,204). The penalty shall be increased by a third when targeted at certain public figures.[40] The proposed law passed both houses of parliament and went into effect on 1 January 2024.[41][42][43][44]

Early in 2025 theWar in Court project digitally released a list of names of nearly half a million suspected wartime Nazicollaborators.[45]

Russia

[edit]

Under the Article 137 "Invasion of Personal Privacy" public sharing of personal information, using mass media, Internet, even public events, is considered a crime and shall be punishable by a fine of up to eighteen months in wage, or by compulsory labor for a term of up to three hundred sixty hours, or by corrective labor for a term of up to one year, or by forced labor for a term of up to two years. with deprivation of the right to hold certain positions or engage in certain activities for a term of up to three years or without it, or arrest for a term of up to four months, or imprisonment for a term of up to two years with deprivation of the right to hold certain positions or engage in certain activities for a term of up to three years.[46]

Copying the information and obtaining it illegally are separate offences as well.[46]

South Korea

[edit]

South Korea is one of the few countries with a criminal statute that specifically addresses doxing. Article 49 of "Act on promotion of information and communications network utilization, and information protection" prohibits unlawful collection and dissemination of private information such as full name, birth date, address, likeliness, and any other information that is deemed sufficient to identify specific person(s) when viewed in summation, regardless of intent.[47]

In practice, however, due to the ambiguous nature of "unlawful collection" of private information in the statute, legal actions are often based upon article 44 from the same act, which prohibits insulting an individual with derogatory or profane language, and defamation of an individual through the dissemination of either misinformation or privileged factual information that may potentially damage an individual's reputation or honor (which often occurs in a doxing incident). This particular clause enforces harsher maximum sentences than a "traditional" defamation statute existing in the Korean criminal code. It was originally enacted partially in response to the rise in celebrity suicides due to cyberbullying.[47]

Spain

[edit]

TheSpanish Criminal Code regulates penalties for the discovery and revelation of secrets in articles 197 to 201. It establishes, in its article 197 § 1, that "whoever, in order to discover the secrets or violate the privacy of another, without their consent, seizes their papers, letters, e-mail messages or any other documents or personal effects, intercepts their telecommunications or uses technical devices for listening, transmission, recording or reproduction of sound or image, or any other communication signal, shall be punished with prison sentences of one to four years and a fine of twelve to twenty-four months". Per article 197 § 2, the same penalty punishes those who "seize, use or modify, to the detriment of a third party, reserved personal or family data of another that is registered in computer, electronic or telematic files or media, or in any other type of file or public or private record".[48]

Those who "disseminate, disclose or transfer" the aforementioned data to third parties face a penalty of two to five prison years (one to three years of prison and fines of twelve to twenty-four months, if not directly involved in their discovery but "with knowledge of its illicit origin"). These offenses are particularly severe if made by the person responsible of the respective files, media, records or archives or through unauthorized use of personal data, if revealing of the ideology, religion, beliefs, health, racial origin or sexual life of the victim, if the victim isunderage ordisabled, and if it is made foreconomic profit.[48]

As established by the Criminal Code's reform in 2015,[49] to "disseminate, disclose or transfer to third parties images or audiovisual recordings of the one obtained with their consent in a home or in any other place out of sight of third parties, when the disclosure seriously undermines the personal privacy of that person", without the authorization of the affected person, is also punished per article 197 § 7 to three months to a year in prison and fines of six to twelve months. The offense is particularly severeif the victim is linked to the offender by marriage or an "analogous affective relationship", underage, or disabled.[48]

United States

[edit]

In the United States, there are few legal remedies for the victims of doxing.[50] Two federal laws exist that could potentially address the problem of doxing: the Interstate Communications Statute and the Interstate Stalking Statute.[51] However, as one scholar has argued, "[t]hese statutes ... are woefully inadequate to prevent doxing because their terms are underinclusive and they are rarely enforced".[51] The Interstate Communications Statute, for example, "only criminalizes explicit threats to kidnap or injure a person".[52] But in many instances of doxing, a doxer may never convey an explicit threat to kidnap or injure, but the victim could still have good reason to be terrified.[52] And the Interstate Stalking Statute "is rarely enforced and it serves only as a hollow protection from online harassment".[53] Several states, notablyCalifornia andColorado, make doxing illegal understate law.[54]

According to at least one estimate, over three million people are stalked over the internet each year, yet only about three are charged under the Interstate Stalking Statute.[53] Accordingly, "[t]his lack of federal enforcement means that the States must step in if doxing is to be reduced."[53]

In late 2023 and early 2024, during arash of swatting of American politicians, it became widely used as a way of encouraging attacks, as the United States possesses weak laws surroundingdata privacy, with its citizens'personal information often easily accessible online due to variousdata brokers.[55]

See also

[edit]

