forked from nihilist/blog-contributions
Refined post, added character interraction, updated graphs and added character building section.
This commit is contained in:
parent
90cb2105fd
commit
b8535ffc45
BIN
opsec/multiple_identities/characters.png
Normal file
BIN
opsec/multiple_identities/characters.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 70 KiB |
Binary file not shown.
Before Width: | Height: | Size: 18 KiB |
@ -10,22 +10,22 @@
|
|||||||
|
|
||||||
<body>
|
<body>
|
||||||
|
|
||||||
<!-- Navbar -->
|
<!-- Navbar -->
|
||||||
<div class="navbar navbar-inverse-anon navbar-static-top">
|
<div class="navbar navbar-inverse-anon navbar-static-top">
|
||||||
<div class="container">
|
<div class="container">
|
||||||
<div class="navbar-header">
|
<div class="navbar-header">
|
||||||
<a class="navbar-brand-anon" href="/index.html">The Nihilism Blog</a>
|
<a class="navbar-brand-anon" href="/index.html">The Nihilism Blog</a>
|
||||||
</div>
|
</div>
|
||||||
<div class="navbar-collapse collapse">
|
<div class="navbar-collapse collapse">
|
||||||
<ul class="nav navbar-nav navbar-right">
|
<ul class="nav navbar-nav navbar-right">
|
||||||
<li><a href="/about.html">About</a></li>
|
<li><a href="/about.html">About</a></li>
|
||||||
<li><a href="/blog.html">Categories</a></li>
|
<li><a href="/blog.html">Categories</a></li>
|
||||||
<li><a href="/donate.html">Donate</a></li>
|
<li><a href="/donate.html">Donate</a></li>
|
||||||
<li><a href="/contact.html">Contact</a></li>
|
<li><a href="/contact.html">Contact</a></li>
|
||||||
</ul>
|
</ul>
|
||||||
</div>
|
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
</div>
|
||||||
|
|
||||||
<!-- Introduction -->
|
<!-- Introduction -->
|
||||||
<div id="anon2">
|
<div id="anon2">
|
||||||
@ -39,168 +39,184 @@
|
|||||||
<span class="author-date">Hoover - 2024-10-09</span>
|
<span class="author-date">Hoover - 2024-10-09</span>
|
||||||
</p>
|
</p>
|
||||||
<h1>How to Maintain Multiple Identities Online</h1>
|
<h1>How to Maintain Multiple Identities Online</h1>
|
||||||
<p>In this tutorial, we're going to explore how to maintain multiple
|
<p>In this tutorial, we’ll guide you through setting up and managing multiple online identities to enhance your privacy and security. We’ll discuss why this is crucial, how to establish distinct personas, and the steps you need to keep them isolated from each other.</p>
|
||||||
online identities to protect your privacy and enhance your
|
|
||||||
security. We'll cover why it's important, what you need to do, and
|
|
||||||
how to set it up step by step.</p>
|
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<!-- Recommended Technology -->
|
<!-- OPSEC Recommendations -->
|
||||||
<div id="anon3">
|
<div id="anon3">
|
||||||
<div class="container">
|
<div class="container">
|
||||||
<div class="row">
|
<div class="row">
|
||||||
<div class="col-lg-8 col-lg-offset-2">
|
<div class="col-lg-8 col-lg-offset-2">
|
||||||
<h2><b>Recommended Technology</b></h2>
|
<h2><b>OPSEC Recommendations</b></h2>
|
||||||
|
<p>Each identity should have a distinct virtual environment, using a dedicated VM with specific configurations:</p>
|
||||||
<ul>
|
<ul>
|
||||||
<li><p><strong>Hardware:</strong> Laptop / Personal Computer</p></li>
|
<li><strong>Public Identity:</strong>
|
||||||
<li><p><strong>Host OS:</strong> <a href="../linux/index.html">Linux</a></p></li>
|
<ul>
|
||||||
<li><p><strong>Hypervisor:</strong> libvirtd QEMU/KVM</p></li>
