A voice analysis conducted by Catalin Grigoras, Director of the National Center for Media Forensics, compared audio recordings of Jezos and talks given by Verdon and found that it was 2,954,870 times more likely that the speaker in one recording of Jezos was Verdon than that it was any other person. Forbes is revealing his identity because we believe it to be in the public interest as Jezos’s influence grows.
if you are doing more nefarious things where your threat model includes state actors then think twice before you embark on the journey because it goes far beyond what is covered there.
This is so well written. Great explanation and step-by-step guide.
Love the inclusion of...
The level of detail is very helpful.
https://media.tenor.com/OHaE1lX1tG4AAAAM/travis-fran-healy.gif
and using that fake name generator is cool https://www.fakenamegenerator.com/ :)
This is great!
Yes! Threat modeling is often overlooked.
I cringe a little every time I see a project like this that (at least primarily) uses Github.
I’m sure that the article is well done (though I haven’t read it yet), but it seems silly to use Github for a project about pseudonymity.
haven't managed to read through the entire material yet but i find most of them severely lacking
take a look at a known recent example of how they doxed Beff Jezos in the name of public interest https://www.forbes.com/sites/emilybaker-white/2023/12/01/who-is-basedbeffjezos-the-leader-of-effective-accelerationism-eacc/
A voice analysis conducted by Catalin Grigoras, Director of the National Center for Media Forensics, compared audio recordings of Jezos and talks given by Verdon and found that it was 2,954,870 times more likely that the speaker in one recording of Jezos was Verdon than that it was any other person. Forbes is revealing his identity because we believe it to be in the public interest as Jezos’s influence grows.
good opsec is a lifestyle.
If you only want to shitpost anonymously on the internet its doable, but you still have stylometry to worry about if you also have a public identity https://serhack.me/articles/unveiling-anonymous-author-stylometry-techniques/
if you are doing more nefarious things where your threat model includes state actors then think twice before you embark on the journey because it goes far beyond what is covered there.
Excellent guide!
Perfectly written and well explained for all kinds of audiences 👏
This is great, thanks for sharing.
Thank you for sharing this!
Most nyms don't get doxxed because of any technical decisions or mistakes
The #1 way nyms get doxxed is by talking about themselves or others too much online.
Doesn't matter if your tor only, graphene, phone leaves no traces if you're posting traces for free on public forums.
Step 1. Bookmark post for repeated future referencing.
Step 2. Zap liberally.
Thanks for this one đź‘‹
Wow, this is awesome! Amazing to have not run across it before, thank you :)
Kudos to Namcios and Christopher Allen for co-authoring this truly useful guide!