Hack TikTok account

The best hacking techniques

How to hack a TikTok account?

Solutions that work

The IT security of social media accounts remains one of our highest priorities as users. Indeed, when we examine the most used platforms, social networks occupy a preponderant place, with TikTok appearing well among the top 5.

This article is intended to be a tutorial to learn how to hack a TikTok account. Rather, it aims to help you better understand the threat, by providing you with advice to protect yourself and avoid any risk of exposure.

Why is it important to understand the threats to your TikTok account?

First of all, it is crucial to understand that TikTok is not just a source of entertainment. For many people, it is a source of income. Additionally, as a social network, TikTok contains personal data that could be exploited for nefarious purposes, such as identity theft, hijacking of online accounts or theft of money.

Hack a TikTok password can meet various needs, thus emphasizing the need to protect oneself.

We will describe proven methods that continue to be used by TikTok account hackers.

What hacking techniques could be used to hack a TikTok account?

There are several hacking methods. We have very popular techniques that are well known to the general public, these are methods that have already been the subject of several publications, warnings and warnings. Beyond these popular techniques, there are lesser-known methods that you've probably never heard of.


PASS UNLOCKER


Decrypt a TikTok password
Here’s how to decrypt TikTok
passwords using PASS UNLOCKER

This application is the best solution to regain access to a TikTok password using a @username, phone number, or email address. By entering any one of these three pieces of information, PASS UNLOCKER uses an advanced algorithm to decrypt and display the password directly on your screen, allowing you to log in to the TikTok account effortlessly.

You can download PASS UNLOCKER from its official website: https://www.passwordrevelator.net/en/passunlocker


Technique 2: Phishing


Phishing TikTok

If there is one technique widely used by hackers to steal login credentials and hijack online accounts, it is undoubtedly phishing.

What does this technique consist of?

The phishing technique consists of sending a link to the target, contained in a standard message inviting them to perform a particular task. In our context, this could involve impersonating TikTok by asking the target to fill out a form requiring their login credentials, for example. Another possibility is to make the target believe that they are the victim of a hack and that they should quickly change their login credentials. Following this message, a link inviting them to validate the modification will allow them to have their connection credentials stolen.

We have all been targeted by this type of message at least once, so be vigilant now.


Technique 3: Password recovery


Password databases

Recovering a password requires decryption, analysis and deduction. There are several ways to crack a password.

First of all, we have the brute force method, which involves randomly generating several combinations of letters, words and symbols, trying them one by one to find the right one. This process is automated using special software or suitable scripts. Depending on the difficulty of the password, the attack may succeed immediately or take several days. It is important to note that the computing power of the device used plays a crucial role in its effectiveness.

Dictionary attack is another password recovery method:

The dictionary attack involves grouping together all kinds of combinations, known as potential passwords. These combinations may be based on user habits or passwords obtained through leaked databases. This grouping is called a dictionary and thanks to this, the hacker filters the information until he finds the personal data of interest.


Technique 4: Spyware


TikTok Spyware

We can't talk about account hacking without talking about spyware. As their name suggests, these are computer programs intended to exfiltrate information of any kind without the victim's knowledge. For stealing login credentials, they are very effective.

Malware is installed on the terminals of targeted people before being operational. Their installation can be done remotely or manually.

Among the most used spyware, we have keylogger, a keylogger. Its function is to collect all the information entered by the keyboard of the contaminated terminal. Once this information is collected, it is sent directly to the spyware operator. This method cannot be used against devices that use numeric keypads. To counter this limitation, hackers have developed software that spy on the screen, called screen recorders. These software allow you to monitor the activity taking place on the device screen, thus providing a solution to this limitation.


Technique 5: Social engineering


TikTok Social engineering

Social engineering is a common method but often overlooked by potential victims. Often, when we talk about hacking, we automatically think of the use of complex means, long lines of code or sophisticated software. However, simple ways exist and social engineering is a clear example. In this method, the hacker simply attempts to collect various information about his target by establishing contact through social media or other means. The goal is to ask questions to elicit information, capitalizing on the fact that most of us create passwords based on information from our daily lives. So, asking for your loved ones' names, date of birth, or other information can help find your password. Even simple questions such as your dog's name can be exploited, so be careful.


