Note to Reader:
At ALCCA, we remain committed to providing the in-depth legal analysis and advocacy-related articles that our readers have come to expect. In addition, in 2025, we are excited to launch a new resources section on our website, offering educational and tactical resources to support our community in the fight against antisemitism. This article is part of that new initiative, equipping you with practical ways to safeguard your privacy and security while being an active member / subscriber of ALCCA.
This article is Part 1 of a two-part series on doxxing. Stay tuned for Part 2, where we’ll explore the availability of the criminal law in circumstances where you have been doxxed or social media has been misused to harass or demonized you.
Introduction: Understanding Doxxing
Doxxing, short for "dropping documents," is the malicious act of publicly sharing an individual's private information online without their consent, often with the intent to intimidate, harass, or threaten them. This information can include home addresses, phone numbers, workplace details, or other identifying data. Individuals advocating against antisemitism are especially vulnerable to this tactic, with personal contact details leaked online often resulting in coordinated harassment campaigns or even threats against them and their families.
As the fight against antisemitism in Canada continues into 2025, many of those leading this crucial cause have faced the challenges of being doxxed. These incidents not only aim to silence advocacy but also create barriers to participation and foster a climate of fear.
Doxxing can lead to harassment, threats, and other serious consequences, making it critical to take proactive steps to protect your privacy and security.
Here are nine key ways you can safeguard yourself:
1. Limit Personal Information Online
One of the most effective ways to protect yourself from doxxing is by minimizing the personal information you share online. This includes details like your home address, phone number, and even your date of birth.
Social media platforms often encourage users to fill out extensive profiles, but it’s essential to use privacy settings to control who can view your information. Limiting access to your posts and personal details can reduce the likelihood of malicious actors finding sensitive information about you.
2. Use Secure, Unique Passwords
Passwords are your first line of defence against unauthorized access to your online accounts. Using strong, unique passwords for each account can significantly reduce the risk of being hacked. A secure password should include a combination of uppercase and lowercase letters, numbers, and special characters.
Managing multiple complex passwords can be challenging, but password managers make this process much easier. These tools securely store your passwords and can even generate strong, unique ones for each of your accounts. Some highly recommended password managers include:
NordPass: From the makers of NordVPN, this password manager focuses on simplicity and security. It offers an intuitive design and advanced encryption to keep your data safe.
Dashlane: Known for its user-friendly interface and robust security features, Dashlane also includes a password health checker and dark web monitoring in its premium plans.
1Password: 1Password allows you to share login credentials securely while maintaining individual accounts. It includes features like travel mode, which hides sensitive data when crossing borders.
3. Enable Two-Factor Authentication (2FA)
Adding an extra layer of security to your accounts through two-factor authentication (2FA) can be a game-changer. With 2FA, even if someone gains access to your password, they would still need a secondary verification method, such as a code sent to your phone or email.
Many online services, including social media platforms, email providers, and financial institutions, offer 2FA as an option, and enabling it wherever possible is a critical step in safeguarding your accounts.
For a helpful guide to setting up 2FA on your various accounts, read ‘How to Set Up Multi-Factor Authentication and Safeguard Your Online Accounts’.
4. Regularly Search for Your Information
Conducting periodic searches of your name, email address, and phone number can help you monitor what personal information is publicly available about you. Search engines like Google can provide insights into any personal details that might have been exposed. Setting up Google Alerts for your name or other identifying information can help you stay informed about new mentions of your data online, allowing you to take prompt action if necessary.
Here’s how to take a thorough and proactive approach:
a) Conduct Manual Searches
Start by performing periodic searches of your name, email address, phone number, and other personal details on major search engines like Google, Bing, and DuckDuckGo. Use variations of your name, including nicknames and common misspellings, to ensure a comprehensive search. Don’t forget to search for your social media usernames and professional profiles, as these can also be linked to personal information.
b) Use Reverse Image Search
Photos can sometimes reveal more about you than you realize. Use tools like Google Reverse Image Search or TinEye to see where your images may have been posted online. Metadata in photos (like geotags) can inadvertently expose your location, so check whether your photos have been shared on sites you don’t recognize or authorize.
c) Set Up Automated Alerts
Google Alerts is a free tool that allows you to monitor new mentions of your name, email address, or other keywords. To set it up:
Go to Google Alerts
Enter the keywords you want to track (e.g., your name, email, or username)
Adjust the frequency and type of results you want to receive (e.g., only news articles or all web content)
Add your email address to receive notifications
5. Be Cautious with Email Communication
Emails are a common entry point for phishing attacks and other malicious activities. To protect yourself, consider using a dedicated email address specifically for your advocacy work. This helps separate your professional and personal communications, reducing the likelihood of your personal email being exposed.
