{"id":25185,"date":"2021-09-15T12:22:41","date_gmt":"2021-09-15T20:22:41","guid":{"rendered":"https:\/\/www.spokeo.com\/compass\/?p=25185"},"modified":"2022-04-13T12:23:01","modified_gmt":"2022-04-13T20:23:01","slug":"is-your-online-identity-safe","status":"publish","type":"post","link":"https:\/\/www.spokeo.com\/compass\/is-your-online-identity-safe\/","title":{"rendered":"How Secure Is Your Online Identity?  The Answer Might Alarm You"},"content":{"rendered":"\n<p>\u201cWho am I, really?\u201d is a question philosophers have wrestled with for thousands of years.&nbsp; In a practical way it\u2019s also a very modern question:&nbsp; Your electronic presence and activities add up to an entire online identity, or \u201c<a href=\"https:\/\/www.spokeo.com\/compass\/how-to-protect-your-digital-footprint\/\">digital footprint<\/a>.\u201d&nbsp; That online identity isn\u2019t <em>exactly<\/em> the same person you are, but everyone from giant tech corporations to shady scam artists will try to leverage it in ways that affect your real-world well-being.&nbsp;<\/p>\n\n\n\n<p>You could think of your online identity as being like a shadow.&nbsp; It\u2019s a (somewhat) distorted representation that follows you around, which tells observers enough real things about you to be useful.&nbsp; Keeping your online identity safe from ill-intentioned eyes requires some work and vigilance on your part, but you can (and arguably should) keep your digital \u201cshadow\u201d as small and well-guarded as possible.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Your Online Identity Is Constructed<\/h2>\n\n\n\n<p>Here\u2019s an exercise to try:&nbsp; Open your browser history right now, and look at how many sites you\u2019ve visited in the last week (the shortcut is Ctrl-H in Chrome or Ctrl-Shift-H in Firefox, or use the browser menu in Android or iOS).&nbsp; It probably runs into the hundreds, and that\u2019s not counting the interactions you\u2019ve had with the various apps on your devices.&nbsp;<\/p>\n\n\n\n<p>Every one of those sites, and every one of those interactions, creates a record.&nbsp; That\u2019s actually an understatement; if you click through the Cookie Policy and Privacy Statement links on most sites you\u2019ll see that they may share their visitors\u2019 data with <em>hundreds<\/em> of partners.&nbsp; Now imagine you\u2019ve made a purchase through a \u201cmarketplace seller\u201d on Amazon:&nbsp; The vendor sees your name and address; Amazon sees the same; your bank or credit card provider sees a transaction; the delivery company gets your name and address; and all of that is recorded somewhere.&nbsp;<\/p>\n\n\n\n<p>So are more traditional records, from property ownership to births and deaths, marriages and divorces.&nbsp; Those are digitized now and kept on electronic databases, where some information requires secure (or paid) access, but some is publicly visible.&nbsp; Taken together, these commonplace pieces of information can create a surprisingly detailed picture of your life and habits.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Some Deeper Contributors to Your Online Identity<\/h2>\n\n\n\n<p>As the late-night infomercials are fond of saying, \u201cBut wait!&nbsp; There\u2019s more!\u201d&nbsp; Most of us carry a phone everywhere we go, and many of us wear a smartwatch or fitness band as well.&nbsp; Those devices are filled with sensors including altimeters, accelerometers and GPS, which monitor where you are and what you\u2019re doing in real time.&nbsp; Phones are always in contact with cellular towers and exchange \u201chandshaking\u201d data with any wireless networks that come within range.&nbsp;<\/p>\n\n\n\n<p>Taken together, that information can help identify you and pinpoint your location even if it has been \u201canonymized\u201d to meet privacy standards.&nbsp; Your phone carrier has access to much of that information; Google and Apple see it through your phone\u2019s operating system; and the developers of your apps may have access to a lot of it as well (have you checked the permissions on <em>all<\/em> of your installed apps?&nbsp; No?&nbsp; Didn\u2019t think so\u2026).&nbsp;<\/p>\n\n\n\n<p>These are less obvious contributors to your online identity, though in some ways they\u2019re more revealing than the ones you\u2019d normally think of.&nbsp; Remember, these are just the details you generate through normal day-to-day life.