|
<li>Hardware: Laptop / Desktop Computer</li>
|
||||||
<li><p><strong>Virtual Machine:</strong> <a
|
<li>Host OS: Any preferred OS</li>
|
||||||
href="../whonixqemuvms/index.html">Whonix QEMU</a></p></li>
|
<li>VM: <a href="../hypervisorsetup/index.html">Basic Windows VM</a></li>
|
||||||
|
</ul>
|
||||||
|
</li>
|
||||||
|
<li><strong>Private Identity:</strong>
|
||||||
|
<ul>
|
||||||
|
<li>Hardware: Laptop / Desktop Computer</li>
|
||||||
|
<li>Host OS: <a href="../linux/index.html">Linux</a> (e.g., Debian)</li>
|
||||||
|
<li>VM: Linux-based VM (Debian or Ubuntu)</li>
|
||||||
|
</ul>
|
||||||
|
</li>
|
||||||
|
<li><strong>Anonymous Identity:</strong>
|
||||||
|
<ul>
|
||||||
|
<li>Hardware: Laptop / Desktop Computer</li>
|
||||||
|
<li>Host OS: <a href="../linux/index.html">Linux</a> (eg. Debian)</li>
|
||||||
|
<li>VM: <a href="../whonixqemuvms/index.html">Whonix QEMU</a> with Tor integration</li>
|
||||||
|
</ul>
|
||||||
|
</li>
|
||||||
|
<li><strong>Sensitive Identity:</strong>
|
||||||
|
<ul>
|
||||||
|
<li>Hardware: Laptop / Desktop Computer</li>
|
||||||
|
<li>Host OS: <a href="../linux/index.html">Linux</a></li>
|
||||||
|
<li>VM: <a href="../anonymity/index.html">Whonix QEMU</a>, with VeraCrypt hidden volume</li>
|
||||||
|
</ul>
|
||||||
|
</li>
|
||||||
</ul>
|
</ul>
|
||||||
|
<p>
|
||||||
|
<img src="../internetsegmentation/6.png" class="imgRz" alt="VM Setup Diagram">
|
||||||
|
</p>
|
||||||
|
<p>Refer to our guide on <a href="../internetsegmentation/index.html">Internet Use Segmentation</a> for detailed setup instructions.</p>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<!-- Main Content -->
|
<!-- Why Maintain Multiple Identities? -->
|
||||||
<div id="anon2">
|
<div id="anon2">
|
||||||
<div class="container">
|
<div class="container">
|
||||||
<div class="row">
|
<div class="row">
|
||||||
<div class="col-lg-8 col-lg-offset-2">
|
<div class="col-lg-8 col-lg-offset-2">
|
||||||
|
|
||||||
<!-- Why is Maintaining Multiple Identities Important? -->
|
|
||||||
<h3><b>Why Maintain Multiple Online Identities?</b></h3>
|
<h3><b>Why Maintain Multiple Online Identities?</b></h3>
|
||||||
<p>
|
<p>In the digital age, entities like advertisers, corporations, and hackers constantly monitor online activity. Using a single identity for everything allows these actors to build comprehensive profiles about you, threatening your privacy.</p>
|
||||||
In today's digital age, our online activities are constantly
|
<p>Multiple identities help compartmentalize your activities. This approach minimizes the risk of data leakage, prevents profiling, and puts you in control of what information is shared.</p>
|
||||||
monitored and tracked by various entities, including advertisers,
|
|
||||||
corporations, and malicious actors. Using a single identity across
|
|
||||||
all your online activities makes it easier for these entities to
|
|
||||||
build a comprehensive profile about you, which can compromise your
|
|
||||||
privacy and security.
|
|
||||||
</p>
|
|
||||||
<p>
|
|
||||||
By maintaining multiple, separate identities for different types
|
|
||||||
of online activities, you can compartmentalize your digital
|
|
||||||
footprint, making it much harder for anyone to link your
|
|
||||||
activities together. This enhances your privacy, protects you from
|
|
||||||
profiling, and gives you greater control over your personal
|
|
||||||
information.
