diy:identity-management
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
diy:identity-management [2024/07/02 07:50] – [Docker Containers] Humphrey Boa-Gart | diy:identity-management [2024/09/24 03:17] (current) – [Containerized and/or Portable Web Browsers] Humphrey Boa-Gart | ||
---|---|---|---|
Line 3: | Line 3: | ||
For those of you who are deep into **platform manipulation** and **sockpuppetry**, | For those of you who are deep into **platform manipulation** and **sockpuppetry**, | ||
- | Here are some quick tips to streamline your operation on almost any operating system by using simple **//best practices// | + | Here are some strategies you can employ |
+ | |||
+ | Most of these strategies are built around [[tactics: | ||
===== Use A Password Manager ===== | ===== Use A Password Manager ===== | ||
Line 9: | Line 11: | ||
While you should be using this anyways, a [[security: | While you should be using this anyways, a [[security: | ||
- | Or, you can take things even further, and have a different password-protected database file for each persona. This way you are only loading the persona you need into your password manager at any given moment, and someone has to enter a password if they manage to make a copy of the database file. Some password managers support biometric devices, and hardware | + | Or, you can take things even further, and have a different password-protected database file for each persona. This way you are only loading the persona you need into your password manager at any given moment, and someone has to enter a password if they manage to make a copy of the database file. Some password managers support |
===== Containerized and/or Portable Web Browsers ===== | ===== Containerized and/or Portable Web Browsers ===== | ||
- | The weakest part of most computers these days is **the web browser**. Since the browser is what is actually interacting with 95% of what most users do with their computer in the modern age, this is where most unwanted things are going to find their way into your machine. You can roadblock many of these things by running your browser in a jailed container, with all its own unique local dependencies included inside the container as well. There are many ways to run a browser out of a container. Some container software, like [[tools: | + | The weakest part of most computers these days is **the web browser**. Since the browser is what is actually interacting with 95% of what most users do with their computer in the modern age, this is where most unwanted things are going to find their way into your machine. You can roadblock many of these things by running your browser in a jailed container, with all its own unique local dependencies included inside the container as well. There are many ways to run a browser out of a container. Some container software, like [[tools: |
- | The ideal type of pre-packaged browser for sockpuppetry in a shared environment is a **portable browser**, as they are easily duplicated, quick to deploy, simple to isolate, and they lend themselves well to scripting & macros. | + | The ideal type of pre-packaged browser for sockpuppetry in a shared environment is a **portable browser**, as they are easily duplicated, quick to deploy, simple to isolate, and they lend themselves well to scripting & macros. They also give you a straightforward means to set aside unique bookmarks, cookie storage and browser extensions on a per-persona basis, catered to whatever that persona does online. |
- | On Linux, this is best accomplished with containerized | + | On Linux, this is best accomplished with [[tools:appimage|AppImages]]. |
For Windows users, you are looking for [[https:// | For Windows users, you are looking for [[https:// | ||
- | //**Employ variation in your browsers!** When you visit a web site, your user-agent (and the rest of your browser' | + | //**Employ variation in your browsers!** When you visit a web site, your user-agent (and the rest of your browser' |
===== Unique VPN Profiles ===== | ===== Unique VPN Profiles ===== | ||
Line 27: | Line 29: | ||
To maintain the outward consistency of your identities across the internet, you should set up different [[security: | To maintain the outward consistency of your identities across the internet, you should set up different [[security: | ||
- | You can get as complex as you want with this one. You can download different premade configuration files from different accounts at different VPN providers, name them after your personas, and load up whichever one you need at the time. You can also have a pool of different configuration files that you select at random, for each persona as well. The main idea, is you don't want to be signing on with two different personas on the same IP address (or even the same geographic region), and you want to be able to jump between profiles with simple commands. For example, in [[tools: | + | You can get as complex as you want with this one. You can download different premade configuration files from different accounts at different VPN providers, name them after your personas, and load up whichever one you need at the time. You can also have a pool of different configuration files that you select at random, for each persona as well. You can even have a configuration (or pool of configurations) for each individual website your persona goes to. The main thing you are trying |
- | $ wg-quick down profile_name_1 | + | WireGuard lets you jump between VPN profiles with simple commands. For example, in [[tools: |
- | $ wg-quick up profile_name_2 | + | |
- | Refer to the [[tools: | + | $ wg-quick up profile_1 |
+ | $ wg-quick down profile_1 | ||
+ | $ wg-quick up profile_2 | ||
+ | $ wg-quick down profile_2 | ||
+ | $ wg-quick up profile_2_alt | ||
- | ===== Further | + | Refer to the [[tools: |
+ | |||
+ | ===== Advanced Persona | ||
With those basic identity-management skills out of the way, you can infinitely build on your setup by employing advanced [[tactics: | With those basic identity-management skills out of the way, you can infinitely build on your setup by employing advanced [[tactics: | ||
Line 40: | Line 47: | ||
==== Virtual Machines | ==== Virtual Machines | ||