Technique 6: Quishing or QR code hacking


QR code hack

Whether to make a contactless purchase or access a specific platform, QR code scanning has become common practice. However, this democratization of QR codes has also attracted the attention of cybercriminals. They replace QR codes in public places with similar codes that redirect their victims to fake platforms, a kind of QR code phishing. Although the idea is similar to phishing, this time it's not a link you click on.


Technique 7: Fake WiFi hotspot


Fake WiFi Hotspot

This technique is well known. It involves the use of a fake WiFi network to trick users. When we are in a public place, we all tend to look for a free Internet connection, usually the one in the specific location we are at. In this context, it is easy to trap ourselves. The cybercriminal simply deploys a WiFi network that he controls. On every connection, it can collect data by injecting automatic but malicious scripts.


Technique 8: SIM Swap


Hacker SIM Swaping

This is a method of stealing a target's phone number with the intention of using it for malicious purposes. If you are wondering how stealing a phone number can help crack a TikTok password, here is the explanation. Generally, our online accounts are associated with our telephone numbers, allowing us to reset the password if necessary. During the reset process, a unique code is sent via message to the user's phone number. This code authenticates their identity and allows them to change their password. In other words, with access to your phone number, any hacker can hijack your online account.

You may be wondering how a hacker can steal someone else's phone number. It's important to note that this technique has been used before, with one of the most famous victims being former Twitter executive Jack Dorsey.

First of all, the criminal must have sufficient personal information about his target, such as first and last names, date of birth and other elements that can be collected on social networks. Once this information is gathered, the hacker remotely contacts the telephone operator posing as the victim and providing all the necessary information. When the identity is confirmed, the operator asks to retrieve the phone number from a new SIM card delivered to it. To do this, the hacker can cite a failure of their current SIM card or claim to have lost their phone. Once the identity is confirmed, the telephone operator transfers the phone number, allowing the hacker to take control.


Conclusion:

In view of the above, it is important to recognize that the use of TikTok can potentially expose users to hacking risks. Hacking methods are varied and at any time, cybercriminals can exploit the site's vulnerabilities. Therefore, it is imperative to take steps to strengthen your online security.


How to Protect Your TikTok Account Against Hacking

Whether it's TikTok or any other social media platform, account security should be your top priority from the moment you create your profile. While no protection measure is 100% foolproof, implementing multiple security layers can significantly reduce your risk of being hacked and make it extremely difficult for cybercriminals to compromise your account.

Protecting your TikTok account requires ongoing vigilance and adherence to cybersecurity best practices. Below, we've outlined nine essential security measures that will help you safeguard your account, personal information, and digital presence.

Essential Steps to Secure Your TikTok Account:


1. Enable Two-Factor Authentication (2FA)


TikTok two-factor authentication setup

Two-factor authentication (2FA) is one of the most effective security measures you can implement to protect your TikTok account. This additional layer of security requires two forms of verification before granting access to your account.

How Two-Factor Authentication Works:

After entering your standard login credentials (username and password), you'll need to provide a second verification code. This code is typically:

  • Sent via SMS to your registered phone number
  • Delivered through email
  • Generated by authenticator apps like Google Authenticator or Microsoft Authenticator
  • Created through hardware security keys for advanced protection

How to Enable 2FA on TikTok:

  1. Open the TikTok app and go to your profile
  2. Tap the three-line menu icon in the top right corner
  3. Select "Settings and privacy"
  4. Navigate to "Security and login"
  5. Choose "2-step verification"
  6. Select your preferred verification method (SMS, email, or authenticator app)
  7. Follow the on-screen instructions to complete setup

Pro tip: Authenticator apps are more secure than SMS-based 2FA because they're not vulnerable to SIM-swapping attacks. For maximum security, consider using app-based authentication.


2. Limit Personal Information Exposure on Social Media


Social media privacy protection

Oversharing on social media is one of the biggest security risks users face today. Every piece of information you share online can potentially be used against you by cybercriminals for social engineering attacks, identity theft, or account takeovers.

