{"id":933,"date":"2011-01-10T10:00:14","date_gmt":"2011-01-10T16:00:14","guid":{"rendered":"http:\/\/thepizzy.net\/blog\/?p=933"},"modified":"2022-01-04T19:20:58","modified_gmt":"2022-01-05T01:20:58","slug":"how-to-find-yourself-online","status":"publish","type":"post","link":"https:\/\/thepizzy.net\/blog\/2011\/01\/how-to-find-yourself-online\/","title":{"rendered":"How to find yourself online"},"content":{"rendered":"\n<p>I&#8217;m sure at one point or another, everyone has done the &#8220;ego search.&#8221; You go to Google, type in your name, and see what comes up about you. From what I&#8217;m told, there&#8217;s even a fun ranking system based on the number of pages that show up about you.<\/p>\n\n\n\n<div class=\"wp-block-image size-full wp-image-1654\"><figure class=\"aligncenter\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"266\" data-attachment-id=\"1654\" data-permalink=\"https:\/\/thepizzy.net\/blog\/2011\/01\/how-to-find-yourself-online\/id-1001605881\/\" data-orig-file=\"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/01\/ID-1001605881.jpg?fit=400%2C266&amp;ssl=1\" data-orig-size=\"400,266\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;It&amp;#8217;s called an &amp;#8220;ego search&amp;#8221;&amp;#8230;&lt;\/p&gt;\n\" data-large-file=\"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/01\/ID-1001605881.jpg?fit=400%2C266&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/01\/ID-1001605881.jpg?resize=400%2C266\" alt=\"It's called an &quot;ego search&quot;...\" class=\"wp-image-1654\" srcset=\"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/01\/ID-1001605881.jpg?w=400&amp;ssl=1 400w, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/01\/ID-1001605881.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/01\/ID-1001605881.jpg?resize=150%2C100&amp;ssl=1 150w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><figcaption>It&#8217;s called an &#8220;ego search&#8221;&#8230;<\/figcaption><\/figure><\/div>\n\n\n\n<p>My real name has about a 6. My online alias is somewhere around 3300. Why?<\/p>\n\n\n\n<p>For reasons simple enough: I started my online life under an alias so that one of my sets of parents (the estranged ones) would not be able to find me, but I could still write and do whatever I wanted with my friends over the internet. Fortunately, this worked out in my favor years later when it came down to internet privacy.<\/p>\n\n\n\n<p>Unfortunately my real name did make it to the internet, and it came down to two reasons, one of which was my fault, the other was an uninformed elementary-school friend I had just found. I will discuss those reasons later on.<\/p>\n\n\n\n<p>Moving on.<\/p>\n\n\n\n<p>If for some reason you haven&#8217;t bothered to take a look at just what shows up for your name in a <a href=\"http:\/\/google.com\" target=\"_blank\" rel=\"noopener\">Google search<\/a>, you should go do that right now. I&#8217;ll wait.<\/p>\n\n\n\n<p>No, really&#8230;go do it.<\/p>\n\n\n\n<div class=\"wp-block-image wp-image-934 size-full\"><figure class=\"alignright\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"310\" height=\"387\" data-attachment-id=\"934\" data-permalink=\"https:\/\/thepizzy.net\/blog\/2011\/01\/how-to-find-yourself-online\/searching-man\/\" data-orig-file=\"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/12\/searching-man.jpg?fit=310%2C387&amp;ssl=1\" data-orig-size=\"310,387\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Searching\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Source: swcenter.fortlewis.edu&lt;\/p&gt;\n\" data-large-file=\"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/12\/searching-man.jpg?fit=310%2C387&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/12\/searching-man.jpg?resize=310%2C387\" alt=\"\" class=\"wp-image-934\" srcset=\"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/12\/searching-man.jpg?w=310&amp;ssl=1 310w, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/12\/searching-man.jpg?resize=240%2C300&amp;ssl=1 240w, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/12\/searching-man.jpg?resize=120%2C150&amp;ssl=1 120w\" sizes=\"auto, (max-width: 310px) 100vw, 310px\" \/><figcaption>Source: swcenter.fortlewis.edu<\/figcaption><\/figure><\/div>\n\n\n\n<p>What did you find? Were there any recognizable pages that were obviously about you? Did you put them there? Were they compiled by someone else? Was there any information on those pages that allowed for John Q. Stalker to help himself? If so, you probably need to either figure out how to protect the information on that page from prying eyes, or do what you can to take that page down.<\/p>\n\n\n\n<p>What about those of you who didn&#8217;t find anything&#8230;Why do you think that is? Do you do all your online business via an alias? Even if you don&#8217;t go by an alias most of the time, try searching for that alias and others that you use. Then, try searching for that alias and your first name&#8230;.then add your last name to it. What did you find? You probably found some pages where your &#8220;semi-anonymous&#8221; alias is linked to your real name. All it takes is one for the privacy to be broken.