- | If you have the storage space and processing power, you can set up **separate tailorized VM environments** for each persona (//enabling you to put your password database, unique browser install and VPN profiles, all in one place//). This way, nothing leaves the VM, and it automatically boots into that persona' | + | If you have the storage space and processing power, you can set up **separate tailorized VM environments** for each persona (//enabling you to put your password database, unique browser install and VPN profiles, all in one place//). This way, nothing leaves the VM, and it automatically boots into that persona' |
- | Another benefit of virtual machines, is you don't have to restrict yourself to portable browsers, since the boundaries of the VM itself are now what keep things separated | + | Another benefit of virtual machines, is that you don't have to restrict yourself to portable browsers, since the boundaries of the VM itself are now what keep things separated. However, it still helps to keep your browsers |
- | You can use any operating system or VM software you wish for this. If you so desire, each persona can have multiple virtual machines assigned to it (// | + | If you want to break things down further, each persona can have multiple virtual machines assigned to it. For example, |
+ | |||
+ | * A **[[arms: | ||
+ | * An **Android** VM with social media apps and an alternative | ||
+ | * A third VM running whatever with more alternative apps. | ||
+ | |||
+ | Just as using different web browsers can throw off people looking for the same repeat fingerprints, | ||
You don't have to jump to a virtual machine setup immediately, | You don't have to jump to a virtual machine setup immediately, | ||
Line 50: | Line 63: | ||
==== Docker Containers ==== | ==== Docker Containers ==== | ||
- | [[tools: | + | [[tools: |
- | For example, you could use [[github> | + | For example, you could use [[github> |
- | ==== Separated | + | ==== Separate |
- | If virtual machines are not compartmentalized enough, you can use entirely different pieces of hardware for each persona. There are many ways you can do this. For example: | + | You can use entirely different pieces of hardware for each persona |
* You can have a keydrive with its own operating system, for each persona. | * You can have a keydrive with its own operating system, for each persona. | ||
Line 62: | Line 75: | ||
* You can put each persona on its own laptop or phone, which no other persona of yours will have access to. | * You can put each persona on its own laptop or phone, which no other persona of yours will have access to. | ||
* You may run each persona from separate virtual servers, out of different datacenters in the cloud, each paid for by different names with different anonymous payment methods. | * You may run each persona from separate virtual servers, out of different datacenters in the cloud, each paid for by different names with different anonymous payment methods. | ||
+ | * A persona whose character background involves video games might want to make use of browsers and apps on a **gaming console** (running through a VPN on your local network) to sell the fingerprint. That persona might communicate with people from that console' | ||
* You may use [[tactics: | * You may use [[tactics: | ||
- | Again, it all depends how far you are willing to go. In some cases, it may be a lot of extra work. If you have the right hardware on hand, or the right conductive habits, it may actually create less work for you in the long run. Experiment with throwaway personas and see what works best for you. | + | Again, it all depends how far you are willing to go, and what physical resources are available to you. In some cases, it may be a lot of unnecessary |
==== Method Acting & Dissociation ==== | ==== Method Acting & Dissociation ==== | ||
Line 74: | Line 88: | ||
It should be noted that mental compartmentalization has long been exploited by various cults and governments, | It should be noted that mental compartmentalization has long been exploited by various cults and governments, | ||
- | //**Be careful that you do not fall down the [[hazards: | + | //**Be careful that you do not fall into any [[hazards: |
- | //Oh, and **DO NOT UNDER ANY CIRCUMSTANCES** let anybody | + | //Oh, and **DO NOT** under **ANY CIRCUMSTANCES** let **ANYBODY** |
- | ===== More Tips ===== | + | ===== Additional |
* If you are not compartmentalizing your personas on their own unique VM's or devices, and instead run them all from the same machine, you might want to consider using **multiple user accounts** for each persona if possible. This is easier on Linux than Windows, as you can simply open a new shell in your environment and run '' | * If you are not compartmentalizing your personas on their own unique VM's or devices, and instead run them all from the same machine, you might want to consider using **multiple user accounts** for each persona if possible. This is easier on Linux than Windows, as you can simply open a new shell in your environment and run '' | ||
Line 84: | Line 98: | ||
* The usernames, public handles and email addresses of your personas, and the filenames of things used by those personas, **do not have to match each other, at all**. This is a useful obfuscation technique, if you can mentally keep track of it for it to be practical on the fly. Some people employ ciphers, rhymes or memories to keep track of which file or account goes to which persona. Some people throw it in maps or spreadsheets. Other people can remember without any of these things. Either way you do it, this will absolutely confuse intruders & spies that are trying to make sense of what goes where. | * The usernames, public handles and email addresses of your personas, and the filenames of things used by those personas, **do not have to match each other, at all**. This is a useful obfuscation technique, if you can mentally keep track of it for it to be practical on the fly. Some people employ ciphers, rhymes or memories to keep track of which file or account goes to which persona. Some people throw it in maps or spreadsheets. Other people can remember without any of these things. Either way you do it, this will absolutely confuse intruders & spies that are trying to make sense of what goes where. | ||
- | * If you are using Linux or MacOS, [[tools: | + | * If you are using Linux or MacOS, [[tools: |
{{tag> | {{tag> |
diy/identity-management.1719906657.txt.gz · Last modified: 2024/08/06 05:53 (external edit)
Find this page online at: https://bestpoint.institute/diy/identity-management
Find this page online at: https://bestpoint.institute/diy/identity-management