Welcome to Mobilarian Forum - Official Symbianize forum.

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

How does doxxing people work

OP
T 0

ToyedSpice

Transcendent
BANNED
Member
Access
Joined
Jul 19, 2023
Messages
37
Reaction score
11
Points
8
grants
₲192
1 years of service
I've been curious on how they steal your info. Do you need a program or an engine to do it? Sorry im not tech savvy Just asking
 
K 0

KatzSec DevOps

Alpha and Omega
Philanthropist
Access
Joined
Jan 17, 2022
Messages
857,223
Reaction score
8,554
Points
83
grants
₲59,225
3 years of service
ToyedSpice Next time always upload your files sa
Please, Log in or Register to view URLs content!
para siguradong di ma dedeadlink.

*Please Disable your adblock when visiting katz.to to keep us running forever.
 
H 0

hero04

Transcendent
BANNED
Member
Access
Joined
Jul 22, 2023
Messages
34
Reaction score
0
Points
6
grants
₲106
1 years of service
I've been curious on how they steal your info. Do you need a program or an engine to do it? Sorry im not tech savvy Just asking
Not really pede mo naman makuha ng isang tao gamit mga ganun. May social engineering din.
 
S 0

syndie

Abecedarian
BANNED
Member
Access
Joined
Aug 19, 2023
Messages
63
Reaction score
2
Points
8
grants
₲203
1 years of service
I've been curious on how they steal your info. Do you need a program or an engine to do it? Sorry im not tech savvy Just asking
typically, through phone calls, social engineering, malicious links that opens a web page and downloads thru your computer, maybe they use hardware upto ten feet to get your card or breaking in to your zombie device (example computer) and operate your machine from thre
 
B 0

birdiestorm

Abecedarian
Member
Access
Joined
Sep 13, 2023
Messages
55
Reaction score
9
Points
8
grants
₲167
1 years of service
The information is usually obtained through online research, social engineering, or hacking.
Or even data leaks from the government, such as voter data. Got to admit, data protection in countries like Southeast Asia is still very weak.
 
Top Bottom