Social media is a big target when you collect data about a person. People often appear under a screen name, and using this screen name can reveal all accounts created by the same person and open sources for photos and family members' accounts. This method is often used by cyber security professionals. This article or section needs sources or references that appear incredible, third-party publications. Content here is for educational purposes only and does not promote any illegal activities. Read More
For further actions, you may consider blocking this person and/or reporting abuse
Top comments (1)
Hi there, we encourage authors to share their entire posts here on DEV, rather than mostly pointing to an external link. Doing so helps ensure that readers donβt have to jump around to too many different pages, and it helps focus the conversation right here in the comments section.
If you choose to do so, you also have the option to add a canonical URL directly to your post.