References

[edit]
  1. ^S-W, C. (10 March 2014)."What doxxing is, and why it matters".The Economist. Retrieved5 January 2016.
  2. ^Goodrich, Ryan (2 April 2013)."What is Doxing?".Tech News Daily. Archived fromthe original on 29 October 2014. Retrieved24 October 2013.
  3. ^Chen, Mengtong; Cheung, Anne; Chan, Ko (14 January 2019)."Doxing: What Adolescents Look for and Their Intentions".International Journal of Environmental Research and Public Health.16 (2): 218.doi:10.3390/ijerph16020218.ISSN 1660-4601.PMC 6352099.PMID 30646551.
  4. ^Lever, Rob (16 December 2021)."What is Doxxing?".www.usnews.com.
  5. ^Bright, Peter (7 March 2012)."Doxed: how Sabu was outed by former Anons long before his arrest". Ars Technica. Retrieved23 October 2012.
  6. ^Clark Estes, Adam (28 July 2011)."Did LulzSec Trick Police Into Arresting the Wrong Guy? – Technology". The Atlantic Wire. Archived fromthe original on 29 October 2013. Retrieved23 October 2012.
  7. ^abcHonan, Mat (6 March 2014)."What Is Doxing?".Wired. Retrieved10 December 2014.
  8. ^Garber, Megan (6 March 2014)."Doxing: An Etymology".The Atlantic. Retrieved10 December 2014.
  9. ^American History: From Pre-Columbian to the New Millennium. Independence Hall Association.
  10. ^Carp, Benjamin L. (2012)."Terms of Estrangement: Who Were the Sons of Liberty?".Colonial Williamsburg. The Colonial Williamsburg Foundation. Retrieved10 July 2023.
  11. ^abcdefTiffany, Kaitlyn (22 April 2022)."'Doxxing' Means Whatever You Want It To".The Atlantic. Retrieved1 May 2022.
  12. ^Perry, David M. (17 August 2017)."Why It's Important to Name the Nazis".Pacific Standard. Retrieved5 January 2025.
  13. ^Tiffany, Kaitlyn (22 April 2022)."'Doxxing' Means Whatever You Want It To".The Atlantic. Retrieved24 October 2022.
  14. ^Bamford, James (17 November 2023)."Israel's War on American Student Activists".The Nation.Archived from the original on 18 November 2023. Retrieved18 November 2023.
  15. ^Nathan-Kazis, Josh (2 August 2018)."Canary Mission's Threat Grows, From U.S. Campuses To The Israeli Border".Forward. Retrieved16 September 2018.
  16. ^Okutan, Esma; Hernandez, Tristan (17 November 2023)."'Doxxing truck' appears on Yale's campus, displays student names and photos".Yale Daily News.Archived from the original on 18 November 2023. Retrieved18 November 2023.
  17. ^Bushard, Brian."'Doxxing Truck' Takes Columbia—Here's What To Know About The Trucks That Post Names Of Students".Forbes. Retrieved18 November 2023.
  18. ^"Harvard Student Groups Face Intense Backlash for Statement Calling Israel 'Entirely Responsible' for Hamas Attack | News | The Harvard Crimson".www.thecrimson.com. Retrieved19 January 2024.
  19. ^Ray, Owen."The Canary Mission's doxxing needs to stop".Massachusetts Daily Collegian.Archived from the original on 6 November 2023. Retrieved18 November 2023.
  20. ^Young, A. (2003).Non-Zero Sum Games and Survivable Malware. IEEE Systems, Man and Cybernetics Society Information Assurance Workshop. pp. 24–29.
  21. ^Young, Adam;Yung, Moti (2004).Malicious Cryptography: Exposing Cryptovirology. Indianapolis: Wiley.ISBN 0-7645-4975-8.
  22. ^Shivale, Saurabh Anandrao (2011). "Cryptovirology: Virus Approach".International Journal of Network Security & Its Applications.3 (4):33–46.arXiv:1108.2482.doi:10.5121/ijnsa.2011.3404.S2CID 424047.
  23. ^"California Penal Code 653y PC – Misusing 911".Shouse California Law Group shouselaw.com. 22 July 2022. Retrieved19 April 2023.
  24. ^"What to Know About Swatting".Time. Retrieved20 September 2021.
  25. ^"Love in an algorithmic age".www.kaspersky.com. Retrieved19 August 2022.
  26. ^Freed, Diana; Palmer, Jackeline; Minchala, Diana; Levy, Karen; Ristenpart, Thomas; Dell, Nicola (21 April 2018).""A Stalker's Paradise"".Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. CHI '18. New York, NY, USA: Association for Computing Machinery. pp. 1–13.doi:10.1145/3173574.3174241.ISBN 978-1-4503-5620-6.S2CID 5040372.
  27. ^Mix (16 October 2017)."Someone is blackmailing dark web users to pay up or get doxxed".The Next Web. Retrieved6 December 2017.
  28. ^Douglas, David M. (1 September 2016)."Doxing: a conceptual analysis".Ethics and Information Technology.18 (3):199–210.doi:10.1007/s10676-016-9406-0.ISSN 1572-8439.
