diy:identity-management
Differences
This shows you the differences between two versions of the page.
| diy:identity-management [2024/07/02 09:34] – [Method Acting & Dissociation] Humphrey Boa-Gart | diy:identity-management [2025/09/30 22:44] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 3: | Line 3: | ||
| For those of you who are deep into **platform manipulation** and **sockpuppetry**, | For those of you who are deep into **platform manipulation** and **sockpuppetry**, | ||
| - | Here are some quick tips to streamline your operation on almost any operating system by using simple **//best practices// | + | Here are some strategies you can employ |
| + | |||
| + | Most of these strategies are built around [[tactics: | ||
| ===== Use A Password Manager ===== | ===== Use A Password Manager ===== | ||
| Line 9: | Line 11: | ||
| While you should be using this anyways, a [[security: | While you should be using this anyways, a [[security: | ||
| - | Or, you can take things even further, and have a different password-protected database file for each persona. This way you are only loading the persona you need into your password manager at any given moment, and someone has to enter a password if they manage to make a copy of the database file. Some password managers support biometric devices, and hardware | + | Or, you can take things even further, and have a different password-protected database file for each persona. This way you are only loading the persona you need into your password manager at any given moment, and someone has to enter a password if they manage to make a copy of the database file. Some password managers support |
| ===== Containerized and/or Portable Web Browsers ===== | ===== Containerized and/or Portable Web Browsers ===== | ||
| Line 17: | Line 19: | ||
| The ideal type of pre-packaged browser for sockpuppetry in a shared environment is a **portable browser**, as they are easily duplicated, quick to deploy, simple to isolate, and they lend themselves well to scripting & macros. They also give you a straightforward means to set aside unique bookmarks, cookie storage and browser extensions on a per-persona basis, catered to whatever that persona does online. | The ideal type of pre-packaged browser for sockpuppetry in a shared environment is a **portable browser**, as they are easily duplicated, quick to deploy, simple to isolate, and they lend themselves well to scripting & macros. They also give you a straightforward means to set aside unique bookmarks, cookie storage and browser extensions on a per-persona basis, catered to whatever that persona does online. | ||
| - | On Linux, this is best accomplished with containerized | + | On Linux, this is best accomplished with [[tools:appimage|AppImages]]. |
| For Windows users, you are looking for [[https:// | For Windows users, you are looking for [[https:// | ||
| Line 61: | Line 63: | ||
| ==== Docker Containers ==== | ==== Docker Containers ==== | ||
| - | [[tools: | + | [[tools: |
| - | For example, you could use [[github> | + | For example, you could use [[github> |
| ==== Separate & Airgapped Devices ==== | ==== Separate & Airgapped Devices ==== | ||
| Line 86: | Line 88: | ||
| It should be noted that mental compartmentalization has long been exploited by various cults and governments, | It should be noted that mental compartmentalization has long been exploited by various cults and governments, | ||
| - | //**Be careful that you do not fall into any [[hazards: | + | //**Be careful that you do not fall into any [[hazards: |
| //Oh, and **DO NOT** under **ANY CIRCUMSTANCES** let **ANYBODY** induce this state in you with hypnosis, group ayahuasca ritual, occult ceremony, or any type of guided meditation! This basically gives someone a rootkit into your brain. If you cannot remain in control on your own while doing this, then it should go without saying that you **SHOULD NOT** be doing it at all!// | //Oh, and **DO NOT** under **ANY CIRCUMSTANCES** let **ANYBODY** induce this state in you with hypnosis, group ayahuasca ritual, occult ceremony, or any type of guided meditation! This basically gives someone a rootkit into your brain. If you cannot remain in control on your own while doing this, then it should go without saying that you **SHOULD NOT** be doing it at all!// | ||
| Line 97: | Line 99: | ||
| * If you are using Linux or MacOS, [[tools: | * If you are using Linux or MacOS, [[tools: | ||
| + | |||
| {{tag> | {{tag> | ||
diy/identity-management.1719912859.txt.gz · Last modified: (external edit)
Find this page online at: https://bestpoint.institute/diy/identity-management
Find this page online at: https://bestpoint.institute/diy/identity-management

