Category: Data Privacy
-

The 15 Most Infamous Streamer/Influencer Doxxings
Doxxing turned into a distinct and dangerous tool in online culture because creators often publish a lot of personal information to build a fanbase. That public footprint makes it easier for bad actors to locate and weaponize phone numbers, addresses, or private images. When an influencer is doxxed the result can be persistent harassment, swatting,…
-

70,000+ Government IDs Leaked in Discord x Zendesk Breach
Story summary: Customer support data tied to Discord was exposed after a Zendesk vendor account was compromised. Leaked items include uploaded documents and attachments, including government ID images for account appeals. Impact review is ongoing while Discord contacts affected users and rotate internal credentials. What’s next? Watch for official notices sent to your account email…
-

Australia’s Under-16 Social Media Ban
Australia is rolling out a national rule that blocks under-16s from using mainstream social platforms starting in December, called the Online Safety Amendment Bill & targeting the Online Safety Act, legislated in 2021. The law passed in November 2024 and is being watched globally, with leaders in New York praising Australia’s approach during UN events,…
-

How to Delete All Your Tweets / X Posts
Cleaning up your Twitter history can be essential for maintaining your privacy and presenting your best self online. Here’s a detailed guide to help you delete all your tweets efficiently. The process for this is a little different depending on how many tweets you have. If you have over 1k tweets to delete, use step…
-

How To Bulk Unfollow Twitter/X Accounts
Getting a clean start on Twitter is not only about old posts. Resetting your followed accounts can refresh your online presence. Redact gives you precise control so you decide how far to go. Your follower list shapes more than your timeline. The people who you follow help the platform categorize your account, build lookalike audiences,…
-

UK Social Media Laws – Are People Being Arrested for Posts?
—
by
In short: Police in the UK continue to arrest people for online posts that are reported as threatening, harassing, or grossly offensive. Cases are commonly brought under communications and public order laws, including offenses tied to harassment, malicious communications, and hate incidents. Arrests often begin with a user report, followed by platform referrals or local…
-

Should the Government Regulate Social Media?
—
by
Social media platforms have gone from being casual hangouts to global powerhouses that shape the way people think, vote, shop, and communicate. Billions of users log in to share opinions, consume information, and interact with communities that transcend borders. In many ways, these platforms now serve as the digital public square. But with this level…
-

Phrack Journalists Suspended from Proton Mail
Two Proton Mail accounts used by journalists working for cybersecurity publication Phrack were suspended after Proton received an alert from a cybersecurity response team. The accounts were later restored after a public outcry, but questions remain about the trigger, the appeals process, and how Proton evaluates these cases. Phrack is a digital magazine written for…
-

Data Brokers 101: What They Are and How to Protect Your Info
Data brokers, at a glance What they do: collect and package personal data into profiles sold to marketers, risk teams, and others. Where data comes from: public records, apps, websites, location services, and retail purchases. Why it matters: fuels identity theft risk, discriminatory decisions, hyper-targeting, and exposure. Do this now: enable tracker blocking and a…
-

FTC Targets Facebook: Is Your Family’s Data Building Unsafe AI Worlds for Your Child?
Children’s data and AI FTC opens 6(b) inquiry into AI companion chatbots September 11, 2025 The Federal Trade Commission issued compulsory 6(b) orders to seven firms that run consumer AI chatbots, seeking details on testing for youth harms, guardrails for teen use, data handling, and monetization practices. Sources are listed at the end of this…
