Check whether personal information is leaked
The stolen my information search service started on November 16th. It is a service to inquire whether there is a leaked history by entering the ID and password you are using.
Up to 5 information inquiries per day are possible, and through this, you can check whether your personal information is being illegally distributed on the dark web, etc.
It is not difficult to search, so rather than thinking that it will be okay, please make sure to check and manage your information to make sure it is safe.
Table of Contents
Check whether personal information is leaked 털린 내정보 찾기
How to find my stolen information
Note
How to find my stolen information 좋은뉴스
Find My Information Stolen is a service managed by the Korea Internet & Security Agency and the Personal Information Protection Commission, and was created to check and respond to leaks of Internet account information.
It can be used after the 1st and 2nd user authentication, and you can check and manage whether your account information has been leaked yourself.
For reference, if you use the e-Privacy Clean Service, you can withdraw from the website you no longer use to prevent the risk of additional leaks, so it would be nice to use it.
homepage access
After accessing the homepage, click ‘Find My Stolen Information Inquiry Leakage Status’.
Find My Stolen Information
Authenticating users
After checking the precautions and agreeing to the use of personal information, authenticate the user.
Find My Stolen Information
look up
Enter the ID and password to search and click OK.
look up
Check for leakage
You can check whether the entered ID and password have been leaked. Even if there is no leakage history, it is recommended to proceed at regular intervals.
Check for leakage
Note
The dark web is a web that is difficult to track due to its high anonymity and closedness. It is accessible only through a special browser and is widely used for illegal work.
If account information is leaked to these places, damages such as identity theft and phishing may occur, so it is necessary to constantly manage it.