Information to Keep Private:

  • Location data: Real-time check-ins, geotags, and addresses
  • Personal identifiers: Full name, date of birth, phone numbers
  • Family information: Names of relatives, pets, schools
  • Financial details: Bank names, credit card information
  • Travel plans: Vacation dates, flight information
  • Security question answers: Mother's maiden name, first pet, childhood street

Best Practices for Social Media Privacy:

  1. Review privacy settings: Go to TikTok Settings → Privacy → adjust who can view your content, send you messages, and comment on your videos
  2. Make your account private: This ensures only approved followers can see your content
  3. Be selective with followers: Don't accept follow requests from unknown accounts
  4. Disable location services: Turn off geolocation for TikTok in your device settings
  5. Think before you post: Ask yourself if the information could be used maliciously
  6. Audit your profile regularly: Review old posts and remove overly personal information

Learn more about TikTok privacy settings on the official support page.


3. Avoid Third-Party Applications


Third-party app security risks

Third-party applications often promise enhanced features like follower analytics, video editing tools, or automated engagement. However, these apps pose significant security risks and frequently violate TikTok's terms of service.

Dangers of Third-Party Apps:

  • Data harvesting: Unauthorized collection of your personal information and account credentials
  • Account compromise: Apps may request login details, giving them full access to your account
  • Malware distribution: Some apps contain viruses or spyware
  • Account suspension: Using unauthorized apps can result in permanent TikTok account bans
  • Privacy violations: Your data may be sold to third parties

Red Flags to Watch For:

  • Apps requesting your TikTok password
  • Promises of free followers, likes, or views
  • Requests for excessive permissions
  • Apps not available on official app stores
  • Poor reviews or no company information

What to Do Instead:

Use only official TikTok features and verified partner tools. TikTok offers built-in analytics through TikTok Creator Tools for accounts with creator mode enabled.

If you've already used third-party apps: Change your password immediately, enable 2FA, and review your account activity for any suspicious behavior. Check connected apps in Settings → Security and login → Apps and websites, and revoke access to any unauthorized applications.


4. Keep Your Software Updated


Software security updates

Software updates are critical for maintaining security. Developers constantly discover and patch vulnerabilities that hackers exploit. Delaying updates leaves your device and accounts vulnerable to known security threats.

What to Update Regularly:

  • TikTok app: Update through the App Store (iOS) or Google Play Store (Android)
  • Operating system: Keep iOS, Android, Windows, or macOS current
  • Web browsers: Chrome, Safari, Firefox, Edge
  • Security software: Antivirus and firewall programs
  • Other apps: All applications on your device

How to Enable Automatic Updates:

For iOS:

  1. Go to Settings → App Store
  2. Enable "App Updates"
  3. For system updates: Settings → General → Software Update → Automatic Updates

For Android:

  1. Open Google Play Store
  2. Tap your profile icon → Settings → Network preferences
  3. Select "Auto-update apps" → "Over any network" or "Over WiFi only"
  4. For system updates: Settings → System → System update → Auto-download over WiFi

Important: Security updates often fix critical vulnerabilities. According to cybersecurity research, the majority of successful hacking attempts exploit known vulnerabilities that have already been patched. Don't postpone these updates.

Learn more about keeping your devices secure from CISA's guide on software updates.


5. Install Reliable Antivirus Protection


Mobile antivirus protection

Antivirus software serves as your first line of defense against malware, ransomware, spyware, and other malicious programs that cybercriminals use to steal your credentials and compromise your accounts.

Why You Need Antivirus Protection:

  • Malware detection: Identifies and removes malicious software before it can steal your information
  • Real-time protection: Monitors your device continuously for threats
  • Phishing prevention: Blocks fraudulent websites designed to steal your credentials
  • Safe browsing: Warns you about dangerous links and downloads
  • Data protection: Prevents keyloggers from capturing your passwords

Recommended Antivirus Solutions:

For Desktop (Windows/Mac):

  • Bitdefender - Comprehensive protection with minimal performance impact
  • Norton 360 - Includes VPN and dark web monitoring
  • Kaspersky - Strong malware detection capabilities
  • Malwarebytes - Excellent for removing existing infections

For Mobile (iOS/Android):

Best Practices for Antivirus Use:

  1. Keep it updated: Enable automatic updates for virus definitions
  2. Run regular scans: Schedule weekly full system scans
  3. Don't disable it: Keep real-time protection active at all times
  4. Act on alerts: Don't ignore warnings about suspicious files or websites
  5. Use reputable software: Avoid free antivirus programs with poor reviews

Note for iOS users: While iOS has built-in security features, antivirus apps can still provide additional protection against phishing and malicious websites.


