diy:identity-management
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
diy:identity-management [2024/07/02 09:34] – [Method Acting & Dissociation] Humphrey Boa-Gart | diy:identity-management [2024/09/24 03:17] (current) – [Containerized and/or Portable Web Browsers] Humphrey Boa-Gart | ||
---|---|---|---|
Line 3: | Line 3: | ||
For those of you who are deep into **platform manipulation** and **sockpuppetry**, | For those of you who are deep into **platform manipulation** and **sockpuppetry**, | ||
- | Here are some quick tips to streamline your operation on almost any operating system by using simple **//best practices// | + | Here are some strategies you can employ |
+ | |||
+ | Most of these strategies are built around [[tactics: | ||
===== Use A Password Manager ===== | ===== Use A Password Manager ===== | ||
Line 9: | Line 11: | ||
While you should be using this anyways, a [[security: | While you should be using this anyways, a [[security: | ||
- | Or, you can take things even further, and have a different password-protected database file for each persona. This way you are only loading the persona you need into your password manager at any given moment, and someone has to enter a password if they manage to make a copy of the database file. Some password managers support biometric devices, and hardware | + | Or, you can take things even further, and have a different password-protected database file for each persona. This way you are only loading the persona you need into your password manager at any given moment, and someone has to enter a password if they manage to make a copy of the database file. Some password managers support |
===== Containerized and/or Portable Web Browsers ===== | ===== Containerized and/or Portable Web Browsers ===== | ||
Line 17: | Line 19: | ||
The ideal type of pre-packaged browser for sockpuppetry in a shared environment is a **portable browser**, as they are easily duplicated, quick to deploy, simple to isolate, and they lend themselves well to scripting & macros. They also give you a straightforward means to set aside unique bookmarks, cookie storage and browser extensions on a per-persona basis, catered to whatever that persona does online. | The ideal type of pre-packaged browser for sockpuppetry in a shared environment is a **portable browser**, as they are easily duplicated, quick to deploy, simple to isolate, and they lend themselves well to scripting & macros. They also give you a straightforward means to set aside unique bookmarks, cookie storage and browser extensions on a per-persona basis, catered to whatever that persona does online. | ||
- | On Linux, this is best accomplished with containerized | + | On Linux, this is best accomplished with [[tools:appimage|AppImages]]. |
For Windows users, you are looking for [[https:// | For Windows users, you are looking for [[https:// | ||
Line 61: | Line 63: | ||
==== Docker Containers ==== | ==== Docker Containers ==== | ||
- | [[tools: | + | [[tools: |
- | For example, you could use [[github> | + | For example, you could use [[github> |
==== Separate & Airgapped Devices ==== | ==== Separate & Airgapped Devices ==== | ||
Line 86: | Line 88: | ||
It should be noted that mental compartmentalization has long been exploited by various cults and governments, | It should be noted that mental compartmentalization has long been exploited by various cults and governments, | ||
- | //**Be careful that you do not fall into any [[hazards: | + | //**Be careful that you do not fall into any [[hazards: |
//Oh, and **DO NOT** under **ANY CIRCUMSTANCES** let **ANYBODY** induce this state in you with hypnosis, group ayahuasca ritual, occult ceremony, or any type of guided meditation! This basically gives someone a rootkit into your brain. If you cannot remain in control on your own while doing this, then it should go without saying that you **SHOULD NOT** be doing it at all!// | //Oh, and **DO NOT** under **ANY CIRCUMSTANCES** let **ANYBODY** induce this state in you with hypnosis, group ayahuasca ritual, occult ceremony, or any type of guided meditation! This basically gives someone a rootkit into your brain. If you cannot remain in control on your own while doing this, then it should go without saying that you **SHOULD NOT** be doing it at all!// | ||
Line 97: | Line 99: | ||
* If you are using Linux or MacOS, [[tools: | * If you are using Linux or MacOS, [[tools: | ||
+ | |||
{{tag> | {{tag> |
diy/identity-management.1719912859.txt.gz · Last modified: 2024/08/06 05:53 (external edit)
Find this page online at: https://bestpoint.institute/diy/identity-management
Find this page online at: https://bestpoint.institute/diy/identity-management