|
|
||||||
</p>
|
|
||||||
|
|
||||||
<!-- What You Need to Do -->
|
|
||||||
<h3><b>What We'll Be Doing</b></h3>
|
<h3><b>What We'll Be Doing</b></h3>
|
||||||
<p>
|
<p>We’ll create multiple VMs dedicated to different types of internet activities:</p>
|
||||||
We'll be setting up multiple virtual machines (VMs), each
|
|
||||||
dedicated to a specific identity corresponding to different
|
|
||||||
internet usage types:
|
|
||||||
</p>
|
|
||||||
<ul>
|
<ul>
|
||||||
<li><strong>Public Identity</strong>: For activities that are
|
<li><strong>Public Identity:</strong> Real-world activities linked to your true identity.</li>
|
||||||
public and linked to your real identity.</li>
|
<li><strong>Private Identity:</strong> Privacy-focused activities that don’t require anonymity.</li>
|
||||||
<li><strong>Private Identity</strong>: For activities you wish to
|
<li><strong>Anonymous Identity:</strong> Activities requiring anonymity (e.g., whistleblowing).</li>
|
||||||
keep private but don't require anonymity.</li>
|
<li><strong>Sensitive Identity:</strong> Highly secure activities where plausible deniability is crucial.</li>
|
||||||
<li><strong>Anonymous Identity</strong>: For activities where you
|
|
||||||
want to remain anonymous.</li>
|
|
||||||
<li><strong>Sensitive Identity</strong>: For highly sensitive
|
|
||||||
activities requiring plausible deniability.</li>
|
|
||||||
</ul>
|
</ul>
|
||||||
<p>
|
<p>Each identity will have a unique persona, distinct writing style, and separate digital environment. Complete isolation will be maintained by using separate VMs and following strict operational security practices.</p>
|
||||||
We'll assign distinct personas to each identity, define their
|
|
||||||
personalities and communication styles, and ensure complete
|
|
||||||
separation between them by using dedicated VMs and following
|
|
||||||
strict operational security practices.
|
|
||||||
</p>
|
|
||||||
<!-- +++++ Second Post +++++ -->
|
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
|
<!-- Setting Up Multiple Identities -->
|
||||||
<div id="anon3">
|
<div id="anon3">
|
||||||
<div class="container">
|
<div class="container">
|
||||||
<div class="row">
|
<div class="row">
|
||||||
<div class="col-lg-8 col-lg-offset-2">
|
<div class="col-lg-8 col-lg-offset-2">
|
||||||
|
<h2><b>Setting Up Multiple Identities</b></h2>
|
||||||
<!-- How to Set Up Multiple Identities -->
|
<p>Start by defining distinct identities with clear boundaries:</p>
|
||||||
<h3><b>Setting Up Multiple Identities</b></h3>
|
|
||||||
<p>
|
|
||||||
The first step of compartmentalizing your online personas is to
|
|
||||||
create a strong outline for your four identities. The idea is to
|
|
||||||
separate your internet activity, so these personas must never
|
|
||||||
cross paths. Think of them as real humans, each with their own
|
|
||||||
ideas, interests, and way of expressing themselves.
|
|
||||||
</p>
|
|
||||||
<p>
|
|
||||||
<img src="separation.png" class="imgRz"
|
|
||||||
alt="Identity Separation Diagram">
|
|
||||||
</p>
|
|
||||||
<ul>
|
<ul>
|
||||||
<li><strong>Alice Liddell (Public Identity)</strong>: Professional
|
<li><strong>Public Identity (Alice Liddell):</strong> Real name, linked to real-world activities.</li>
|
||||||
and formal communication style.</li>
|
<li><strong>Private Identity (Bob Marley):</strong> Pseudonym, may reveal the real name if necessary.</li>
|
||||||
<li><strong>Bob Marley (Private Identity)</strong>: Casual and
|
<li><strong>Anonymous Identity (Charlie Chaplin):</strong> No real identity linkage, anonymous persona.</li>
|
||||||
friendly communication style.</li>
|
<li><strong>Sensitive Identity (Dave Mustaine):</strong> Completely anonymous, sensitive activities only.</li>
|
||||||
<li><strong>Charlie Chaplin (Anonymous Identity)</strong>: Witty
|
|
||||||
and humorous communication style.</li>
|
|
||||||
<li><strong>Dave Mustaine (Sensitive Identity)</strong>: Serious
|
|
||||||
and cautious communication style.</li>
|
|
||||||
</ul>
|
</ul>
|
||||||
<p>
|
<p>Each identity should exhibit different behaviors and writing styles to avoid detection via linguistic analysis.</p>
|
||||||
Each identity should have a distinct personality and writing style
|
|
||||||
to prevent linkage through behavioral analysis. Be mindful of your
|
|
||||||
way of expressing yourself and don't reveal details which could
|
|
||||||
infringe on your other personas. There have been real world cases
|
|
||||||
of linguistic analysis leading to arrests simply because the user
|
|
||||||
could be traced between multiple personas through linguistic
|
|
||||||
tendencies, such as misspelling a word in a unique way.