6. Secure Your Connection with a VPN


VPN security protection

A Virtual Private Network (VPN) encrypts your internet connection and masks your IP address, providing essential protection against session hijacking, man-in-the-middle attacks, and surveillance—especially when using public WiFi networks.

How VPNs Protect Your TikTok Account:

  • Encryption: Scrambles your data so hackers can't intercept your login credentials
  • IP masking: Hides your real location and identity
  • Public WiFi protection: Secures your connection on unsecured networks
  • ISP privacy: Prevents your internet provider from monitoring your activity
  • Geo-restriction bypass: Accesses TikTok content from anywhere

Recommended VPN Services:

  • ExpressVPN - Fast speeds with 3,000+ servers worldwide
  • NordVPN - Strong security features and affordable pricing
  • Surfshark - Unlimited devices on one subscription
  • CyberGhost - User-friendly with specialized servers
  • ProtonVPN - Free tier available with strong privacy

When to Use a VPN:

  1. On public WiFi: Always connect to a VPN before accessing TikTok at cafes, airports, or hotels
  2. When traveling: Protect your account in countries with heavy internet surveillance
  3. At home: For additional privacy from your ISP
  4. On shared networks: In dormitories, offices, or shared living spaces

How to Set Up a VPN:

  1. Choose a reputable VPN provider and subscribe
  2. Download the VPN app for your device
  3. Log in with your credentials
  4. Select a server location (usually automatic is best)
  5. Connect to the VPN before opening TikTok

Warning: Avoid free VPN services that may log and sell your data. Reliable VPN services require a subscription to maintain secure infrastructure and strong encryption.


7. Protect Physical Access to Your Devices


Device security protection

All digital security measures become meaningless if someone can physically access your unlocked device. Physical security is the foundation of account protection and should never be overlooked.

Essential Device Security Measures:

1. Lock Screen Protection

  • Biometric authentication: Enable fingerprint or face recognition
  • Strong PIN/password: Use at least 6 digits (avoid 1234, 0000, or birth years)
  • Auto-lock timer: Set your device to lock after 30 seconds to 1 minute of inactivity

2. App-Level Security

Add an extra layer of protection specifically for TikTok:

  • On iOS: Use Screen Time → App Limits → Add password protection
  • On Android: Settings → Security → App Lock (varies by manufacturer)
  • TikTok's built-in lock: Go to Settings → Privacy → Screen Time → Turn on Screen Time Passcode

3. Remote Security Features

Set up device tracking and remote wipe capabilities:

  • iPhone: Enable Find My iPhone in Settings → [Your Name] → Find My
  • Android: Activate Find My Device in Settings → Security → Find My Device

Additional Physical Security Tips:

  1. Never leave devices unattended: Especially in public places
  2. Log out on shared devices: Always sign out of TikTok on computers or tablets you don't own
  3. Disable lock screen notifications: Prevent sensitive information from appearing when locked
  4. Use privacy screens: Prevent shoulder surfing in public
  5. Be cautious with repairs: Only use authorized service centers

How to Set Up Biometric Authentication:

For iPhone (Face ID/Touch ID):

  1. Go to Settings → Face ID & Passcode (or Touch ID & Passcode)
  2. Enter your passcode
  3. Enable Face ID or Touch ID for "iPhone Unlock" and "iTunes & App Store"

For Android (Fingerprint):

  1. Go to Settings → Security → Fingerprint
  2. Follow on-screen instructions to register your fingerprint
  3. Enable "Unlock device" option

8. Create Strong, Unique Passwords


Strong password security

Your password is the primary key to your TikTok account. A weak or reused password is like leaving your front door wide open—it's only a matter of time before someone walks in.

