Attackers don’t need to hack you to find you. They just piece together what’s already public.