|
|
||||||
</p>
|
|
||||||
<p>
|
|
||||||
To help maintain distinct writing styles, you can use a local
|
|
||||||
Language Model (LLM) to adjust your text. This ensures that each
|
|
||||||
identity's communication remains consistent and unlinked.
|
|
||||||
</p>
|
|
||||||
<p>
|
|
||||||
See our tutorial on <a href="local_llm_tutorial/index.html">How to
|
|
||||||
Use a Local LLM to Change Your Writing Style</a> for detailed
|
|
||||||
instructions.
|
|
||||||
</p>
|
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<!-- Conclusion -->
|
<!-- Character Building Section -->
|
||||||
<div id="anon1">
|
<div id="anon2">
|
||||||
|
<div class="container">
|
||||||
|
<div class="row">
|
||||||
|
<div class="col-lg-8 col-lg-offset-2">
|
||||||
|
<h2><b>Building the Characters</b></h2>
|
||||||
|
<p>Follow these principles when building each character:</p>
|
||||||
|
<ul>
|
||||||
|
<li><strong>Distinctiveness:</strong> Each identity should have unique traits and online behavior.</li>
|
||||||
|
<li><strong>Separation:</strong> Identities should never interact or reference each other.</li>
|
||||||
|
<li><strong>Isolation:</strong> Services, accounts, or data should not be shared across identities.</li>
|
||||||
|
<li><strong>Dedicated VM for Each Identity:</strong> Use separate VMs as described in the OPSEC section.</li>
|
||||||
|
</ul>
|
||||||
|
<p>Below is a diagram showing how to build each character:</p>
|
||||||
|
<p>
|
||||||
|
<img src="characters.png" class="imgRz" alt="Character Building Diagram">
|
||||||
|
</p>
|
||||||
|
<p><b>Example Character Profiles:</b></p>
|
||||||
|
<ul>
|
||||||
|
<li><strong>Alice Liddell:</strong> Tech enthusiast, writes formally on open-source software forums. Formal, technical, and informative. Uses industry-specific jargon and includes references to technical documentation.</li>
|
||||||
|
<li><strong>Bob Marley:</strong> Music fan, uses casual language, active on music-related forums. Conversational and relaxed, often using slang or informal language. References musical terms and uses expressive language.</li>
|
||||||
|
<li><strong>Charlie Chaplin:</strong> Anonymity advocate, terse language, posts in privacy-focused communities. Terse, direct, and factual. Avoids personal anecdotes and uses technical language related to privacy and security.</li>
|
||||||
|
<li><strong>Dave Mustaine:</strong> Security expert, concise and secretive, uses encrypted channels only. Short, concise, and serious. Uses formal language and avoids any expressions that might reveal personal details or writing habits.</li>
|
||||||
|
</ul>
|
||||||
|
|
||||||
|
<h3><b>Character Interaction (Example)</b></h3>
|
||||||
|
<p>While these characters should never interact in reality, the following example illustrates how different identities can be made to appear distinct even when discussing the same topic. The brief interaction below is provided for demonstration purposes.</p>
|
||||||
|
|
||||||
|
<p><b>Forum Topic:</b> "Is Basic Security Enough for Online Privacy?"</p>
|
||||||
|
<blockquote>
|
||||||
|
<p><b>Alice Liddell:</b> "Basic security is a good start, but it's crucial to adopt more advanced measures as your digital footprint grows."</p>
|
||||||
|
<p><b>Bob Marley:</b> "tru but who wants to stress over all that? just keep it simple and dont click on sketchy stuff and youll be fine, mon."</p>
|
||||||
|
</blockquote>
|
||||||
|
<p>This example showcases the differences between Alice and Bob:</p>
|
||||||
|
<ul>
|
||||||
|
<li><strong>Alice Liddell:</strong> Uses a formal and cautious approach, advocating for the adoption of advanced security practices as an essential step.</li>
|
||||||
|