&nbsp; We haven\u2019t even <em>gotten<\/em> to the dicey parts, yet.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Information You Volunteer<\/h2>\n\n\n\n<p>Now think about the information you share voluntarily on social media or special-interest forums.&nbsp; How long would it take for someone following you on social media to figure out your mom\u2019s maiden name, your birth date, your first pet\u2019s name or answers to any of the other common identity verification questions?&nbsp; If you\u2019ve mostly nodded and shrugged up to this point, that question should make you stop and think.&nbsp;<\/p>\n\n\n\n<p>The photos you post tell a lot about you, too.&nbsp; Unless you tweak your settings and tell it not to, your phone (and some stand-alone cameras) will embed a timestamp and GPS location as part of the data in every picture.&nbsp; They\u2019ll tell anyone who\u2019s interested not just what you (and your kids, your parents and your pets) look like, but exactly where you were and when you were there.&nbsp; You don\u2019t need to be especially paranoid to find that disconcerting and worrisome.&nbsp;<\/p>\n\n\n\n<p>Finally, every place you set up a \u201cfree account\u201d or \u201cfree membership\u201d to access content or make purchases asks for some of your personal information, whether or not you subsequently use the site or buy from them.&nbsp; All of these information sources \u2014 taken together \u2014 say a lot about you, and sometimes that information can be misconstrued or misused to your detriment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Algorithmic \u201cBlack Box\u201d<\/h2>\n\n\n\n<p>There\u2019s a popular joke that says, \u201cTo err is human&#8230;to <em>really<\/em> screw up requires a computer.\u201d&nbsp; It\u2019s true, to an extent:&nbsp; At root, it\u2019s still human error, because computers are only as good as the humans creating and programming them.&nbsp; From a cynic\u2019s perspective, computers just help us make bigger mistakes and do it more quickly.&nbsp; That\u2019s alarming when you realize that computers aren\u2019t just collecting and collating our data \u2014 increasingly they\u2019re <a href=\"https:\/\/qz.com\/1525661\/your-digital-identity-has-three-layers-and-you-can-only-protect-one-of-them\/\">making decisions about us<\/a> based on the data they\u2019ve collected.&nbsp;<\/p>\n\n\n\n<p>Machine learning and AI in general are among the hottest priorities in the business world right now.&nbsp; Companies are beginning to use these tools to decide who gets hired, who gets health coverage, who qualifies for a loan, and many other things that used to be decided by humans.&nbsp; The problem is that the algorithms can create unexpected and undesirable results because of errors or unconscious biases coded into them.&nbsp; Amazon experimented with an algorithm to remove bias from the hiring process, for example, which <a href=\"https:\/\/www.reuters.com\/article\/us-amazon-com-jobs-automation-insight\/amazon-scraps-secret-ai-recruiting-tool-that-showed-bias-against-women-idUSKCN1MK08G\">famously backfired<\/a> and increased it.&nbsp; Similar flaws have turned up in algorithms for <a href=\"https:\/\/www.csis.org\/blogs\/technology-policy-blog\/problem-bias-facial-recognition\">facial recognition<\/a> <a href=\"https:\/\/www.whitecase.com\/publications\/insight\/algorithms-and-bias-what-lenders-need-know\">and loans<\/a>, among others.&nbsp; If you\u2019ve been told recently that you \u201cdon\u2019t fit the profile we\u2019re looking for,\u201d this might be why.<\/p>\n\n\n\n<p>&#8230;And so far, we\u2019ve only talked about the <em>legitimate<\/em> collection and use of your data.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">If Your Online Identity Is Compromised<\/h2>\n\n\n\n<p>At home you have locks on your doors, blinds over your windows and possibly an alarm system or \u201csmart\u201d internet-connected cameras to record intruders.&nbsp; You may have a hiding place for your checkbook and your good jewelry, and perhaps lock away valuables in a safe or safe deposit box.&nbsp; You probably screen your phone calls as well, and exercise some degree of control over who enters your home or your yard.&nbsp; Yet many people don\u2019t have nearly the same concern for their online security, on the basis that, \u201cI have nothing to hide.