Thread:
Recently, doxing of IMT has become a tool to suppress vocal Muslim voices, with rival Sanghis doxing those who hold opposing views. Doxers aim to escalate their conflict with targets from online to the real world, by revealing personal information which includes:1/n
1. Home addresses
2. Workplace details
3. Personal phone numbers
4. Social security numbers
5. Bank account or credit card information
6. Private correspondence
7. Criminal history
8. Personal photos
9. Embarrassing personal details 2/n
Suspension methods used
1. Dig up old tweets to see clues
2. Mark tweets which violate twitter terms and mass report
3. Agent provocateur - Use of trolls to incite to say something that violates twitter policy. 3/n
Doxing methods used:
1. Usage of twitter archive to keep track of a target account. It saves even deleted tweets. After the identity is known, the archived tweets (even if you deleted them) are used to report to goverment, police, employer etc 4/n
2. Social Engineering; Social Engineering is a manipulation technique that exploits human error or friendliness to gain private information. An agent acts as friendly and then lures the unsuspecting person into exposing their own data or their data from someone else. 5/n