<li><strong>Bob Marley:</strong> Takes a laid-back attitude, suggesting that keeping things simple and using common sense is sufficient.</li>
|
||||||
|
</ul>
|
||||||
|
<p>The differences in tone, vocabulary, and approach clearly distinguish the two characters, reinforcing the separation between their online personas.</p>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
|
||||||
|
<!-- Stylometry Section -->
|
||||||
|
<div id="anon3">
|
||||||
<div class="container">
|
<div class="container">
|
||||||
<div class="row">
|
<div class="row">
|
||||||
<div class="col-lg-8 col-lg-offset-2">
|
<div class="col-lg-8 col-lg-offset-2">
|
||||||
<h3><b>Conclusion</b></h3>
|
<h2><b>Stylometry: Risks and Real-World Cases</b></h2>
|
||||||
<p>
|
<p>Stylometry analyzes writing style to link identities. Consider these real-world examples:</p>
|
||||||
By following this tutorial, you've established multiple isolated
|
<ul>
|
||||||
online identities, each with its own dedicated environment and
|
<li><a href="https://www.smithsonianmag.com/science-nature/how-did-computers-uncover-jk-rowlings-pseudonym-180949824/">J.K. Rowling</a>: Revealed as the author of *The Cuckoo's Calling* through linguistic clues.</li>
|
||||||
persona. This approach significantly enhances your online privacy
|
<li><a href="https://theconversation.com/how-the-unabombers-unique-linguistic-fingerprints-led-to-his-capture-207681">Ted Kaczynski</a>: The Unabomber was caught due to similarities in writing style.</li>
|
||||||
and security by preventing different aspects of your digital life
|
</ul>
|
||||||
from being linked.
|
<p>To mitigate stylometry risks:</p>
|
||||||
</p>
|
<ul>
|
||||||
<p>
|
<li>Vary your writing style, sentence structure, and vocabulary.</li>
|
||||||
Always maintain discipline in keeping these identities separate,
|
<li>Avoid using distinctive punctuation or spelling patterns.</li>
|
||||||
and regularly update your systems to protect against new threats.
|
<li>Use paraphrasing tools or AI assistance to diversify your style.</li>
|
||||||
With careful implementation of these practices, you can take
|
</ul>
|
||||||
control of your digital presence.
|
|
||||||
</p>
|
|
||||||
<h3><b>What You've Accomplished</b></h3>
|
|
||||||
<p>
|
|
||||||
- Created distinct identities with unique personas.<br>
|
|
||||||
- Set up virtual machines for each identity.<br>
|
|
||||||
- Implemented operational security practices.
|
|
||||||
</p>
|
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
|
|
||||||
|
<!-- Conclusion -->
|
||||||
|
<div id="anon1">
|
||||||
|
<div class="container">
|
||||||
|
<div class="row">
|
||||||
|
<div class="col-lg-8 col-lg-offset-2">
|
||||||
|
<h3><b>Conclusion</b></h3>
|
||||||
|
<p>By following this tutorial, you’ve created multiple isolated online identities, each with its own dedicated environment and persona. This approach enhances your online privacy and security by compartmentalizing your digital life.</p>
|
||||||
|
<p>Always maintain discipline in keeping these identities separate, and regularly update your systems to protect against emerging threats. With careful implementation, you can take control of your digital presence.</p>
|
||||||
|
<h3><b>What You've Accomplished</b></h3>
|
||||||
|
<p>- Established distinct identities with unique personas.<br>
|
||||||
|
- Configured virtual machines for each identity.<br>
|
||||||
|
- Implemented robust operational security practices.</p>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
|
||||||
<!-- Footer -->
|
<!-- Footer -->
|
||||||
<div id="anonb">
|
<div id="anonb">
|
||||||
<div class="container">
|
<div class="container">
|
||||||
|
Binary file not shown.
Before Width: | Height: | Size: 74 KiB |
Loading…
Reference in New Issue
Block a user