{"id":25446,"date":"2022-02-17T14:16:00","date_gmt":"2022-02-17T22:16:00","guid":{"rendered":"https:\/\/www.spokeo.com\/compass\/?p=25446"},"modified":"2022-04-13T12:21:57","modified_gmt":"2022-04-13T20:21:57","slug":"understanding-your-online-identity","status":"publish","type":"post","link":"https:\/\/www.spokeo.com\/compass\/understanding-your-online-identity\/","title":{"rendered":"Overshare? How Your Online Identity Enables Identity Theft"},"content":{"rendered":"\n<p>Jellyfish are remarkable creatures.&nbsp; The blob-like main body isn\u2019t especially large in most cases, but their fine, filament-like tentacles can cover a crazy-huge area.&nbsp; In the case of the <a href=\"https:\/\/ocean.si.edu\/ocean-life\/invertebrates\/extreme-jellyfish\">lion\u2019s mane jellyfish<\/a>, for example, those tentacles can stretch to as much as 120 feet from the body.&nbsp;<\/p>\n\n\n\n<p>So what has that got to do with you?&nbsp; Not much \u2014 unless you swim in the open ocean where that jellyfish lives \u2014 but it provides a useful illustration of how your real-world existence and your online identity relate to each other.&nbsp; Your physical body occupies one specific point, but your online identity is made up of thousands of threads that extend all around the world, wherever there\u2019s internet service.&nbsp; Scammers are adept at leveraging that online information to steal your identity and do you harm.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Your Online and Offline Lives Are Connected<\/h2>\n\n\n\n<p>It\u2019s a fact of human nature that most of us behave differently when we know we\u2019re being observed.&nbsp; You wouldn\u2019t blurt out the most personal details of your life in the middle of a group of strangers, or leave your checks, your keys or your medical records lying around in random public places.&nbsp;<\/p>\n\n\n\n<p>Yet many of us do similar things online, because it\u2019s easy to forget that when you use a digital device you\u2019re <em>always<\/em> being monitored in one way or another.&nbsp; Every article you read, every site you visit and every online search leaves a trail of data for others to see, and that doesn\u2019t even take into account some of the data you generate \u2014 from the sensors in your phone or smartwatch, for example, or from smart connected devices in your home \u2014 all of which can be utilized in surprising ways by unscrupulous advertisers or outright criminals.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u201cAnything You Say Can Be Used Against You\u201d<\/h2>\n\n\n\n<p>It\u2019s important to recognize that scammers and identity thieves are adept at getting the most possible mileage out of any piece of information they can find, steal or buy.&nbsp; A great many sites and apps use one or the other as your username or primary identity.&nbsp;<\/p>\n\n\n\n<p>Attackers who find either of those can attempt to log into multiple sites through a technique called \u201c<a href=\"https:\/\/owasp.org\/www-community\/attacks\/Credential_stuffing\">credential stuffing<\/a>,\u201d which simply churns through a database of known, compromised passwords until it finds one that works with your account. Most people reuse their passwords (a <em>really<\/em> bad habit), so getting that first match means the criminals can gain access to any other site where you\u2019ve used the same one.<\/p>\n\n\n\n<p>At that point you\u2019re in serious trouble, because identity theft is like assembling a jigsaw puzzle: The more pieces they\u2019ve got, the easier it is for criminals to see the whole picture.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Impact of Your Online Identity<\/h2>\n\n\n\n<p>Your online identity, then, can be used by scammers as a lever to pry open the lid to your entire life.&nbsp; Depending on which information they harvest and which accounts they gain access to, they might:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Drain your savings and max out your credit<\/li><li>Apply for new credit in your name<\/li><li>Claim costly treatments on your medical insurance<\/li><li>File a tax return in your name and take your refund<\/li><li>Create fake ID using your name and information<\/li><li>Give your name to the police when they\u2019re arrested for a crime (this one can be <em>really<\/em> troublesome)<\/li><li>Request a \u201creplacement\u201d Social Security card<\/li><li>Lock you out of your own accounts, and use them in turn to defraud (or harass) your friends and family while pretending to be you<\/li><\/ul>\n\n\n\n<p>So what can you do, as a private individual, to minimize your vulnerability to identity thieves?&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Identifying the Scale of the Problem<\/h2>\n\n\n\n<p>Looking to see how much information you\u2019ve scattered around the internet is a good starting point.&nbsp; To do that, use Spokeo\u2019s <a href=\"https:\/\/www.spokeo.com\/\">people search tools<\/a> and enter in your own name, current and previous addresses, phone numbers and every email address you can remember using.&nbsp; This will show you how much information is available through legitimate, mainstream public sources (by all means Google yourself as well, though you\u2019ll get lower-quality information spread out over a <em>lot<\/em> of search results).