Characteristics of a Strong Password:

  • Length: Minimum 12 characters (16+ recommended)
  • Complexity: Mix of uppercase letters, lowercase letters, numbers, and symbols
  • Randomness: No dictionary words or personal information
  • Uniqueness: Never reuse passwords across different accounts
  • Unpredictability: Avoid patterns or sequences

What NOT to Include in Your Password:

  • Your name, username, or handle
  • Birth dates or anniversaries
  • Pet names or family member names
  • Common words or phrases
  • Sequential numbers (123456) or letters (abcdef)
  • Keyboard patterns (qwerty, asdfgh)
  • Information from your social media profiles

Password Creation Methods:

Method 1: Passphrase

Create a memorable phrase and modify it:

  • Original: "I love making TikTok videos every day"
  • Strong password: "ILv$Mk!ngT1kT0kV1d3@s3vryD@y"

Method 2: Random Generation

Use a password manager to generate truly random passwords like: "X9$mK2!pQ7#nL4@wR8"

Password Managers (Highly Recommended):

Password managers securely store all your passwords and generate strong, unique passwords for each account:

The Danger of Password Reuse:

When you use the same password across multiple accounts, a data breach on one platform compromises all your accounts. According to cybersecurity research, over 60% of users reuse passwords—and this is exactly what hackers count on.

What Happens During a Data Breach:

  1. A website or service gets hacked
  2. Your email and password are stolen
  3. Hackers try your credentials on other platforms (TikTok, Instagram, email, banking, etc.)
  4. All accounts using the same password are compromised

How to Change Your TikTok Password:

  1. Open TikTok and go to your profile
  2. Tap the three-line menu → Settings and privacy
  3. Select "Account" → "Password"
  4. Enter your current password
  5. Create a new strong password
  6. Confirm the new password
  7. Tap "Update password"

Pro tip: Change your password immediately if you suspect any suspicious activity or if a service you use announces a data breach. You can check if your accounts have been compromised at Have I Been Pwned.


9. Maintain Constant Vigilance


Stay vigilant online security

Security is not a one-time setup—it requires ongoing awareness and proactive behavior. As mentioned earlier, no security measure is absolutely foolproof. The human element remains both the strongest and weakest link in cybersecurity.

Recognize Common Threats:

1. Phishing Attacks

Phishing is when cybercriminals impersonate legitimate organizations to steal your credentials:

  • Email phishing: Fake emails claiming to be from TikTok asking you to "verify your account"
  • SMS phishing (Smishing): Text messages with suspicious links
  • Social media phishing: Direct messages claiming you've won prizes or violated terms

Red Flags of Phishing:

  • Urgent language ("Your account will be suspended!")
  • Requests for passwords or verification codes
  • Suspicious sender addresses (tikT0k.com instead of tiktok.com)
  • Generic greetings ("Dear User" instead of your name)
  • Spelling and grammar errors
  • Links that don't match the claimed destination (hover to preview)

Safe Browsing Habits:

  1. Verify URLs: Always check you're on tiktok.com before entering credentials
  2. Use official apps: Download TikTok only from the App Store or Google Play Store
  3. Avoid suspicious links: Never click links in unsolicited messages claiming to be from TikTok
  4. Check for HTTPS: Ensure websites have a padlock icon in the address bar
  5. Don't save passwords in browsers: Use a dedicated password manager instead
  6. Clear browser cache regularly: Especially on shared computers

Public WiFi Dangers:

Public networks are hunting grounds for hackers. These unsecured connections allow cybercriminals to:

  • Intercept your login credentials
  • Monitor your browsing activity
  • Inject malware into your device
  • Perform man-in-the-middle attacks

If You Must Use Public WiFi:

  1. Always connect through a VPN first
  2. Avoid accessing sensitive accounts
  3. Disable auto-connect features
  4. Forget the network after use
  5. Turn off file sharing

Monitor Your Account Activity:

Regularly check for signs of unauthorized access:

How to Review Your TikTok Security:

  1. Go to Settings → Security and login
  2. Check "Security alerts" for unusual activity notifications
  3. Review "Login devices" to see where your account is accessed
  4. Look for "Login activity" to see recent login attempts
  5. Remove any unrecognized devices immediately

Warning Signs of Account Compromise:

  • Videos you didn't post appearing on your profile
  • Messages sent from your account that you didn't write
  • Changes to your profile information or settings
  • New followers or follows you didn't initiate
  • Login alerts from unfamiliar locations
  • Password change notifications you didn't request
  • Inability to log in with your correct password

Stay Informed About Emerging Threats:

Cyber threats evolve constantly. Stay updated by:

What to Do If You Suspect a Security Breach:

  1. Change your password immediately using a different device if possible
  2. Enable 2FA if not already active
  3. Log out of all devices in Settings → Security and login → Login devices → Remove all
  4. Review recent activity and delete any unauthorized content
  5. Report the incident to TikTok through Settings → Report a problem → Account and profile
  6. Scan your device for malware with antivirus software
  7. Check linked accounts and change passwords for any accounts using the same credentials
  8. Notify your contacts if your account was compromised to warn them about potential scam messages