\u201d&nbsp;<\/p>\n\n\n\n<p>The truth is that keeping your online identity safe is much, much more important than locking your doors.&nbsp; Most TVs, phones or computers could be replaced for $1,000 or less, but someone stealing your identity online could max out your credit, or take your entire life\u2019s savings, in a relative heartbeat.&nbsp;<\/p>\n\n\n\n<p>Want a sobering reality check?&nbsp; Spend a few minutes reading the FTC\u2019s <a href=\"https:\/\/www.consumer.ftc.gov\/blog\/2021\/02\/top-frauds-2020\">consumer fraud blog<\/a> or browsing the Better Business Bureau\u2019s <a href=\"https:\/\/www.bbb.org\/scamtracker\">Scam Tracker database<\/a> or the FBI\u2019s annual <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf\">Internet Crime Report<\/a>.&nbsp; It\u2019s best not to do this during your work week, because you might not sleep very well for the next few nights.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Signs To Watch For<\/h2>\n\n\n\n<p>There are literally thousands of ways your identity might be compromised, from <a href=\"https:\/\/www.zdnet.com\/article\/the-biggest-hacks-data-breaches-of-2020\/\">a hack<\/a> (or just plain <a href=\"https:\/\/arstechnica.com\/information-technology\/2020\/09\/100000-razer-users-data-leaked-due-to-misconfigured-elasticsearch\/\">bad security<\/a>) at a website to <a href=\"https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails\/\">phishing attacks<\/a> or <a href=\"https:\/\/www.spokeo.com\/compass\/the-5-most-common-phone-scams-of-2019\/\">phone scams<\/a> and more.&nbsp; However it happens, there are a number of fairly <a href=\"https:\/\/www.spokeo.com\/compass\/7-signs-of-identity-theft\/\">consistent signs<\/a> that can tell you you\u2019ve got a problem.&nbsp;<\/p>\n\n\n\n<p>Most of them aren\u2019t exactly rocket science:&nbsp; Unexplained charges on your credit card or bank statements, weird fluctuations in your credit score, credit applications or insurance claims being inexplicably refused and so on.&nbsp; As with cancer, early detection is critical to minimize the damage from identity theft.&nbsp; Keeping a diligent eye on your accounts certainly helps.&nbsp;<\/p>\n\n\n\n<p>You can also proactively take steps to protect your online identity.&nbsp; One is by making use of the <a href=\"https:\/\/help.spokeo.com\/hc\/en-us\/articles\/360046318774-What-will-I-get-\">dark web monitoring<\/a> that\u2019s included with select Spokeo subscriptions.&nbsp; The so-called dark web is the sketchy side of the internet where stolen identities are bought and sold, so knowing that your information is for sale\u2014- <em>before<\/em> it\u2019s misused by scammers \u2014 is a priceless heads-up.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How To Protect Your Online Identity<\/h2>\n\n\n\n<p>There are several other common-sense steps you can take to protect your online identity and <a href=\"https:\/\/www.spokeo.com\/compass\/reduce-erase-digital-footprint\/\">reduce your digital footprint<\/a>.&nbsp; A logical starting point is using Spokeo\u2019s <a href=\"https:\/\/www.spokeo.com\/\">people search tools<\/a> to search your own name, address, phone number and email, to get a feel for exactly how much information you have exposed.&nbsp; Doing this can guide your next steps.&nbsp;<\/p>\n\n\n\n<p>Start by closing out your forgotten accounts at services you seldom use or have outgrown, including (and especially) your old social media platforms.&nbsp; Download or screenshot anything that\u2019s still meaningful, delete the rest and close your accounts.&nbsp; Set your remaining social media accounts to be <a href=\"https:\/\/us.norton.com\/internetsecurity-privacy-protecting-your-privacy-online.html\">viewable only by friends or followers<\/a>, to the extent it\u2019s practical for you.&nbsp; Set your phone camera to not tag your pictures with date and time data (the U.S. military\u2019s Special Operations Command, which takes security pretty seriously, has <a href=\"https:\/\/www.soc.mil\/IdM\/publications\/docs\/hardware\/EXIF_Removal.pdf\">an excellent guide<\/a>).&nbsp;<\/p>\n\n\n\n<p>If there\u2019s even a chance that your information is already circulating \u201cin the wild,\u201d you should also consider placing a <a href=\"https:\/\/www.consumer.ftc.gov\/blog\/2020\/02\/fraud-alerts-credit-freezes-whats-difference\">credit freeze or fraud alert<\/a> at each of the credit reporting agencies, and perhaps set up an <a href=\"https:\/\/www.spokeo.com\/compass\/do-i-need-an-identity-protection-pin\/\">identity protection PIN<\/a> with the IRS.