diff --git a/opsec/multiple_identities/characters.png b/opsec/multiple_identities/characters.png new file mode 100644 index 0000000..aaf8207 Binary files /dev/null and b/opsec/multiple_identities/characters.png differ diff --git a/opsec/multiple_identities/identities_banner.png b/opsec/multiple_identities/identities_banner.png deleted file mode 100644 index 36e8d8d..0000000 Binary files a/opsec/multiple_identities/identities_banner.png and /dev/null differ diff --git a/opsec/multiple_identities/index.html b/opsec/multiple_identities/index.html index f556c44..4872c08 100644 --- a/opsec/multiple_identities/index.html +++ b/opsec/multiple_identities/index.html @@ -10,22 +10,22 @@
- - - +Each identity should have a distinct virtual environment, using a dedicated VM with specific configurations:
Hardware: Laptop / Personal Computer
Host OS: Linux
Hypervisor: libvirtd QEMU/KVM
Virtual Machine: Whonix QEMU
+ +
+Refer to our guide on Internet Use Segmentation for detailed setup instructions.
- In today's digital age, our online activities are constantly - monitored and tracked by various entities, including advertisers, - corporations, and malicious actors. Using a single identity across - all your online activities makes it easier for these entities to - build a comprehensive profile about you, which can compromise your - privacy and security. -
-- By maintaining multiple, separate identities for different types - of online activities, you can compartmentalize your digital - footprint, making it much harder for anyone to link your - activities together. This enhances your privacy, protects you from - profiling, and gives you greater control over your personal - information. -
- - +In the digital age, entities like advertisers, corporations, and hackers constantly monitor online activity. Using a single identity for everything allows these actors to build comprehensive profiles about you, threatening your privacy.
+Multiple identities help compartmentalize your activities. This approach minimizes the risk of data leakage, prevents profiling, and puts you in control of what information is shared.
- We'll be setting up multiple virtual machines (VMs), each - dedicated to a specific identity corresponding to different - internet usage types: -
+We’ll create multiple VMs dedicated to different types of internet activities:
- We'll assign distinct personas to each identity, define their - personalities and communication styles, and ensure complete - separation between them by using dedicated VMs and following - strict operational security practices. -
- +Each identity will have a unique persona, distinct writing style, and separate digital environment. Complete isolation will be maintained by using separate VMs and following strict operational security practices.
- The first step of compartmentalizing your online personas is to - create a strong outline for your four identities. The idea is to - separate your internet activity, so these personas must never - cross paths. Think of them as real humans, each with their own - ideas, interests, and way of expressing themselves. -
-- -
+Start by defining distinct identities with clear boundaries:
- Each identity should have a distinct personality and writing style - to prevent linkage through behavioral analysis. Be mindful of your - way of expressing yourself and don't reveal details which could - infringe on your other personas. There have been real world cases - of linguistic analysis leading to arrests simply because the user - could be traced between multiple personas through linguistic - tendencies, such as misspelling a word in a unique way. -
-- To help maintain distinct writing styles, you can use a local - Language Model (LLM) to adjust your text. This ensures that each - identity's communication remains consistent and unlinked. -
-- See our tutorial on How to - Use a Local LLM to Change Your Writing Style for detailed - instructions. -
+Each identity should exhibit different behaviors and writing styles to avoid detection via linguistic analysis.
Follow these principles when building each character:
+Below is a diagram showing how to build each character:
++ +
+Example Character Profiles:
+While these characters should never interact in reality, the following example illustrates how different identities can be made to appear distinct even when discussing the same topic. The brief interaction below is provided for demonstration purposes.
+ +Forum Topic: "Is Basic Security Enough for Online Privacy?"
+++Alice Liddell: "Basic security is a good start, but it's crucial to adopt more advanced measures as your digital footprint grows."
+Bob Marley: "tru but who wants to stress over all that? just keep it simple and dont click on sketchy stuff and youll be fine, mon."
+
This example showcases the differences between Alice and Bob:
+The differences in tone, vocabulary, and approach clearly distinguish the two characters, reinforcing the separation between their online personas.
+- By following this tutorial, you've established multiple isolated - online identities, each with its own dedicated environment and - persona. This approach significantly enhances your online privacy - and security by preventing different aspects of your digital life - from being linked. -
-- Always maintain discipline in keeping these identities separate, - and regularly update your systems to protect against new threats. - With careful implementation of these practices, you can take - control of your digital presence. -
-
- - Created distinct identities with unique personas.
- - Set up virtual machines for each identity.
- - Implemented operational security practices.
-
Stylometry analyzes writing style to link identities. Consider these real-world examples:
+To mitigate stylometry risks:
+By following this tutorial, you’ve created multiple isolated online identities, each with its own dedicated environment and persona. This approach enhances your online privacy and security by compartmentalizing your digital life.
+Always maintain discipline in keeping these identities separate, and regularly update your systems to protect against emerging threats. With careful implementation, you can take control of your digital presence.
+- Established distinct identities with unique personas.
+ - Configured virtual machines for each identity.
+ - Implemented robust operational security practices.