<\/p>\n\n\n\n<p>I&#8217;m sure there are a handful of you reading this thinking &#8220;Nope, I didn&#8217;t find anything under my name, and I don&#8217;t really have an online alias that I use everywhere, and the ones I do have are so common and\/or scarcely used that it would be difficult to pinpoint it to my real name.&#8221; Bravo to you for making it difficult to be found on the web. But there&#8217;s still one more thing&#8230;people searches.<\/p>\n\n\n\n<p>Lately, there has been a boom of People Search Engines. Sure, they&#8217;ve always been around in one form or another, starting with the White Pages in the phone book, which got online, and then grew from there. But these days, the technology behind them is much more sophisticated. These days, they crawl the internet for publicly available information, and store it up, keeping an associative record of what they found, and who it&#8217;s related to.<\/p>\n\n\n\n<p>So, if you think you&#8217;re safe from a Google Search, why don&#8217;t you give this a try&#8230;visit <a href=\"http:\/\/www.ussearch.com\/\" target=\"_blank\" rel=\"noopener\">here<\/a> and <a href=\"http:\/\/www.peopledata.com\/\" target=\"_blank\" rel=\"noopener\">here<\/a>, and just type in your first+last name, nothing else. Then scroll through the page until you find the entry that describes you. There&#8217;s about a 95% chance that it&#8217;s there. It may not be the most current, but the fact that the information they have is there is pretty unsettling in itself.<\/p>\n\n\n\n<p>Unfortunately, I&#8217;m not sure if there is any way to remove the information from those sites &#8211; however, there are ways to stop them from getting more information.<\/p>\n\n\n\n<p>This was just a glimpse at what&#8217;s out there. With some creative searching, all it takes is two pieces of information to find someone. With those pieces of information, the vault doors are blown off and all kinds of information is available about anyone who hasn&#8217;t taken the steps necessary to protect it: birthdays, family members, employers, addresses, home values, home floor plans, photos, license plates, drivers licenses, daily\/weekly schedules &amp; routines, favorite hangouts, alerts to the world about where they are (and aren&#8217;t), credit info, security questions for credit card applications, etc. Everything you could possibly want is potentially available online, if you know where to look.<\/p>\n\n\n\n<p>Hopefully by the end of this series, you&#8217;ll have prevented a majority of this information from making it into the hands of stalkers, identity thieves, and serial cyber-bullies, while still being able to have an online life. Meanwhile, you should probably go check the privacy settings on every site that you update information to, and make sure that it&#8217;s either &#8220;not public&#8221; or &#8220;friends only.&#8221; If you use location-updating&nbsp;services&nbsp;(Foursquare, Gowalla, Twitter, Facebook, etc) make sure that you never check in at home, of all places, and that your updates are available to only friends, and that you only have ACTUAL friends in your list &#8211; not just whomever wants to follow you. I&#8217;ll cover each of these types of services in future posts.<\/p>\n\n\n\n<p>The next post will talk about <a href=\"http:\/\/thepizzy.net\/blog\/2011\/01\/how-to-plug-your-personal-information-leaks\/\">self-inflicted information leaks<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I&#8217;m sure at one point or another, everyone has done the &#8220;ego search.&#8221; You go to Google, type in your name, and see what comes up about you. From what I&#8217;m told, there&#8217;s even a fun ranking system based on the number of pages that show up about you. My real name has about a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":934,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[506,706,528,3],"tags":[750,747,746,719,716,713,720,714,749,712,715,200,748],"class_list":["post-933","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-how-to","category-privacys-a-joke","category-security-tech","category-tech","tag-finding-personal-information","tag-how-do-i-find-myself-online","tag-how-to-find-yourslef-online","tag-online-bullying","tag-online-harassment","tag-online-privacy","tag-online-safety","tag-online-security","tag-people-searches","tag-privacy","tag-privacys-a-joke-2","tag-security","tag-what-information-is-available-about-me-online"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/12\/searching-man.jpg?fit=310%2C387&ssl=1","jetpack_likes_enabled":false,"jetpack_shortlink":"https:\/\/wp.me\/prOO4-f3","jetpack-related-posts":[{"id":858,"url":"https:\/\/thepizzy.net\/blog\/2010\/12\/privacys-a-joke-introduction\/","url_meta":{"origin":933,"position":0},"title":"Introduction to Privacy&#8217;s a Joke","author":"[[Neo]]","date":"December 27, 2010","format":false,"excerpt":"Privacy's a joke. Security is not. After dealing with online harassment for the first time on a third-party site, and with a person whose IP and other information I didn't readily have available as the Administrator of the site, I learned a lot from how they operate to how one\u2026","rel":"","context":"In &quot;Privacy's a Joke&quot;","block_context":{"text":"Privacy's a Joke","link":"https:\/\/thepizzy.net\/blog\/category\/security-tech\/privacys-a-joke\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/12\/dreamstime_4473313hello-my-name-iscropped1-300x203.