Live Reconnaissance Demo
Watch as we demonstrate how easily public information can be weaponized—and how we delete it.
(Subject data in video has been redacted for privacy).
The "Dox" Workflow Explained
In the video above, you saw a standard Level 1 OSINT Scan. Here is what we found using only an email address:
-
⚠️ Physical Location:
Found via a 2018 voter registration record on a public people-search site.
-
⚠️ Passwords:
Found 3 compromised passwords from an old LinkedIn data breach.
-
⚠️ Family Ties:
Mapped the subject's spouse and children using Facebook "Likes" and tagged photos.
The Consequences of Inaction
If this data remains public, the subject is vulnerable to:
-
Spear Phishing:
Emails that look real because they know your schedule.
-
Swatting/Stalking:
Physical threats arriving at your doorstep.
-
Identity Theft:
Opening loans in your name using exposed PII.