&nbsp; That information provides a useful benchmark for gauging how exposed your online identity actually is. You may even want to print it out, or take screenshots, for reference purposes.&nbsp;<\/p>\n\n\n\n<p>If you\u2019ve been online for a few years, you might be unpleasantly surprised to realize how many sites have some portion of your personal information, or your youthful rants and embarrassing party pics.&nbsp;<\/p>\n\n\n\n<p>You should also take a serious look at your social-media profiles. Facebook, for example, lets you see how your profile appears to friends, friends of friends, and complete strangers (\u201ceveryone\u201d). Start at the everyone level and work your way up to friends, asking yourself at each step whether you\u2019re comfortable with the level of information you\u2019re putting out there.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Taking Control of Your Online Identity<\/h2>\n\n\n\n<p>You can\u2019t go online, or use any digital device, and expect to remain <em>completely<\/em> safe or anonymous.&nbsp; The same is true of life in general, so don\u2019t panic: Identity thieves (and scammers of all kinds) are usually looking for low-hanging fruit, so taking even the most basic precautions to <a href=\"https:\/\/www.spokeo.com\/compass\/how-to-protect-your-digital-footprint\/\">protect your online identity<\/a> will sharply reduce the likelihood of running into trouble.&nbsp;<\/p>\n\n\n\n<p>These include:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Closing out as many <a href=\"https:\/\/www.spokeo.com\/compass\/can-you-find-all-the-accounts-linked-to-your-email\/\">old, unused accounts<\/a> as you can find<\/li><li>Unsubscribing from <a href=\"https:\/\/www.spokeo.com\/compass\/8-ways-to-stop-getting-spam-emails\/\">unwanted mailing lists<\/a><\/li><li>Using the app settings in <a href=\"https:\/\/support.google.com\/googleplay\/answer\/6270602?hl=en\">Android<\/a> and <a href=\"https:\/\/support.apple.com\/en-ca\/guide\/iphone\/iph251e92810\/ios\">iOS <\/a>to limit the information that apps can collect<\/li><li>Using antivirus and anti-malware apps<\/li><li>Tightening the <a href=\"https:\/\/www.spokeo.com\/compass\/internet-safety-what-you-need-to-know-about-public-vs-private-social-media-accounts\/\">privacy settings <\/a>on your social-media accounts<\/li><li><a href=\"https:\/\/www.spokeo.com\/compass\/internet-safety-social-media-follower-audit\/\">Auditing your followers<\/a> periodically and removing any of the ones you don\u2019t really know or interact with (unless you\u2019re an influencer, of course)<\/li><li>Checking your email addresses, phone numbers and passwords on a site like <a href=\"https:\/\/haveibeenpwned.com\/\">Have I Been Pwned<\/a> to see if they\u2019ve been compromised in known breaches<\/li><li>Setting newer, <a href=\"https:\/\/www.spokeo.com\/compass\/how-to-create-a-secure-password-youll-actually-remember\/\">better passwords<\/a> and not reusing them between sites (passwords managers make this a lot easier)<\/li><li>Using other forms of authentication whenever possible, like your phone\u2019s fingerprint reader or face recognition, instead of a texted code or challenge questions like your mom\u2019s maiden name<\/li><li>Clicking those cookie-policy pop-ups and declining as many cookies as you can<\/li><li>Using disposable email addresses when you sign up at random sites<\/li><li>Knowing the telltale <a href=\"https:\/\/www.spokeo.com\/compass\/7-signs-of-identity-theft\/\">signs of identity theft<\/a>, and being alert for them<\/li><\/ul>\n\n\n\n<p>No one of these steps in itself is a silver bullet that will keep your information and identity from being stolen, but their cumulative effect is substantial.&nbsp; It\u2019s the proverbial \u201counce of prevention.\u201d&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Using Identity Protection (and More)<\/h2>\n\n\n\n<p>If you have a suspicion your identity may have been compromised, or if you\u2019re simply aware of the havoc identity theft can cause and want no part of it, you can take your online safety to a higher level with a few additional, proactive steps.&nbsp;<\/p>\n\n\n\n<p>Taking advantage of Spokeo\u2019s Identity Protection service, <a href=\"https:\/\/www.spokeo.com\/identity-theft-protection\">Spokeo Protect<\/a> is one of them.&nbsp; Your personal information \u2014 like any other illicit commodity \u2014 is bought and sold by criminals in the shady corners of the internet\u2019s <a href=\"https:\/\/www.spokeo.com\/compass\/how-to-find-out-if-your-information-is-on-the-dark-web-and-what-to-do\/\">so-called Dark Web<\/a>.&nbsp; Spokeo actively monitors those criminal marketplaces, and if your information should be offered up for sale, we\u2019ll let you know.&nbsp; That gives you the heads-up you\u2019ll need to (hopefully) protect yourself before criminals can actively exploit it.&nbsp;<\/p>\n\n\n\n<p>With or without that heads-up (but definitely if you <em>know<\/em> your information has been compromised), you can take other steps to make life more difficult for identity thieves.&nbsp; For example, you can place a <a href=\"https:\/\/www.spokeo.com\/compass\/credit-freeze-vs-lock\/\">credit freeze or credit lock<\/a> on your accounts at the big credit-reporting agencies.&nbsp; Potential creditors won\u2019t be able to pull a file under your name, and therefore usually won\u2019t open a new account.