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Establishing Security-Conscious Habits<\/h2>\n\n\n\n<p>Ultimately your best defense is simply to develop a security-conscious mindset.&nbsp; When you visit a site, take a moment to view the cookie policy and opt out, whenever possible.&nbsp; Use your browser\u2019s \u201cPrivate\u201d or \u201cIncognito\u201d mode, or tweak the browser\u2019s settings (or add extensions) to block trackers and restrict cookie use.&nbsp; Use strong passwords, and don\u2019t use your browser to store them (there are lots of good password management apps out there).&nbsp; Instead of using texts to authorize two-factor logins, use your phone\u2019s biometric scanners (or better yet, a third-party <a href=\"https:\/\/www.yubico.com\/blog\/ten-ways-protect-your-identity-online\/\">hardware key<\/a>).&nbsp;<\/p>\n\n\n\n<p>Take the time to <a href=\"https:\/\/www.spokeo.com\/compass\/internet-safety-how-to-prevent-hacking-on-home-network\/\">secure your home network<\/a> as well, so you\u2019re not a sitting duck for any scammer that happens to pass through your neighborhood.&nbsp; If you\u2019ve got the skills, or have someone in your home that does, you might also consider keeping your online life private by <a href=\"https:\/\/www.spokeo.com\/compass\/will-using-a-vpn-improve-your-internet-security\/\">using a VPN<\/a>.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Is Your Online Identity Safe?<\/h2>\n\n\n\n<p>If you\u2019re concerned that your online identity is at risk, there are several ways to safeguard against threats. Change your social privacy settings, use strong passwords and regularly create new ones, among other helpful tips.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">References:<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Quartz &#8211; <a href=\"https:\/\/qz.com\/1525661\/your-digital-identity-has-three-layers-and-you-can-only-protect-one-of-them\/\">Your Digital Identity Has Three Layers, and You Can Only Protect One of Them<\/a><\/li><li>Reuters &#8211; <a href=\"https:\/\/www.reuters.com\/article\/us-amazon-com-jobs-automation-insight\/amazon-scraps-secret-ai-recruiting-tool-that-showed-bias-against-women-idUSKCN1MK08G\">Amazon Scraps Secret AI Recruiting Tool That Showed Bias Against Women<\/a><\/li><li>Center for Strategic &amp; International Studies &#8211; <a href=\"https:\/\/www.csis.org\/blogs\/technology-policy-blog\/problem-bias-facial-recognition\">The Problem of Bias in Facial Recognition<\/a><\/li><li>White &amp; Case, LLP &#8211; <a href=\"https:\/\/www.whitecase.com\/publications\/insight\/algorithms-and-bias-what-lenders-need-know\">Algorithms and Bias: What Lenders Need To Know<\/a><\/li><li>U.S. Federal Trade Commission &#8211; <a href=\"https:\/\/www.consumer.ftc.gov\/blog\/2021\/02\/top-frauds-2020\">The Top Frauds of 2020<\/a><\/li><li>Better Business Bureau &#8211; <a href=\"https:\/\/www.bbb.org\/scamtracker\">BBB Scam Tracker<\/a><\/li><li>U.S. Federal Bureau of Investigation &#8211; <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf\">Internet Crime Report 2020<\/a><\/li><li>ZDNet &#8211; <a href=\"https:\/\/www.zdnet.com\/article\/the-biggest-hacks-data-breaches-of-2020\/\">The Biggest Hacks, Data Breaches of 2020<\/a><\/li><li>Ars Technica &#8211; <a href=\"https:\/\/arstechnica.com\/information-technology\/2020\/09\/100000-razer-users-data-leaked-due-to-misconfigured-elasticsearch\/\">Private Data Gone Public: Razer Leaks 100,000+ Gamers\u2019 Personal Info<\/a><\/li><li>Norton &#8211; <a href=\"https:\/\/us.norton.com\/internetsecurity-privacy-protecting-your-privacy-online.html\">How To Protect Your Privacy Online<\/a><\/li><li>U.S. Army Special Operations Command &#8211; <a href=\"https:\/\/www.soc.mil\/IdM\/publications\/docs\/hardware\/EXIF_Removal.pdf\">Smartphone EXIF Removal<\/a><\/li><li>U.S. Federal Trade Commission &#8211; <a href=\"https:\/\/www.consumer.ftc.gov\/blog\/2020\/02\/fraud-alerts-credit-freezes-whats-difference\">Fraud Alerts &amp; Credit Freezes: What\u2019s the Difference?