pull down to refresh

This is so well written. Great explanation and step-by-step guide.
Love the inclusion of...
Once you've defined what your threat model looks like, you will be ready to start creating a pseudonymous identity from scratch in Section Three.
The level of detail is very helpful.
reply
and using that fake name generator is cool https://www.fakenamegenerator.com/ :)
reply
This is great!
reply
Yes! Threat modeling is often overlooked.
reply
I cringe a little every time I see a project like this that (at least primarily) uses Github.
I’m sure that the article is well done (though I haven’t read it yet), but it seems silly to use Github for a project about pseudonymity.
reply
Excellent guide!
Perfectly written and well explained for all kinds of audiences 👏
reply
This is great, thanks for sharing.
reply
Thank you for sharing this!
reply
Most nyms don't get doxxed because of any technical decisions or mistakes
The #1 way nyms get doxxed is by talking about themselves or others too much online.
Doesn't matter if your tor only, graphene, phone leaves no traces if you're posting traces for free on public forums.
reply
Step 1. Bookmark post for repeated future referencing.
Step 2. Zap liberally.
Thanks for this one 👋
reply
Wow, this is awesome! Amazing to have not run across it before, thank you :)
reply
Kudos to Namcios and Christopher Allen for co-authoring this truly useful guide!
reply
haven't managed to read through the entire material yet but i find most of them severely lacking
take a look at a known recent example of how they doxed Beff Jezos in the name of public interest https://www.forbes.com/sites/emilybaker-white/2023/12/01/who-is-basedbeffjezos-the-leader-of-effective-accelerationism-eacc/
A voice analysis conducted by Catalin Grigoras, Director of the National Center for Media Forensics, compared audio recordings of Jezos and talks given by Verdon and found that it was 2,954,870 times more likely that the speaker in one recording of Jezos was Verdon than that it was any other person. Forbes is revealing his identity because we believe it to be in the public interest as Jezos’s influence grows.
good opsec is a lifestyle.
If you only want to shitpost anonymously on the internet its doable, but you still have stylometry to worry about if you also have a public identity https://serhack.me/articles/unveiling-anonymous-author-stylometry-techniques/
if you are doing more nefarious things where your threat model includes state actors then think twice before you embark on the journey because it goes far beyond what is covered there.