&nbsp; If you\u2019re especially cautious you can place a <a href=\"https:\/\/www.consumer.ftc.gov\/articles\/what-know-about-credit-freezes-and-fraud-alerts\">fraud alert<\/a>, which means new credit won\u2019t be issued without contacting you for verification.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Live Life Your Way<\/h2>\n\n\n\n<p>Ultimately the online part of your life isn\u2019t that much different from the real-world part: It has some risks, but they\u2019re manageable.\u00a0 You take the precautions you need to take, and then you get on with actually living it.\u00a0 Helping you do that is a central part of Spokeo\u2019s mission.\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Sources<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Smithsonian Institute: <a href=\"https:\/\/ocean.si.edu\/ocean-life\/invertebrates\/extreme-jellyfish\">Extreme Jellyfish<\/a><\/li><li>Open Web Application Security Project (OWASP): <a href=\"https:\/\/owasp.org\/www-community\/attacks\/Credential_stuffing\">Credential Stuffing<\/a><\/li><li>Tech Crunch: <a href=\"https:\/\/techcrunch.com\/2019\/07\/24\/researchers-spotlight-the-lie-of-anonymous-data\/\">Researchers Spotlight the Lie of Anonymous Data<\/a><\/li><li>Ars Technica: <a href=\"https:\/\/arstechnica.com\/tech-policy\/2021\/07\/catholic-priest-quits-after-anonymized-data-revealed-alleged-use-of-grindr\/\">Catholic Priest Quits After \u201cAnonymized\u201d Data Revealed Alleged Use of Grindr<\/a><\/li><li>Vice\/Motherboard: <a href=\"https:\/\/www.vice.com\/en\/article\/epnmvz\/industry-unmasks-at-scale-maid-to-pii\">Inside the Industry That Unmasks People at Scale<\/a><\/li><li>Have I Been Pwned?: <a href=\"https:\/\/haveibeenpwned.com\/\">Email\/Phone Search<\/a><\/li><li>Google Play Help: <a href=\"https:\/\/support.google.com\/googleplay\/answer\/6270602?hl=en\">Control Your App Permissions on Android 6.0 and Up<\/a><\/li><li>Apple Support: <a href=\"https:\/\/support.apple.com\/en-ca\/guide\/iphone\/iph251e92810\/ios\">Control Access to Information in Apps on iPhone<\/a><\/li><li>US Federal Trade Commission: <a href=\"https:\/\/www.consumer.ftc.gov\/articles\/what-know-about-credit-freezes-and-fraud-alerts\">What to Know About Credit Freezes and Fraud Alerts<\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Jellyfish are remarkable creatures.&nbsp; The blob-like main body isn\u2019t especially large in most cases, but their fine, filament-like tentacles can cover a crazy-huge area.&nbsp; In the case of the lion\u2019s&hellip;<\/p>\n","protected":false},"author":112,"featured_media":25447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[810],"tags":[],"class_list":["post-25446","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-identity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Overshare? How Your Online Identity Enables Identity Theft | Spokeo<\/title>\n<meta name=\"description\" content=\"Your online identity isn\u2019t separate from your real life. Learn how your online and digital activity can leave you vulnerable to identity theft, what you can do to minimize the risks and how to protect yourself.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spokeo.com\/compass\/understanding-your-online-identity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Overshare? How Your Online Identity Enables Identity Theft | Spokeo\" \/>\n<meta property=\"og:description\" content=\"Your online identity isn\u2019t separate from your real life. Learn how your online and digital activity can leave you vulnerable to identity theft, what you can do to minimize the risks and how to protect yourself.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spokeo.com\/compass\/understanding-your-online-identity\/\" \/>\n<meta property=\"og:site_name\" content=\"The Compass Blog | Digital Identity and People Search | Spokeo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Spokeo\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-17T22:16:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-13T20:21:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPUnderstandingTheImpactOfYourOnlineIdentity_1170x600.jpg?fit=1170%2C600&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1170\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fred Decker\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:site\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fred Decker\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/understanding-your-online-identity\/\",\"url\":\"https:\/\/www.spokeo.com\/compass\/understanding-your-online-identity\/\",\"name\":\"Overshare? How Your Online Identity Enables Identity Theft | Spokeo\",\"isPartOf\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/understanding-your-online-identity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/understanding-your-online-identity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPUnderstandingTheImpactOfYourOnlineIdentity_1170x600.jpg?fit=1170%2C600&ssl=1\",\"datePublished\":\"2022-02-17T22:16:00+00:00\",\"dateModified\":\"2022-04-13T20:21:57+00:00\",\"author\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea\"},\"description\":\"Your online identity isn\u2019t separate from your real life. Learn how your online and digital activity can leave you vulnerable to identity theft, what you can do to minimize the risks and how to protect yourself.