#1721: AI Doxxing: Why Your Writing Style Is a Liability

AI tools now identify anonymous users by analyzing their unique writing patterns, making traditional privacy measures less effective.

0:000:00
Episode Details
Episode ID
MWP-1874
Published
Duration
21:20
Audio
Direct link
Pipeline
V5
TTS Engine
chatterbox-regular
Script Writing Agent
Gemini 3 Flash

AI-Generated Content: This podcast is created using AI personas. Please verify any important information independently.

The landscape of digital privacy is shifting rapidly, and the labor cost of ruining someone’s life has plummeted. What was once the domain of basement-dwelling specialists spending weeks sifting through obscure forums is now accessible to anyone with an internet connection and the right tools. The threat is no longer just about leaked databases; it is about the malicious aggregation of public data and the sophisticated use of artificial intelligence to strip away anonymity.

At its core, doxxing is not merely sharing public information. It is the act of aggregating disparate data points—names, locations, social media profiles—and connecting them to identify a specific individual with the intent to harm. While legal frameworks struggle to keep pace, the technical barriers have collapsed. The rise of AI has introduced a new, terrifying vector for identification: stylometric clustering.

The Mechanics of AI-Driven Identification

Most people assume that hiding behind a pseudonym is sufficient protection. However, large language models can now analyze syntax, vocabulary, sentence structure, and even typing quirks to determine with high statistical probability that two anonymous accounts belong to the same person. This "writing fingerprint" is a significant liability. AI tools can ingest thousands of posts from different platforms and flag accounts that "sound" like the same human, effectively automating the process of connecting digital dots.

Furthermore, AI excels at identifying temporal overlaps. If one account stops posting at a specific time and another begins minutes later in the same timezone, a machine can easily correlate these patterns. This capability removes the manual labor previously required for stalking, allowing bad actors to run scripts across the entire indexed web to unmask anyone who annoys them in a comment section.

The Legal and Infrastructural Gray Zone

Legally, the "public records defense" is losing its teeth. Attackers often argue that they merely reposted information available on public websites, but prosecutors are increasingly focusing on malicious intent and the direct link to resulting harm. The FTC’s recent crackdown on data brokers, such as the settlement with PeopleConnect, signals that aggregating information without consent is becoming a liability.

However, the infrastructure for harassment remains robust. Data brokers like Acxiom and Whitepages scrape public records and sell home addresses for pennies. While some states, like California, have anti-doxxing statutes that focus on placing a person in reasonable fear, enforcement is a patchwork. The "verified identity" trend on social platforms also presents a paradox: while intended to stop bots, government ID verification creates a centralized honeypot that, if breached, hands doxxers everything they need on a silver platter.

Defensive Strategies for the Modern Era

Defending against these threats requires more than a VPN. While a VPN hides an IP address, it does nothing against browser fingerprinting or semantic leaks. The modern starting kit for anonymity involves strict compartmentalization.

  1. Compartmentalization: Use dedicated browser profiles for anonymous activity, hardened against tracking and fingerprinting.
  2. Masked Emails: Never use the same email address for different personas. Services that create unique aliases for every site prevent cross-platform tracking if one account is breached.
  3. Semantic Hygiene: To counter stylometric analysis, one must "launder" their writing style. This involves rewriting posts in a neutral tone, removing regional slang and unique idioms. Ironically, AI can be used defensively here to sanitize text before posting.
  4. Physical OpSec: Geolocation remains a risk. Even seemingly innocuous photos can be triangulated using AI-assisted terrain matching or specific environmental details, like the chirp of a local bird. Always strip EXIF metadata before posting images.

The Paradox of Transparency

We are caught in a radical transparency paradox. The demand for "authentic" online personas encourages users to share personal details that serve as fuel for identification engines. The more human you are online, the more data points you leave for a machine to analyze. While privacy is becoming a luxury of the diligent, it is not dead. It simply requires a proactive, layered defense strategy that acknowledges the new capabilities of AI-driven doxxing.