<\/a><\/li><li>Yubico &#8211; <a href=\"https:\/\/www.yubico.com\/blog\/ten-ways-protect-your-identity-online\/\">10 Easy Ways To Protect Your Identity and Keep Safe Online<\/a><\/li><li>Wired &#8211; <a href=\"https:\/\/www.wired.com\/story\/opt-out-data-broker-sites-privacy\/\">How To Opt Out of the Sites That Sell Your Personal Data<\/a><\/li><li>Henderson Brothers &#8211; <a href=\"https:\/\/www.hendersonbrothers.com\/15-tips-protecting-identity-internet\/\">15 Tips for Protecting Your Identity on the Internet<\/a><\/li><li>UCLA &#8211; <a href=\"https:\/\/www.it.ucla.edu\/security\/resources\/security-best-practices\/protect-your-online-identity\">Protect Your Online Identity<\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u201cWho am I, really?\u201d is a question philosophers have wrestled with for thousands of years.&nbsp; In a practical way it\u2019s also a very modern question:&nbsp; Your electronic presence and activities&hellip;<\/p>\n","protected":false},"author":112,"featured_media":25186,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[810],"tags":[],"class_list":["post-25185","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-identity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Is Your Online Identity Safe? | Spokeo<\/title>\n<meta name=\"description\" content=\"How conscious are you of your online identity? Learn how companies (or, sadly, scammers) build this profile from your online activities, how it\u2019s used for legitimate and less legitimate purposes, and what you can do to protect your online identity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spokeo.com\/compass\/is-your-online-identity-safe\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is Your Online Identity Safe? | Spokeo\" \/>\n<meta property=\"og:description\" content=\"How conscious are you of your online identity? Learn how companies (or, sadly, scammers) build this profile from your online activities, how it\u2019s used for legitimate and less legitimate purposes, and what you can do to protect your online identity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spokeo.com\/compass\/is-your-online-identity-safe\/\" \/>\n<meta property=\"og:site_name\" content=\"The Compass Blog | Digital Identity and People Search | Spokeo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Spokeo\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-15T20:22:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-13T20:23:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/isYourOnlineIdentitySafe_1170x600.jpg?fit=1170%2C600&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1170\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fred Decker\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:site\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fred Decker\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/is-your-online-identity-safe\/\",\"url\":\"https:\/\/www.spokeo.com\/compass\/is-your-online-identity-safe\/\",\"name\":\"Is Your Online Identity Safe? | Spokeo\",\"isPartOf\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/is-your-online-identity-safe\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/is-your-online-identity-safe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/isYourOnlineIdentitySafe_1170x600.jpg?fit=1170%2C600&ssl=1\",\"datePublished\":\"2021-09-15T20:22:41+00:00\",\"dateModified\":\"2022-04-13T20:23:01+00:00\",\"author\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea\"},\"description\":\"How conscious are you of your online identity? Learn how companies (or, sadly, scammers) build this profile from your online activities, how it\u2019s used for legitimate and less legitimate purposes, and what you can do to protect your online identity.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.spokeo.com\/compass\/is-your-online-identity-safe\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/is-your-online-identity-safe\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/isYourOnlineIdentitySafe_1170x600.jpg?fit=1170%2C600&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/isYourOnlineIdentitySafe_1170x600.jpg?fit=1170%2C600&ssl=1\",\"width\":1170,\"height\":600},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\",\"url\":\"https:\/\/www.spokeo.com\/compass\/\",\"name\":\"The Compass Blog | Digital Identity and People Search | Spokeo\",\"description\":\"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea\",\"name\":\"Fred