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.spokeo.com\/compass\/understanding-your-online-identity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/understanding-your-online-identity\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPUnderstandingTheImpactOfYourOnlineIdentity_1170x600.jpg?fit=1170%2C600&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPUnderstandingTheImpactOfYourOnlineIdentity_1170x600.jpg?fit=1170%2C600&ssl=1\",\"width\":1170,\"height\":600},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\",\"url\":\"https:\/\/www.spokeo.com\/compass\/\",\"name\":\"The Compass Blog | Digital Identity and People Search | Spokeo\",\"description\":\"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea\",\"name\":\"Fred Decker\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g\",\"caption\":\"Fred Decker\"},\"url\":\"https:\/\/www.spokeo.com\/compass\/author\/freddecker\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Overshare? How Your Online Identity Enables Identity Theft | Spokeo","description":"Your online identity isn\u2019t separate from your real life. Learn how your online and digital activity can leave you vulnerable to identity theft, what you can do to minimize the risks and how to protect yourself.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spokeo.com\/compass\/understanding-your-online-identity\/","og_locale":"en_US","og_type":"article","og_title":"Overshare? How Your Online Identity Enables Identity Theft | Spokeo","og_description":"Your online identity isn\u2019t separate from your real life. Learn how your online and digital activity can leave you vulnerable to identity theft, what you can do to minimize the risks and how to protect yourself.","og_url":"https:\/\/www.spokeo.com\/compass\/understanding-your-online-identity\/","og_site_name":"The Compass Blog | Digital Identity and People Search | Spokeo","article_publisher":"https:\/\/www.facebook.com\/Spokeo\/","article_published_time":"2022-02-17T22:16:00+00:00","article_modified_time":"2022-04-13T20:21:57+00:00","og_image":[{"width":1170,"height":600,"url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPUnderstandingTheImpactOfYourOnlineIdentity_1170x600.jpg?fit=1170%2C600&ssl=1","type":"image\/jpeg"}],"author":"Fred Decker","twitter_card":"summary_large_image","twitter_creator":"@Spokeo","twitter_site":"@Spokeo","twitter_misc":{"Written by":"Fred Decker","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.spokeo.com\/compass\/understanding-your-online-identity\/","url":"https:\/\/www.spokeo.com\/compass\/understanding-your-online-identity\/","name":"Overshare? How Your Online Identity Enables Identity Theft | Spokeo","isPartOf":{"@id":"https:\/\/www.spokeo.com\/compass\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spokeo.com\/compass\/understanding-your-online-identity\/#primaryimage"},"image":{"@id":"https:\/\/www.spokeo.com\/compass\/understanding-your-online-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPUnderstandingTheImpactOfYourOnlineIdentity_1170x600.jpg?fit=1170%2C600&ssl=1","datePublished":"2022-02-17T22:16:00+00:00","dateModified":"2022-04-13T20:21:57+00:00","author":{"@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea"},"description":"Your online identity isn\u2019t separate from your real life. Learn how your online and digital activity can leave you vulnerable to identity theft, what you can do to minimize the risks and how to protect yourself.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spokeo.com\/compass\/understanding-your-online-identity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/understanding-your-online-identity\/#primaryimage","url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPUnderstandingTheImpactOfYourOnlineIdentity_1170x600.jpg?fit=1170%2C600&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPUnderstandingTheImpactOfYourOnlineIdentity_1170x600.jpg?fit=1170%2C600&ssl=1","width":1170,"height":600},{"@type":"WebSite","@id":"https:\/\/www.spokeo.com\/compass\/#website","url":"https:\/\/www.spokeo.com\/compass\/","name":"The Compass Blog | Digital Identity and People Search | Spokeo","description":"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea","name":"Fred Decker","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g","caption":"Fred Decker"},"url":"https:\/\/www.spokeo.com\/compass\/author\/freddecker\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPUnderstandingTheImpactOfYourOnlineIdentity_1170x600.jpg?fit=1170%2C600&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p8V62u-6Cq","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/25446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/comments?post=25446"}],"version-history":[{"count":1,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/25446\/revisions"}],"predecessor-version":[{"id":25448,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/25446\/revisions\/25448"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media\/25447"}],"wp:attachment":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media?parent=25446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/categories?post=25446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/tags?post=25446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}