Avoid sharing your primary email address on public forums, websites, or directories, as these can be easily accessed by malicious actors.
You should also be vigilant about phishing emails, which are designed to trick you into revealing sensitive information or downloading malicious attachments. To spot and avoid phishing attempts:
Look for generic greetings like “Dear User” or suspicious sender addresses.
Avoid clicking on links or downloading attachments from unknown senders.
Hover over links to see their actual destination before clicking.
Double-check emails claiming to be from financial institutions, government agencies, or other trusted entities by contacting them directly through verified channels.
6. Mask Your IP Address
Your IP address can reveal your approximate location and online activity, making it a potential target for those looking to doxx you.
Using a Virtual Private Network (VPN) can help mask your IP address and encrypt your internet connection, ensuring greater anonymity and security. This is particularly important when engaging in advocacy work or accessing the internet from public Wi-Fi networks, which are often less secure.
For a comprehensive guide on VPNs and how to select the best one for you, read ‘Why You Need a VPN, and How to Choose the Right One’ .
7. Be Mindful of Social Media Posts
Social media platforms can unintentionally expose sensitive details about your life. For example, posting in real-time about your current location or sharing photos with metadata intact can provide malicious actors with valuable information.
To mitigate these risks, avoid sharing your whereabouts in real-time and use tools to remove metadata from images before uploading them.
How to Remove Metadata:
On Windows:
Right-click the image file and select Properties.
Navigate to the Details tab.
Click Remove Properties and Personal Information.
Select Create a copy with all possible properties removed or choose specific metadata to remove.
On macOS:
Open the photo in Preview.
Go to Tools > Show Inspector.
Select the Info tab and then GPS to view location data.
Click Remove Location Info.
Using Apps: Apps like Photo Exif Editor (available for Android) or ImageOptim (for Mac) can also help remove metadata in bulk.
On Smartphones:
On Android: Simply adjust the settings in your gallery app to strip metadata.
Open the Photos app, then tap Albums.
Tap the Places album, then do one of the following:
If you want to review the photos respecting a specific time period, tap Grid to view in chronological order.
If you want to review by location taken, tap Map to view by location.
Open the photo you want to remove location metadata from, then tap the Info button or swipe up.
You see an image in the Maps app showing where the photo was taken.
To remove the location metadata, tap Adjust, then tap Remove Location.
Being selective about what you post can go a long way in protecting your privacy.
8. Avoid Using Your Personal Address for Advocacy
Sharing your home address for advocacy-related activities can expose you to unnecessary risks.
Instead, use the address of your organization, or a P.O. Box, for any mail correspondence or public-facing needs. By keeping your home address private, you reduce the chances of it being used maliciously against you, either through doxxing or other forms of harassment.
9. Educate Yourself on Cybersecurity
Staying informed about the latest cybersecurity threats and solutions can help you take proactive measures to protect yourself. There are many online resources, courses, and experts available to help you understand advanced risks and how to counter them.
Here are a few helpful ones:
Looking Ahead: What to Do If You’re Doxxed
In Part 2 of this series, we will explore actionable strategies for responding to doxxing, including how to report incidents and, seek support.
It must be recognized that doxxing does not represent the only way in which social media is misused to attack advocates against antisemitism. In Part 2, Rochelle Direnfeld, former senior Crown counsel, most recently specializing in hate-motivated crimes, will explain how doxxing and other malicious uses of social media designed to demonize advocates combatting antisemitism can amount to crimes and how to address these crimes when they occur.
Standing Strong in the Face of Adversity
The courage to stand against antisemitism is vital for creating a more inclusive and respectful society. By implementing these preventative measures, you can continue this important work with greater peace of mind and security.
For additional resources or support, connect with organizations specializing in cybersecurity or advocacy support networks.