털린 내 정보 찾기 바로가기 및 사용방법 Shortcut to find my stolen information and how to use it

How to use ‘Find My Stolen Information’, Review!
털린 내 정보 찾기

Source: Korea Internet & Security Agency homepage

How to use ‘Find my stolen information’, reviews!

“Find my stolen information?”
Today, while browsing the Internet news, there was a keyword that caught my eye.
‘Find my stolen information!’ As the name suggests, I thought it would be a service for personal information security and leakage.
Nowadays, with the development of online and digital technology, in an era where personal information is used for everything such as loans, finance, and shopping, the security of personal information is emphasized.
Also, since the service was just opened yesterday (16th), my curiosity exploded, so I tried ‘Find My Stolen Information’ in the early morning hours.

털린 내 정보 찾기

 

What is the stolen my information search service?
What is the stolen my information search service? Personal information (ID, password) illegally distributed on the Internet is being abused for various crimes such as identity theft and voice phishing, and is a service to prevent secondary damage by checking my information leaked on voice sites such as the dark web. no see.
The stolen My Information service encrypts the account information (ID, password) entered by the user and performs only simple comparison, and does not store or store plain text data.

Find my soon stolen information is a personal security service that allows you to check whether your personal information (e-mail) has been leaked, and if there is a leak, you can withdraw or change your password.

Find My Information Stolen is a service operated by the Personal Information Protection Commission and the Korea Internet & Security Agency (KISA) and started on the 16th (Tuesday).
If you enter your e-mail account information that you usually use online in Find My Information stolen, you can immediately (quickly) check whether it has been leaked through 23 million online account information that is illegally distributed on the dark web.

 

▶ Go to My Stolen Information Finder Service!
https://kidc.eprivacy.go.kr/

Stolen My Information Finding Service

Stop playing the notification board

kidc.eprivacy.go.kr

▶ Video on how to use the Find My Stolen Information service

How to use ‘Find My Stolen Information Service’

Source: Korea Internet & Security Agency homepage
– Up to 5 email accounts can be searched and viewed
– Write down the ID and password of the account (mail) to be searched in advance!

 

 

1. Access the stolen My Information Finder website

– To use Find My Information stolen, the first thing to do is to access the Find My Information stolen homepage.
-> The shortcut to the homepage of Find My Information, which has been stolen, has a link attached above the article. Move comfortably~

 

Source: Korea Internet & Security Agency homepage

 

2. Personal verification, mail verification

– In order to use Find My Information Stolen, you must first verify your personal identity. Personal authentication is possible through your own mail account.
-> If you enter your e-mail address, an authentication number will be sent to the e-mail you entered. Then check the email you received and enter the number to complete the verification.
-> Next, check ‘I’m not a robot’ as shown in the right picture above. Then authentication is complete.

 

 

3. Find my stolen information Enter information and check leakage

 

– You can search immediately after your identity verification is complete. At this time, you can search up to 5 IDs in total with one mail account. Enter 5 of your usual email IDs and passwords, and click the OK button.
-> If you usually use multiple emails (more than 5), select the account you want to check! Also, it is recommended that you check and write down your email account ID and password in advance.
-> First of all, I searched by entering three mail IDs and passwords.

 

– You can check the result of finding my stolen information right away. A message such as “There is no leak history” or “There is a leak history” will appear. ^^ Fortunately, I found that there was no leak history.
-> When I tried it, I was able to use the find my information service that was stolen really quickly and easily.

 

Source: Korea Internet & Security Agency homepage
– If a message appears stating that it has been leaked, you can change the password according to the ‘Guide to Choosing and Using Safe Passwords’ menu.
-> As shown in the picture above, you can also request membership withdrawal from the site you have joined by using the ‘Privacy Clean Service’ found on the ‘Notification Board’ of the same site. In addition, you can check all the history of the site you have signed up for by simply verifying your identity.
-> You can withdraw from the Privacy Clean service without entering your ID or password.

 

<Helpful information to know~~~^^>
Norovirus Food Poisoning Symptoms, Causes of Infection, Prevention!

A list of 100 gas stations that sell urea for vehicles!

Join Disney Plus, Price Testimonials!

Mandatory issuance of wage statements, free distribution of forms and programs!

Mandatory issuance of wage statements, free distribution of forms and programs!

Mandatory issuance of wage statements, free distribution of forms and programs! An important system is implemented in the workplaces that employ and pay workers. It is a system that requires the issuance of wage statements. wages are work

yamlove77.com

Testimonials of ‘Find My Lost Information Service’ (advantages and supplementary points)

– Limited to 5 inquiry IDs
– Short information input time for authentication

I used it in the early morning of the 17th, so there were not many users. Looking at the reviews of users on the 16th, the following inconveniences appeared.

1. It was difficult because the information input time for authentication was short!
– After authentication, the valid time for authentication is about 3 to 5 minutes, so you must enter all of your ID and password within the time. When the authentication time expires, you must go back to the beginning and authenticate yourself again, but the email you wrote at the beginning cannot be rewritten for one day.
-> If so, it is said that there is an inconvenience of having to proceed with authentication with a different email.

 

 

2. Authentication process error problem!
– The user authenticated properly, but there were also problems such as not moving to the next screen with the message ‘Invalid access’ appearing.

Other than the above minor problems, I was able to use the Find My Information service, which was stolen really quickly and easily.
Personal information security is the life of this era, I hope you all try to find my stolen information. A warm heart will be refreshed.