pull down to refresh

This is so well written. Great explanation and step-by-step guide.

Love the inclusion of...

Once you've defined what your threat model looks like, you will be ready to start creating a pseudonymous identity from scratch in Section Three.

The level of detail is very helpful.

reply

and using that fake name generator is cool https://www.fakenamegenerator.com/ :)

reply

This is great!

reply

Yes! Threat modeling is often overlooked.

reply

I cringe a little every time I see a project like this that (at least primarily) uses Github.

I’m sure that the article is well done (though I haven’t read it yet), but it seems silly to use Github for a project about pseudonymity.

reply

haven't managed to read through the entire material yet but i find most of them severely lacking

take a look at a known recent example of how they doxed Beff Jezos in the name of public interest https://www.forbes.com/sites/emilybaker-white/2023/12/01/who-is-basedbeffjezos-the-leader-of-effective-accelerationism-eacc/

A voice analysis conducted by Catalin Grigoras, Director of the National Center for Media Forensics, compared audio recordings of Jezos and talks given by Verdon and found that it was 2,954,870 times more likely that the speaker in one recording of Jezos was Verdon than that it was any other person. Forbes is revealing his identity because we believe it to be in the public interest as Jezos’s influence grows.

good opsec is a lifestyle.

If you only want to shitpost anonymously on the internet its doable, but you still have stylometry to worry about if you also have a public identity https://serhack.me/articles/unveiling-anonymous-author-stylometry-techniques/

if you are doing more nefarious things where your threat model includes state actors then think twice before you embark on the journey because it goes far beyond what is covered there.

Excellent guide!

Perfectly written and well explained for all kinds of audiences 👏

reply

This is great, thanks for sharing.

reply

Thank you for sharing this!

reply

Most nyms don't get doxxed because of any technical decisions or mistakes

The #1 way nyms get doxxed is by talking about themselves or others too much online.

Doesn't matter if your tor only, graphene, phone leaves no traces if you're posting traces for free on public forums.

reply

Step 1. Bookmark post for repeated future referencing.

Step 2. Zap liberally.

Thanks for this one đź‘‹

reply

Wow, this is awesome! Amazing to have not run across it before, thank you :)

reply

Kudos to Namcios and Christopher Allen for co-authoring this truly useful guide!

reply