Decker\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g\",\"caption\":\"Fred Decker\"},\"url\":\"https:\/\/www.spokeo.com\/compass\/author\/freddecker\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is Your Online Identity Safe? | Spokeo","description":"How conscious are you of your online identity? Learn how companies (or, sadly, scammers) build this profile from your online activities, how it\u2019s used for legitimate and less legitimate purposes, and what you can do to protect your online identity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spokeo.com\/compass\/is-your-online-identity-safe\/","og_locale":"en_US","og_type":"article","og_title":"Is Your Online Identity Safe? | Spokeo","og_description":"How conscious are you of your online identity? Learn how companies (or, sadly, scammers) build this profile from your online activities, how it\u2019s used for legitimate and less legitimate purposes, and what you can do to protect your online identity.","og_url":"https:\/\/www.spokeo.com\/compass\/is-your-online-identity-safe\/","og_site_name":"The Compass Blog | Digital Identity and People Search | Spokeo","article_publisher":"https:\/\/www.facebook.com\/Spokeo\/","article_published_time":"2021-09-15T20:22:41+00:00","article_modified_time":"2022-04-13T20:23:01+00:00","og_image":[{"width":1170,"height":600,"url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/isYourOnlineIdentitySafe_1170x600.jpg?fit=1170%2C600&ssl=1","type":"image\/jpeg"}],"author":"Fred Decker","twitter_card":"summary_large_image","twitter_creator":"@Spokeo","twitter_site":"@Spokeo","twitter_misc":{"Written by":"Fred Decker","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.spokeo.com\/compass\/is-your-online-identity-safe\/","url":"https:\/\/www.spokeo.com\/compass\/is-your-online-identity-safe\/","name":"Is Your Online Identity Safe? | Spokeo","isPartOf":{"@id":"https:\/\/www.spokeo.com\/compass\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spokeo.com\/compass\/is-your-online-identity-safe\/#primaryimage"},"image":{"@id":"https:\/\/www.spokeo.com\/compass\/is-your-online-identity-safe\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/isYourOnlineIdentitySafe_1170x600.jpg?fit=1170%2C600&ssl=1","datePublished":"2021-09-15T20:22:41+00:00","dateModified":"2022-04-13T20:23:01+00:00","author":{"@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea"},"description":"How conscious are you of your online identity? Learn how companies (or, sadly, scammers) build this profile from your online activities, how it\u2019s used for legitimate and less legitimate purposes, and what you can do to protect your online identity.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spokeo.com\/compass\/is-your-online-identity-safe\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/is-your-online-identity-safe\/#primaryimage","url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/isYourOnlineIdentitySafe_1170x600.jpg?fit=1170%2C600&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/isYourOnlineIdentitySafe_1170x600.jpg?fit=1170%2C600&ssl=1","width":1170,"height":600},{"@type":"WebSite","@id":"https:\/\/www.spokeo.com\/compass\/#website","url":"https:\/\/www.spokeo.com\/compass\/","name":"The Compass Blog | Digital Identity and People Search | Spokeo","description":"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea","name":"Fred Decker","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g","caption":"Fred Decker"},"url":"https:\/\/www.spokeo.com\/compass\/author\/freddecker\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/isYourOnlineIdentitySafe_1170x600.jpg?fit=1170%2C600&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p8V62u-6yd","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/25185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/comments?post=25185"}],"version-history":[{"count":1,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/25185\/revisions"}],"predecessor-version":[{"id":25187,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/25185\/revisions\/25187"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media\/25186"}],"wp:attachment":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media?parent=25185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/categories?post=25185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/tags?post=25185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}