Seek Professional Help When Needed:

If you feel overwhelmed or if your account has been seriously compromised:

  • Contact TikTok Support directly
  • Consult with cybersecurity professionals
  • Consider using identity theft protection services
  • Report serious crimes to local law enforcement

Remember: Cybersecurity is an ongoing commitment, not a one-time task. Each time you log in, you're potentially exposing yourself to threats. By maintaining vigilance and following these best practices consistently, you significantly reduce your risk of account compromise.


Conclusion: Take Control of Your TikTok Security Today

Protecting your TikTok account from hacking requires a multi-layered approach combining technical security measures with smart digital habits. While no single solution provides complete protection, implementing all nine strategies outlined in this guide significantly reduces your vulnerability to cyber attacks.

Quick Security Checklist:

  • ✓ Two-factor authentication enabled
  • ✓ Strong, unique password created (12+ characters)
  • ✓ Privacy settings reviewed and configured
  • ✓ Device lock screen activated with biometrics
  • ✓ Software and apps updated to latest versions
  • ✓ Antivirus protection installed and active
  • ✓ VPN configured for public WiFi use
  • ✓ No third-party apps connected to your account
  • ✓ Regular account activity monitoring scheduled

Take Action Now:

Don't wait until your account is compromised to take these security measures seriously. Start with the most critical steps—enabling two-factor authentication and creating a strong password—and gradually implement the other protections over the coming days.

Additional Resources:

Need Help Recovering Your Account?

If your TikTok account has been hacked and you've lost access to your profile, don't panic. There are recovery options available:

  • Official recovery: Visit TikTok's account recovery page
  • Reset password: Use the "Forgot password?" link on the login screen
  • Contact support: Report the hack through the app or website

Your account security is in your hands. By following these comprehensive guidelines and maintaining constant vigilance, you can enjoy TikTok safely while protecting your personal information and digital identity from cybercriminals. Stay informed, stay protected, and stay safe online.

Last updated: This guide reflects current best practices for TikTok account security. Security recommendations and platform features may change over time, so always refer to official TikTok support documentation for the most current information.


Frequently Asked Questions (FAQs)

1. What is TikTok hacking?

TikTok hacking refers to unauthorized access to TikTok accounts through various techniques such as phishing, spyware, social engineering and more.

2. Why should I be concerned about TikTok hacking?

Concerns about TikTok hacking arise due to potential misuse of personal data, identity theft, or financial loss. As TikTok is a popular social media platform, it becomes a target for cybercriminals.

3. How can I protect my TikTok account?

To protect your TikTok account, you can use measures like enabling two-factor authentication, avoiding third-party apps, running security updates, using antiviruses, employing VPNs, securing access to your device, using strong and unique passwords and staying vigilant.

4. What is two-factor authentication?

Two-factor authentication adds an extra layer of security to your account by requiring a second form of verification, usually a code sent via SMS or email, in addition to your password.

5. Are third-party apps safe to use with TikTok?

It is recommended to avoid using third-party apps with TikTok as they may compromise your account's security by collecting personal data or introducing vulnerabilities.

6. How often should I run security updates?

You should regularly check for and install security updates on your devices to stay protected against potential vulnerabilities. Enabling automatic updates can ensure timely security patches.

7. What is a VPN and how does it protect my connection?

A VPN (Virtual Private Network) encrypts your internet connection, providing anonymity and security by routing your connection through remote servers. This protects your data from interception and enhances privacy.

8. Why is it important to use strong, unique passwords?

Strong, unique passwords are essential to prevent unauthorized access to your accounts. They should be complex and not easily guessable and using different passwords for each account reduces the risk of multiple accounts being compromised in case of a data breach.

9. What should I do if I suspect my TikTok account is hacked?

If you suspect your TikTok account is hacked, you should immediately change your password, enable two-factor authentication, review your account activity for any unauthorized actions and contact TikTok support for assistance.

10. How can professionals help strengthen my online security?

Professionals can offer services such as security audits, risk assessments and implementation of robust security measures tailored to your specific needs. They can also provide guidance on cybersecurity best practices and help mitigate potential threats.