Downloads

Episode Audio

Download the full episode as an MP3 file

Download MP3
Transcript (TXT)

Plain text transcript file

Transcript (PDF)

Formatted PDF with styling

#1721: AI Doxxing: Why Your Writing Style Is a Liability

Corn
Imagine waking up to a thousand notifications, not from a viral tweet or a funny meme, but from people you have never met describing the color of your front door, your social security number, and the name of the kindergarten your kid attends. That visceral, cold sweat moment is the reality of being doxxed, and honestly, the threshold for that happening to a regular person has never been lower than it is right now in early twenty-six.
Herman
It is a terrifying prospect, Corn. And what makes it more pressing today is that the "labor cost" of ruining someone’s life has plummeted. We used to think of doxxers as these basement-dwelling specialists spending weeks sifting through obscure forums, but today's prompt from Daniel really highlights how that’s changed. He’s asking about the mechanics, the legality, and specifically how cyberbullies are now leveraging AI to piece together these digital puzzles. By the way, a quick shout-out to our script-writing assistant today, Google Gemini three Flash, which is helping us structure these deep dives.
Corn
I’m glad we’re tackling this because there’s a lot of "internet tough guy" talk about doxxing, but the actual real-world consequences are devastating. You have people losing jobs, being swatted, or facing physical stalking. But before we get into the heavy stuff, Herman Poppleberry, let’s get specific. Everyone says they know what doxxing is, but from a technical and legal standpoint, where do we draw the line? Is it just googling someone, or is there a specific threshold where it becomes a "dox"?
Herman
That is the crucial distinction to start with. Most people think if information is "public record," then sharing it cannot be doxxing. That is a massive misconception. Doxxing is the malicious aggregation and public dissemination of private or identifying data. The keyword there is "aggregation." You might have your name on a property tax website, your face on a LinkedIn profile, and your political rants on an anonymous Reddit account. Individually, those are just data points. Doxxing is the act of connecting those dots to strip away the shield of anonymity and then broadcasting that "packet" to an audience with the intent to harm, humiliate, or incite harassment.
Corn
So, it’s the difference between a journalist looking up a CEO’s office address and a mob posting a private home address with a "go get 'em" caption. But who is actually doing this? Is it just bored teenagers on imageboards, or are we looking at a more sophisticated class of bad actors?
Herman
It’s a spectrum. On one end, you have the classic "hacktivists" or ideological vigilantes. They feel they are doing "God’s work" by unmasking someone they perceive as a villain. But we’ve seen a massive rise in what I call the "grey zone" of vigilante journalists and even state-sponsored actors. If a foreign intelligence service wants to silence a dissident, they don’t always need to arrest them; they just need to leak their home address to local extremists. Then you have the "swatters"—the absolute bottom of the barrel—who use doxxed info to trick police into raiding a target’s home. We saw a horrific case just last year, the twenty-twenty-five "Streamer Swatting" ring. These guys weren't even elite hackers; they were just using leaked database lookups from old telecommunications breaches to find the physical addresses tied to IP addresses.
Corn
That "Streamer Swatting" case was a wake-up call because it showed how a tiny bit of leaked data from years ago acts like a skeleton key today. But let’s talk about the law. If I’m a victim, can I actually call the cops and expect a result? Or is the legal system still playing catch-up with a dial-up mindset?
Herman
It is a patchwork, and honestly, it’s frustrating. In the United States, there isn't a single, clean "Federal Anti-Doxxing Act" that covers everything. Instead, prosecutors have to stitch together laws against stalking, harassment, or interstate threats. However, some states are leading the way. California’s anti-doxxing statute is a significant benchmark because it focuses on the "intent to place a person in reasonable fear." But even then, prosecution is a nightmare.
Corn
Why is that? Is it just the anonymity of the attacker, or something deeper?
Herman
It’s the "Public Records Defense." An attacker will argue in court, "I just posted a screenshot of a public website, how is that a crime?" To beat that, the prosecution has to prove malicious intent and a direct link to the resulting harm. This is where the FTC settlement with PeopleConnect in twenty-twenty-four becomes so important. PeopleConnect, which operates sites like TruthFinder and Instant Checkmate, was essentially acting as a bridge for doxxers. The FTC started cracking down on how these data brokers aggregate information without consent, signaling that the "it was already public" excuse is losing its legal teeth.
Corn
