Doxxing is intentionally researching and broadcasting personally identifiable information about an individual with the intent and purpose of having law enforcement called on them for spurious reasons.
The doxxing term is derived from “dropping dox” or “documents,” and it refers to the malicious practice of researching, collecting, and publicly disclosing someone’s personal and private information without their consent. This information can include home addresses, phone numbers, email addresses, social security numbers, or any other data that can compromise an individual’s privacy.
The intent behind doxxing is often to intimidate, harass, shame, or exact revenge on the target by exposing them to potential threats, unwanted contact, or public scrutiny.
The act of doxxing can have serious repercussions, not just infringing on an individual’s privacy but also potentially leading to real-world consequences such as stalking, identity theft, and physical harm. In the digital age, where vast amounts of personal data can be found online, doxxing has become a significant concern.
The ease with which personal information can be gathered and disseminated across various platformsβsocial media, forums, and websitesβamplifies the risks associated with this invasive act, making digital literacy and privacy protection more crucial than ever.
What I do when I have compromising files to hide is I distribute them evenly across 3 different laptops and ensure that all 3 highly reliable βworks for decadesβ Apple machines go kaput at the same exact time, at which point I leave my home and fly across the country to a jurisdiction patrolled by Rudy Giuliani to service these machines and perform data recovery because I am looking to add maximum inconvenience to my very busy life β a life so busy that I completely forget about my 3 precious laptops which once contained both my livelihood and my most deeply personal and secret materials.
When usability pioneers have All the Feels about the nature of our creeping technological dystopia, how we got here, and what we might need to do to right the ship, it’s wise to pay attention. Don Norman’s preaching resonated with my choir, and they’ve asked me to sing a summary song of our people in bulleted list format:
What seemed like a virtuous thing at the time — building the internet with an ethos of trust and openness — has led to a travesty via lack of security, because no one took bad actors into account.
Google, Facebook, et al didn’t have the advertising business model in mind a priori, but sort of stumbled into it and got carried away giving advertisers what they wanted — more information about users — without really taking into consideration the boundary violations of appropriating people’s information. (see Shoshana Zuboff’s definitive new book on Surveillance Capitalism for a lot more on this topic)
Tech companies have mined the psychological sciences for techniques that — especially at scale — border on mass manipulation of fundamental human drives to be informed and to belong. Beyond the creepy Orwellian slant of information appropriation and emotional manipulation, the loss of productivity and mental focus from years of constant interruptions takes a toll on society at large.
We sign an interminable series of EULAs, ToS’s and other lengthy legalese-ridden agreements just to access the now basic utilities that enable our lives. Experts refer to these as “contracts of adhesion” or “click-wrap,” as a way of connoting the “obvious lack of meaningful consent.” (Zuboff)
The “bubble effect” — the internet allows one to surround oneself completely with like-minded opinions and avoid ever being exposed to alternative points of view. This has existential implications for being able to inhabit a shared reality, as well as a deleterious effect on public discourse, civility, and the democratic process itself.
The extreme commercialization of almost all of our information sources is problematic, especially in the age of the “Milton Friedman-ification” of the economic world and the skewing of values away from communities and individuals, towards a myopic view of shareholder value and all the attendant perverse incentives that accompany this philosophical business shift over the past 50 years. He notes that the original public-spiritedness of new communication technologies has historically been co-opted by corporate lobbyists via regulatory capture — a subject Tim Wu explores in-depth in his excellent 2011 book, “The Master Switch: The Rise and Fall of Information Empires.“
Is it all bleak, Don?! His answer is clear: “yes, maybe, no.” He demurs on positing a definitive answer to all of these issues, but he doesn’t really mince words about a “hunch” that it may in fact involve burning it all down and starting over again.
Pointing to evolution, Norman notes that we cannot eke radical innovation out of incremental changes — and that when radical change does happen it is often imposed unexpectedly from the outside in the form of catastrophic events. Perhaps if we can’t manage to Marie Kondo our way to a more joyful internet, we’ll have to pray for Armageddon soon…?! π±
I still see a lot of denialism on this point about the DNC email hacks from the far-left (or the alt-left, depending on your favored terminology), which is a bit devastating to see as it essentially parrots the pro-Russian ideology of the far-right (both the alt-right and the neo-libertarian flavors). Green Party candidate Jill Stein is an especially pernicious promoter of this myth that Vladimir Putin is a poor, innocent, peaceful world leader who is being bullied by NATO (when in fact, Russia has been the aggressor since its annexation of Crimea in 2014).
DNC email hacks forensic evidence
Two separate Russian-affiliated adversaries were behind the attacks, according to a post-mortem by cyber-security firm CrowdStrike when the news of the intrusion first broke in early June, 2016. This has since been confirmed by other independent security firms including Fidelis, Mandiant, SecureWorks, and ThreatConnect as well as corroborated by analysis from Ars Technica and Edward Snowden.
At this point the US intelligence community is confident enough to formally accuse Russia of involvement in the hacks, and are currently investigating other breaches of voter registration databases in Arizona and Illinois as well as in Floridaβββthe key battleground state from the 2000 election that handed GWB an unfortunate victory. Elsewhere, there is ample evidence of Putinβs extensive disinformation campaign being waged online (including several experiences I have myself witnessed), which is the continuation of a long through line of wielding propaganda as a tool from the former head of the KGB.
A RussiaGate Bestiary: Principal actors and related extras in the 2016 election scandal
The Russian Mafia State: How the former USSR has become a sclerotic kleptocracy under the rule of former KGB agent Vladimir Putin, who vowed revenge on the West after his station in Dresden, East Germany was overrun by angry citizens during the month leading up to the fall of the Berlin Wall.
Clinton restored the stature of American diplomacy around the world. Trump asked Russia to find her hacked emails and interfere with the US presidential election.