diy:identity-management
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| diy:identity-management [2024/07/02 09:19] – Humphrey Boa-Gart | diy:identity-management [2026/01/25 23:26] (current) – [Method Acting & Dissociation] Humphrey Boa-Gart | ||
|---|---|---|---|
| Line 3: | Line 3: | ||
| For those of you who are deep into **platform manipulation** and **sockpuppetry**, | For those of you who are deep into **platform manipulation** and **sockpuppetry**, | ||
| - | Here are some quick tips to streamline your operation on almost any operating system by using simple **//best practices// | + | Here are some strategies you can employ |
| + | |||
| + | Most of these strategies are built around [[tactics: | ||
| ===== Use A Password Manager ===== | ===== Use A Password Manager ===== | ||
| Line 9: | Line 11: | ||
| While you should be using this anyways, a [[security: | While you should be using this anyways, a [[security: | ||
| - | Or, you can take things even further, and have a different password-protected database file for each persona. This way you are only loading the persona you need into your password manager at any given moment, and someone has to enter a password if they manage to make a copy of the database file. Some password managers support biometric devices, and hardware | + | Or, you can take things even further, and have a different password-protected database file for each persona. This way you are only loading the persona you need into your password manager at any given moment, and someone has to enter a password if they manage to make a copy of the database file. Some password managers support |
| ===== Containerized and/or Portable Web Browsers ===== | ===== Containerized and/or Portable Web Browsers ===== | ||
| Line 17: | Line 19: | ||
| The ideal type of pre-packaged browser for sockpuppetry in a shared environment is a **portable browser**, as they are easily duplicated, quick to deploy, simple to isolate, and they lend themselves well to scripting & macros. They also give you a straightforward means to set aside unique bookmarks, cookie storage and browser extensions on a per-persona basis, catered to whatever that persona does online. | The ideal type of pre-packaged browser for sockpuppetry in a shared environment is a **portable browser**, as they are easily duplicated, quick to deploy, simple to isolate, and they lend themselves well to scripting & macros. They also give you a straightforward means to set aside unique bookmarks, cookie storage and browser extensions on a per-persona basis, catered to whatever that persona does online. | ||
| - | On Linux, this is best accomplished with containerized | + | On Linux, this is best accomplished with [[tools:appimage|AppImages]]. |
| For Windows users, you are looking for [[https:// | For Windows users, you are looking for [[https:// | ||
| Line 37: | Line 39: | ||
| $ wg-quick up profile_2_alt | $ wg-quick up profile_2_alt | ||
| - | Refer to the [[tools: | + | Refer to the [[tools: |
| ===== Advanced Persona Compartmentalization ===== | ===== Advanced Persona Compartmentalization ===== | ||
| Line 61: | Line 63: | ||
| ==== Docker Containers ==== | ==== Docker Containers ==== | ||
| - | [[tools: | + | [[tools: |
| - | For example, you could use [[github> | + | For example, you could use [[github> |
| ==== Separate & Airgapped Devices ==== | ==== Separate & Airgapped Devices ==== | ||
| Line 73: | Line 75: | ||
| * You can put each persona on its own laptop or phone, which no other persona of yours will have access to. | * You can put each persona on its own laptop or phone, which no other persona of yours will have access to. | ||
| * You may run each persona from separate virtual servers, out of different datacenters in the cloud, each paid for by different names with different anonymous payment methods. | * You may run each persona from separate virtual servers, out of different datacenters in the cloud, each paid for by different names with different anonymous payment methods. | ||
| - | * A persona whose character background involves video games might want to make use of browsers and apps on a **gaming console** (running through a VPN on your local network) to sell the fingerprint. That persona might communicate with people from that console' | + | * A persona whose character background involves video games might want to make use of browsers and apps on a **gaming console** (running through a VPN on your local network) to sell the fingerprint. That persona might communicate with people from that console' |
| * You may use [[tactics: | * You may use [[tactics: | ||
| Line 82: | Line 84: | ||
| [{{ : | [{{ : | ||
| - | In the film industry, it helps some actors if they mentally become the persona they are portraying - never breaking character. This is a key technique of [[wp> | + | In the film industry, it helps some actors if they mentally become the persona they are portraying - never breaking character. This is a key technique of [[wp> |
| - | It should be noted that mental compartmentalization has long been exploited by various cults and governments, | + | It should be noted that mental compartmentalization has long been exploited by various cults and governments, |
| - | //**Be careful that you do not fall into any [[hazards: | + | //**Be careful that you do not fall into any [[hazards: |
| //Oh, and **DO NOT** under **ANY CIRCUMSTANCES** let **ANYBODY** induce this state in you with hypnosis, group ayahuasca ritual, occult ceremony, or any type of guided meditation! This basically gives someone a rootkit into your brain. If you cannot remain in control on your own while doing this, then it should go without saying that you **SHOULD NOT** be doing it at all!// | //Oh, and **DO NOT** under **ANY CIRCUMSTANCES** let **ANYBODY** induce this state in you with hypnosis, group ayahuasca ritual, occult ceremony, or any type of guided meditation! This basically gives someone a rootkit into your brain. If you cannot remain in control on your own while doing this, then it should go without saying that you **SHOULD NOT** be doing it at all!// | ||
| Line 96: | Line 98: | ||
| * The usernames, public handles and email addresses of your personas, and the filenames of things used by those personas, **do not have to match each other, at all**. This is a useful obfuscation technique, if you can mentally keep track of it for it to be practical on the fly. Some people employ ciphers, rhymes or memories to keep track of which file or account goes to which persona. Some people throw it in maps or spreadsheets. Other people can remember without any of these things. Either way you do it, this will absolutely confuse intruders & spies that are trying to make sense of what goes where. | * The usernames, public handles and email addresses of your personas, and the filenames of things used by those personas, **do not have to match each other, at all**. This is a useful obfuscation technique, if you can mentally keep track of it for it to be practical on the fly. Some people employ ciphers, rhymes or memories to keep track of which file or account goes to which persona. Some people throw it in maps or spreadsheets. Other people can remember without any of these things. Either way you do it, this will absolutely confuse intruders & spies that are trying to make sense of what goes where. | ||
| - | * If you are using Linux or MacOS, [[tools: | + | * If you are using Linux or MacOS, [[tools: |
| {{tag> | {{tag> | ||
diy/identity-management.1719911981.txt.gz · Last modified: (external edit)
Find this page online at: https://bestpoint.institute/diy/identity-management
Find this page online at: https://bestpoint.institute/diy/identity-management