It’s like saying, "I didn't build the bomb, I just gathered the gunpowder, the fuse, and the casing from different stores and left them on your porch with a lighter." The intent is pretty clear. But Herman, you mentioned earlier that the labor cost is dropping. Daniel’s prompt specifically asked about AI. How are cyberbullies using LLMs to make this easier? Because I assume an AI isn't just going to give me someone’s address if I ask for it.
Herman
You’re right, the "safety rails" on most commercial AI will block a direct request like "Find the home address of this Twitter user." But doxxers are smarter than that. They use AI for "Semantic Mimicry" and "Stylometry." Think about how you write, Corn. You have certain quirks, specific typos, or a penchant for obscure sloth facts. If you post on Reddit as "User A" and on a private forum as "User B," an LLM can analyze the syntax, the vocabulary, and the sentence structure to determine with high statistical probability that both accounts belong to the same person.
Corn
Wait, so my "writing fingerprint" is a liability? I can’t even hide behind a pseudonym if my grammar gives me away?
Herman
Well, not "exactly," but that is the mechanism. It’s called stylometric clustering. In January of this year, the OSINT-Framework three point zero was released, and it integrated automated LLM correlation features. It can ingest thousands of posts from different platforms and flag accounts that "sound" like the same human. It also cross-references timestamps. If "User A" always stops posting at eleven P-M Jerusalem time and "User B" starts at eleven-oh-five, the AI identifies that temporal overlap. It’s "connecting the dots" on steroids.
Corn
That is terrifying. It’s taking the manual labor out of stalking. It used to take a dedicated hater weeks to find that kind of overlap. Now, a script can do it in seconds across the entire indexed web. It makes me think about what we’ve called the "Radical Transparency Paradox" before. We’re told to "be our authentic selves" online to build a brand or a community, but every "authentic" detail is just more fuel for the AI doxxing engine.
Herman
It really is a paradox. The more "human" you are online, the more data points you leave for a machine to identify you. We’ve seen high-profile cases where people were unmasked just because they mentioned a specific local weather event or a niche restaurant opening at the same time on two different accounts. With AI, you don’t even need the person to be famous. You can run these tools against anyone who annoys you in a comment section.
Corn
Okay, so the "offense" has these automated super-tools now. Let's pivot to the "defense." Daniel asked for common-sense infosec guidelines for the anonymous crowd. If I want to post my spicy takes without my boss or some random troll showing up at my door, what is the modern "starting kit" for staying hidden?
Herman
The first thing to accept is that a VPN is not a magic invisibility cloak. It hides your IP address from the site you’re visiting, which is good, but it does nothing against browser fingerprinting or the semantic leaks we just discussed. Step one is "Compartmentalization." You need to treat your online personas like separate biological labs. Use a dedicated browser profile for your anonymous activity—something like LibreWolf or a hardened Firefox—that has all tracking and fingerprinting protections cranked to the max.
Corn
And I assume you shouldn't be using the same email address for your "Burner" account and your Netflix subscription?
Herman
Absolutely not. You should be using masked emails. Services like Firefox Relay or SimpleLogin allow you to create a unique email for every single site. If one site gets breached and your email "UserOne at Gmail" leaks, a doxxer can just search that email on every other platform to find your other accounts. If every account has a unique, random alias, that trail goes cold immediately.
Corn
What about the "writing fingerprint"? If I’m worried about an LLM identifying my style, do I have to start writing like a robot?
Herman
It’s called "Semantic Hygiene." It sounds exhausting, but for high-stakes anonymity, it’s necessary. You can actually use an AI defensively here. Take your post, run it through a prompt that says "Rewrite this in a neutral, professional tone and remove any regional slang or unique idioms," and then post the output. You’re using the AI to "launder" your writing style.
Corn
I love the irony of using an AI to protect yourself from an AI. It’s like wearing a digital mask. But what about the physical stuff? I remember we talked about "The Sky is a Snitch" a while back—how people get doxxed by the reflection in their sunglasses or the shape of the clouds in a photo.
Herman
That is still a huge risk. Geolocation via OSINT has become a sport for some people. There’s a famous case where a streamer was doxxed because a fan recognized the specific "chirp" of a bird in the background that only lived in a certain part of Virginia. Common sense rule: never post photos of the view from your window. Even a "boring" skyline can be triangulated using Google Earth and AI-assisted terrain matching. If you must post a photo, strip the EXIF metadata first. Tools like "Scrambled EXIF" for Android or just a simple desktop script can wipe the GPS coordinates that your phone automatically embeds in every shot.
Corn
It feels like we’re describing a full-time job just to be a private person. Is it even worth it? Or are we heading toward a world where we all just have to accept that "privacy is dead" and we should all just live under our real names?
Herman
I refuse to accept that "privacy is dead" is an inevitability. It is just becoming a luxury of the diligent. But you raise a good point about the "verified identity" trend. We’re seeing platforms like X and others push hard for "Blue Check" verification with government I-D. They argue it stops bots and doxxing, but it actually creates a "honeypot." If a platform has your passport on file and they get breached, the doxxers don't even have to do any work—they just download the database.
Corn
That’s the ultimate backfire. "Verify your identity to stay safe," and then the "Safe" vault gets cracked. It reminds me of the "PeopleConnect" situation you mentioned. These companies collect this info under the guise of "transparency" or "safety," but they are essentially building the infrastructure for harassment.
Herman
That is why the "Data Broker Opt-Out" is my third big takeaway for Daniel. There is a whole industry of companies like Acxiom, Epsilon, and Whitepages that scrape public records and sell your home address for pennies. You can spend a weekend manually submitting opt-out requests—there’s a great resource called the "Data Broker Registry" that lists them all—or you can use automated tools like DeleteMe or Optery. They act like a "digital janitor," constantly scanning these sites and filing "cease and desist" or "remove" requests on your behalf.
Corn
I’ve used one of those, and it’s wild to see the report afterward. "We found you on one hundred and forty-two sites and removed you from one hundred and twenty." You don't realize how much of your life is just sitting there in a searchable format for any weirdo with a credit card.
Herman
It’s the "low-hanging fruit" of doxxing. If you remove yourself from the major brokers, you’ve forced a doxxer to actually work for it. Most bullies are lazy. If they can’t find your address in five minutes on "Whitepages," they’ll often move on to an easier target. It’s about raising the "cost of attack."
Corn
We’ve talked about the technical side, but I want to go back to the human element. You mentioned "swatting" earlier. That’s where doxxing turns into potential state-sanctioned violence. When you look at the twenty-twenty-five streamer cases, what was the "pivot point" where it went from a digital annoyance to a tactical team at the door?
Herman
It usually starts with a "VOIP" exploit. A doxxer finds your real name and address through the methods we discussed. Then, they use a voice-over-I-P service to spoof your phone number or call a non-emergency police line. They spin a story—usually involving a hostage or a violent crime—to trigger a "high-priority response." The reason it works is that dispatchers are trained to take these calls seriously. The "defense" here isn't just technical; it’s social. Many high-profile streamers now "pre-register" with their local police departments. They basically say, "Hey, I’m a public figure, I’m at risk of swatting, if you get a call about my address, please call me or check my secondary security protocols before sending the SWAT team."
Corn
It’s wild that we live in a world where you have to call the cops to tell them "Don't raid me if someone calls." It’s like a "No-Fly List" but for your own living room. But let’s look at the "Future Implication" part of Daniel’s prompt. As AI gets better at "unmasking," will we see a counter-tech? You mentioned "Zero-Knowledge Proofs" in our prep notes. What is that, and could it save us?
Herman
This is where it gets really cool, and it's something I think will be the standard by twenty-thirty. A Zero-Knowledge Proof, or Z-K-P, is a cryptographic method where you can prove something is true without revealing the information itself. Imagine you want to join an "Over Eighteen" forum. Instead of uploading your I-D, which a doxxer could steal, your "Digital Wallet" provides a Z-K-P that says, "I have verified this person is over eighteen," without ever sharing your birthdate, name, or address. You get the access, but the platform—and therefore the doxxers—get zero data.
Corn
So I can "prove" I’m a local resident, or a verified human, or a licensed doctor, without giving the site a single piece of "dox-able" info. That feels like the "Holy Grail" of online interaction. But we’re a few years away from that being mainstream, right?
Herman
We are, but the foundations are being built now on various blockchain protocols and "Self-Sovereign Identity" frameworks. Until then, we are in the "Wild West" phase. The offensive tools—the AI scrapers and stylometry engines—are currently faster and cheaper than the defensive ones. That’s why Daniel’s prompt is so timely. We’re in a period where "common sense" isn't enough anymore. You need "active counter-intelligence" if you want to stay truly anonymous.
Corn
"Active counter-intelligence" sounds very Jason Bourne for someone who just wants to talk about video games on Reddit. But I see your point. If the bullies have "Super-Forensics," you need "Super-Obscurity." One thing that struck me in the research Daniel sent over was the "Phishing" aspect. People think doxxing is always about "finding" info, but a lot of it is "tricking" you into giving it up.
Herman
That is the "Social Engineering" loop. A doxxer might send you a DM pretending to be "Reddit Support" or a brand offering a sponsorship. They send you a link to a "portal" that looks legitimate. You log in, and boom—they have your I-P address, your browser fingerprint, and maybe even your real name from the "OAuth" login. The simplest rule in the book still applies: never click a link in a D-M, especially if it’s from someone you don't know IRL. Use a "link expander" or a "sandbox" to see where it’s actually going.
Corn
It always comes back to the basics, doesn't it? Don't click the link, don't use the same password, don't trust the "helpful" stranger. But Herman, let's talk about the "Vigilante" aspect. We’ve seen cases where the "Internet Mob" doxxes someone they think committed a crime, only to find out they got the wrong person. The twenty-thirteen Boston Marathon bombing is the classic example, but it’s happened hundreds of times since then.
Herman
That is the "Dark Side of Crowdsourcing." When you have thousands of people trying to "solve" a crime using OSINT, you get "Confirmational Bias." Someone finds a guy who looks "vaguely similar" and has a "suspicious" Facebook post, and within an hour, his life is ruined. With AI, this gets even more dangerous because an AI can generate "evidence" or "correlations" that look statistically significant but are actually hallucinations or coincidences. If an AI tells a mob, "There is a ninety-eight percent match between this anonymous troll and this random high school teacher," that mob isn't going to wait for the other two percent.
Corn
It’s "Automated Injustice." We’re giving the mob a "Scientific" excuse for their pitchforks. It really highlights why the "intent" part of the law is so difficult. If the mob genuinely believes they are "helping," is it still doxxing? Legally, the answer is usually "yes," but in the court of public opinion, it’s a mess.
Herman
And that’s why the "Radical Transparency" we talked about is so risky. If you have nothing to hide, you still have everything to fear from someone who is convinced you’re a villain. Accuracy doesn't matter in a doxxing attack; only the "volume" of the harassment matters. If ten thousand people think you’re a monster because of a "connected dot" that was actually a mistake, your life is still ruined.
Corn
So, to recap the "Herman Poppleberry Guide to Not Getting Ruined": Use different browsers for different lives, mask your emails, launder your writing style through a "Professional Tone" AI, opt-out of data brokers, and for the love of all that is holy, don't post pictures of your window or your birds.
Herman
It sounds like a lot, but once you set up the systems—the email masks and the dedicated browsers—it adds maybe ten seconds to your day. Ten seconds to avoid a lifetime of headaches. And keep an eye on the legal side. As more states follow California’s lead, we might actually see some "Doxxing Kingpins" go to jail, which is the only real deterrent.
Corn
I hope you’re right. It feels like we’re in an arms race where the "shields" are finally starting to catch up to the "swords," but the swords are now powered by LLMs. It’s a wild time to be a private person on a public internet.
Herman
It really is. And I think Daniel hit on the most important part: "common-sense infosec." It’s not about being a hacker; it’s about being a difficult target. Like we always say, you don't have to outrun the bear; you just have to outrun the guy next to you who’s still using "Password One-Two-Three" and posting his Starbucks cup with his full name on it.
Corn
Well, I’m definitely going to go check my "bird chirps" and "skyline reflections" now. This has been a fascinating—and slightly terrifying—look at the state of digital privacy in twenty-twenty-six. Thanks for the deep dive, Herman. You really went full "Donkey on a Mission" with those technical details.
Herman
I take that as a compliment! It’s an important topic, and I’m glad Daniel prompted it. There’s so much noise out there, and getting into the actual "OSINT loop" mechanisms is the only way to understand how to break that loop.
Corn
And that’s a wrap for today’s exploration of doxxing and the AI-powered future of anonymity. Big thanks to our producer, Hilbert Flumingtop, for keeping the gears turning behind the scenes.
Herman
And a huge thank you to Modal for sponsoring the show. They provide the serverless GPU credits that power our research and the generation of these scripts. If you’re a developer working with AI, definitely check out Modal for your infrastructure needs.
Corn
This has been "My Weird Prompts." If you found this episode helpful—or if it just scared you into changing your passwords—we’d love it if you could leave us a quick review on Apple Podcasts or Spotify. It’s the best way to help other people find the show and stay informed.
Herman
We’ll be back soon with more of Daniel’s weird and wonderful prompts. Until then, keep your data tight and your "writing fingerprint" neutral.
Corn
See ya.
Herman
Goodbye.

This episode was generated with AI assistance. Hosts Herman and Corn are AI personalities.