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":977,"url":"https:\/\/thepizzy.net\/blog\/2011\/01\/how-to-plug-your-personal-information-leaks\/","url_meta":{"origin":933,"position":1},"title":"How to plug your personal information leaks","author":"[[Neo]]","date":"January 17, 2011","format":false,"excerpt":"If you don't know where your personal information could be leaked, you'll never know where to plug it. Here's some of the common holes.","rel":"","context":"In &quot;How To&quot;","block_context":{"text":"How To","link":"https:\/\/thepizzy.net\/blog\/category\/how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/01\/4199131336_63c0e1d1621-225x300.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1227,"url":"https:\/\/thepizzy.net\/blog\/2011\/03\/att-begins-service-to-text-users-in-certain-locations-nytimes-com\/","url_meta":{"origin":933,"position":2},"title":"AT&#038;T Begins Service to Text Users in Certain Locations","author":"[[Neo]]","date":"March 1, 2011","format":false,"excerpt":"According to the New York Times,\u00c2\u00a0AT&T is going to launch a text-message service to send SMS messages to customers in certain locations. Um, hell no! It's called \"ShopAlerts\" and is designed to allow \"brand-partners\" (i.e. HP, Kmart, JetBlue, S.C. Johnson, etc.) to send advertisements and coupons to customers who happen\u2026","rel":"","context":"In &quot;Privacy's a Joke&quot;","block_context":{"text":"Privacy's a Joke","link":"https:\/\/thepizzy.net\/blog\/category\/security-tech\/privacys-a-joke\/"},"img":{"alt_text":"Source: nytimes.com","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/03\/28Ads-blog4801.jpg?fit=480%2C304&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1058,"url":"https:\/\/thepizzy.net\/blog\/2011\/01\/configuring-your-facebook-application-security-settings\/","url_meta":{"origin":933,"position":3},"title":"Configuring your Facebook Application Security Settings","author":"[[Neo]]","date":"January 25, 2011","format":false,"excerpt":"One of the least-checked settings on Facebook, is the permissions you've given every app\/game\/quiz you've ever used with the site.","rel":"","context":"In &quot;How To&quot;","block_context":{"text":"How To","link":"https:\/\/thepizzy.net\/blog\/category\/how-to\/"},"img":{"alt_text":"Facebook Security Logo - Source: allfacebook.com","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/02\/facebook-sec-logo1-116x150.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1095,"url":"https:\/\/thepizzy.net\/blog\/2011\/02\/using-friend-lists-for-facebook-privacy\/","url_meta":{"origin":933,"position":4},"title":"Using Friend Lists for Facebook Privacy","author":"[[Neo]]","date":"February 7, 2011","format":false,"excerpt":"To achieve a more granular level of privacy on Facebook, you can create Custom Friend Lists and use them in your privacy settings","rel":"","context":"In &quot;How To&quot;","block_context":{"text":"How To","link":"https:\/\/thepizzy.net\/blog\/category\/how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/02\/2011-02-02_1531.png?fit=1002%2C636&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/02\/2011-02-02_1531.png?fit=1002%2C636&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/02\/2011-02-02_1531.png?fit=1002%2C636&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/02\/2011-02-02_1531.png?fit=1002%2C636&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":881,"url":"https:\/\/thepizzy.net\/blog\/2011\/01\/how-to-handle-online-harassment-cyber-stalking\/","url_meta":{"origin":933,"position":5},"title":"How to Handle Online Harassment &#038; Cyber Stalking","author":"[[Neo]]","date":"January 3, 2011","format":false,"excerpt":"About 15 years ago, having an email address and\/or an instant messenger screen name meant you were riding the cutting edge of the internet. A couple of years after that, the hot trend was having a MySpace profile. Today, it's generally assumed that everyone has at least a Twitter account\u2026","rel":"","context":"In &quot;How To&quot;","block_context":{"text":"How To","link":"https:\/\/thepizzy.net\/blog\/category\/how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/01\/griefer.png?fit=720%2C540&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/01\/griefer.png?fit=720%2C540&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/01\/griefer.png?fit=720%2C540&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/01\/griefer.png?fit=720%2C540&ssl=1&resize=700%2C400 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/posts\/933","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/comments?post=933"}],"version-history":[{"count":13,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/posts\/933\/revisions"}],"predecessor-version":[{"id":2378,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/posts\/933\/revisions\/2378"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/media\/934"}],"wp:attachment":[{"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/media?parent=933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/categories?post=933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/tags?post=933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}