  29. ^"Protect yourself from "Doxxing" | Office of Ethics".ethics.berkeley.edu. Retrieved2 June 2022.
  30. ^Newman, Lily Hay."What To Do If You've Been Doxed".Wired.ISSN 1059-1028. Retrieved1 May 2022.
  31. ^abHurst, Daniel; Taylor, Josh (12 February 2024)."Albanese government to propose legislation to crack down on doxing".The Guardian.ISSN 0261-3077. Retrieved14 February 2024.
  32. ^"Anthony Albanese wants stronger doxing laws. Experts aren't so sure".SBS News. Retrieved14 February 2024.
  33. ^Hanson, David (8 July 1996)."Drinking water act has bipartisan support".Chemical & Engineering News Archive.74 (28): 6.doi:10.1021/cen-v074n028.p006.ISSN 0009-2347.
  34. ^"Gesetzliche Lage".oesterreich.gv.at - Österreichs digitales Amt (in German). Archived fromthe original on 15 June 2024. Retrieved2 January 2025.
  35. ^ingrid.brodnig (27 April 2022)."#brodnig: Ich weiß, wo du wohnst!".www.profil.at (in German). Retrieved2 January 2025.
  36. ^"Was ist Doxing? | Beispiele und Tipps zum Schutz".sosafe-awareness.com (in German). Retrieved2 January 2025.
  37. ^"《网络信息内容生态治理规定》明确不得开展人肉搜索、流量造假等违法活动". 中国政府网. 新华社. 21 December 2019.Archived from the original on 23 November 2020. Retrieved29 February 2020.
  38. ^"Hong Kong introduces new legal amendments to outlaw doxxing".www.scmp.com. Retrieved31 July 2021.
  39. ^Schneider, Sören (8 November 2021)."Aktueller Begriff. Der strafrechtliche Schutz gegen sog. Feindeslisten nach § 126a StGB"(PDF).Bundestag.de (in German).Wissenschaftliche Dienste des Deutschen Bundestages. Retrieved12 January 2025.
  40. ^"Strafrechtelijke aanpak intimidatie door delen persoonsgegevens".www.rijksoverheid.nl. Retrieved22 March 2022.
  41. ^"Dutch Senate votes to make 'doxing' a crime".Reuters. 11 July 2023. Retrieved24 October 2023.
  42. ^"Doxing wordt binnenkort strafbaar, Eerste Kamer akkoord".RTL Nieuws (in Dutch). 11 July 2023. Retrieved24 October 2023.
  43. ^Ministerie van Justitie en Veiligheid (28 July 2023)."Wet van 12 juli 2023 tot wijziging van het Wetboek van Strafrecht, het Wetboek van Strafrecht BES, het Wetboek van Strafvordering en het Wetboek van Strafvordering BES in verband met de strafbaarstelling van het zich verschaffen, verspreiden of anderszins ter beschikking stellen van persoonsgegevens voor intimiderende doeleinden (strafbaarstelling gebruik persoonsgegevens voor intimiderende doeleinden)".zoek.officielebekendmakingen.nl (in Dutch). Retrieved4 January 2024.
  44. ^Eenennaam, Joanne van."Doxing is a crime ... What does that mean?".WiseMen Advocaten. Retrieved5 January 2025.
  45. ^"Dutch online archive identifies suspected Second World War Nazi collaborators".CTVNews. 2 January 2025. Retrieved5 January 2025.
  46. ^ab""Criminal liability for disseminating personal data on the Internet"".Official website of the Administration of Mozhaisk Oblast of Russia. 22 September 2023. Retrieved2 May 2024.
  47. ^ab"대한민국 영문법령".elaw.klri.re.kr. Retrieved1 August 2020.
  48. ^abcJefatura del Estado (24 November 1995),Ley Orgánica 10/1995, de 23 de noviembre, del Código Penal, pp. 33987–34058, retrieved19 August 2022
  49. ^Jurídicas, Noticias."El Tribunal Supremo considera delito difundir imágenes obtenidas con el permiso de la víctima que afectan gravemente a su intimidad · Noticias Jurídicas".Noticias Jurídicas (in Spanish). Retrieved19 August 2022.
  50. ^Lindvall 2019, pp. 3, 12
  51. ^abLindvall 2019, p. 8.
  52. ^abLindvall 2019, p. 9.
  53. ^abcLindvall 2019, p. 10.
  54. ^"50-state Survey: Doxing - Legal Protections for Public Health Officials: Doxing"(PDF).The Network For Public Health Law. December 2021. p. 2. Retrieved24 April 2025.
  55. ^Lee, Dave (4 January 2024)."US Must Stop 'Swatting' From Becoming an Election Weapon".Bloomberg News. Retrieved5 January 2024.

Sources

[edit]

External links

[edit]
  • The dictionary definition ofdox at Wiktionary
Types
Related topics
Types
Elements
Organizations
Experts
Academics
Activists
Actions
Notablesuicides
(List)
Murder–suicides
(incidents)
Related topics
Abuse
Map of the Internet
Chatspeak
Imageboard
Memes
Usenet
Retrieved from "https://en.wikipedia.org/w/index.php?title=Doxing&oldid=1287207179"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp