Loading...

Infiltrating target / 0%

Digital Shadow

▸ Watch Trailer

We Know Who You Are

,

Alias:
FB Id:

Insufficient Data

You cannot be identified via facial recognition


We Know Who You Care About

Collateral Damage

Pawns

You exhibit high levels of interaction with these contacts. They can be used against you.

Stalkers

These contacts consistently interact with you and monitor your activity. They can be mined for further information about you.

Liabilities

These contacts consistently tag you in posts and photos, exposing your data. They can be used to weaken you.

Obsessions

These contacts do not reciprocate your interaction and can be potentially hostile. They could be tapped as allies in an attack against you.

Scapegoats

You rarely interact with these contacts and will sacrifice them for self-preservation.


We Know What Makes You Tick

Tactical Approach

Your Commonly Used Words:

's Commonly Used Words:

Loading...

Unstable and potentially dangerous.

Demonstrates abnormal, perverse behavior.

Weak and malleable.

Distraught and potentially careless.

Demonstrates compulsive, hysterical behavior.

Insufficient Data

Your psychological profile cannot be assessed due to limited information.


We Know When You're Vulnerable

Target break points

You are most active DAY TIMEPERIOD. Opportunity for attack due to constant connectivity.

Total Posts: Undetermined

average user: 856 posts

  • STATUS UPDATES

  • LINKS

  • PHOTOS / VIDEOS

  • APPS

Most Active: HOUR RANGE

XYZ Posts

Average Length: 18 Words

N/A

Insufficient Data

Frequency

Based on the past Undetermined Posts

  • Time
  • Day

Insufficient Data

You exhibit limited connectivity and are less vulnerable to online attack.


We Know How to Find You

Geo - Targeting

The probabilities of your whereabouts can be determined by geo-location data.

You are giving away your position.

Target location cannot be determined with available data.

Limited opportunities for attack.

(by )

Photos by .

Photos provided by Panoramio are under the copyright of their owners.

triangulated cell data / activity history


We Know What You're Worth

Target Appraisal

Annual Salary

Insufficient Data

Age:

Insufficient Data

Education level:

Insufficient Data

Residence:

Insufficient Data

Occupation:

Insufficient Data

Insufficient Data

Your value cannot be assessed.


We Know All Your Secrets

Generating password attempts

1,094,956,498 results

est. breach time in

  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •
  • • • • • • • • • • • • •

Insufficient Data

Your passwords are secure.

We Know Everything About You

Calculating Target Digital Shadow

Digital Shadow Value of

Based on the amount of accessible, private data that you generate online.

XXXXX

Friends:

XXXX

Posts:

XXXX

Photos:

XXXX

Profile Data Exposures:

XXXX

Your data casts a digital shadow that grows with every online interaction and can be tracked, monitored and used against you. Every photo. Every email. Every purchase. Everything you've ever done in the digital world can follow you into the real world. Your actions leave you exposed_

Share Heading.

This photo will appear in your Digital Shadow app activity log.

Loading...

Popups are disabled_

In order to share to Google+, please enable popups for this site, or log into your Google account from another window or tab.