User Tools

(aka 'the best point military institute')

Site Tools

diy:identity-management

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
diy:identity-management [2024/08/06 05:48] – external edit 127.0.0.1diy:identity-management [2026/01/25 23:26] (current) – [Method Acting & Dissociation] Humphrey Boa-Gart
Line 19: Line 19:
 The ideal type of pre-packaged browser for sockpuppetry in a shared environment is a **portable browser**, as they are easily duplicated, quick to deploy, simple to isolate, and they lend themselves well to scripting & macros. They also give you a straightforward means to set aside unique bookmarks, cookie storage and browser extensions on a per-persona basis, catered to whatever that persona does online. The ideal type of pre-packaged browser for sockpuppetry in a shared environment is a **portable browser**, as they are easily duplicated, quick to deploy, simple to isolate, and they lend themselves well to scripting & macros. They also give you a straightforward means to set aside unique bookmarks, cookie storage and browser extensions on a per-persona basis, catered to whatever that persona does online.
  
-On Linux, this is best accomplished with containerized [[https://www.appimagehub.com/browse?cat=248&ord=latest|AppImages]].+On Linux, this is best accomplished with [[tools:appimage|AppImages]].
  
 For Windows users, you are looking for [[https://portableapps.com/apps/internet|Portable Apps]]. For Windows users, you are looking for [[https://portableapps.com/apps/internet|Portable Apps]].
Line 39: Line 39:
   $ wg-quick up profile_2_alt   $ wg-quick up profile_2_alt
  
-Refer to the [[tools:wireguard|WireGuard]] article for a quick primer and best practices. You can use sites like [[https://whatismyipaddress.com|What Is My IP Address]], [[https://www.dnsleaktest.com|DNS Leak Test]] and [[https://ip.me|IP.me]] to make sure your VPN configuration is working. Employ a [[https://www.cnet.com/tech/services-and-software/vpn-kill-switch-what-is-it-and-should-you-enable-it/|VPN Kill Switch]](([[https://web.archive.org/web/20240629133959/https://www.cnet.com/tech/services-and-software/vpn-kill-switch-what-is-it-and-should-you-enable-it/|Archived version of VPN Kill Switch summary at CNET]])) to prevent IP leaks.+Refer to the [[tools:wireguard|WireGuard]] article for a quick primer and best practices. You can use the [[sub>whereami|Triangulation Station]] to make sure your VPN configuration is working. Employ a [[https://www.cnet.com/tech/services-and-software/vpn-kill-switch-what-is-it-and-should-you-enable-it/|VPN Kill Switch]](([[https://web.archive.org/web/20240629133959/https://www.cnet.com/tech/services-and-software/vpn-kill-switch-what-is-it-and-should-you-enable-it/|Archived version of VPN Kill Switch summary at CNET]])) to prevent IP leaks.
  
 ===== Advanced Persona Compartmentalization ===== ===== Advanced Persona Compartmentalization =====
Line 63: Line 63:
 ==== Docker Containers ==== ==== Docker Containers ====
  
-[[tools:docker|Docker]] containers are another way to further compartmentalize things with a form of pseudo-virtualization. This is especially useful in a shared environment where you cannot run full virtual machines, or a cloud environment where you cannot deploy your own custom virtual machines. With customized Docker containers as part of your identity management toolchain, you are essentially building your own portable containerized browsers for each of your personas with common off-the-shelf components. +[[tools:docker|Docker]] containers are another way to further compartmentalize things with a form of pseudo-virtualization. This is especially useful in environments with limited resources, a shared environment where you cannot run full virtual machines, and the cloud. With customized Docker containers as part of your identity management toolchain, you are essentially building your own portable containerized browsers for each of your personas with common off-the-shelf components, with the added security of OS-level virtualization.
  
-For example, you could use [[github>qdm12/gluetun]] and [[github>linuxserver/docker-firefox]] to deploy an instance of **Mozilla Firefox**, with all its dependencies and your chosen VPN profile built into the container as well.+For example, you could use [[github>HumphreyBoaGart/vmask]] to deploy an instance of **Mozilla Firefox**, with all its dependencies and your chosen VPN profile built into the container as well.
  
 ==== Separate & Airgapped Devices ==== ==== Separate & Airgapped Devices ====
Line 75: Line 75:
   * You can put each persona on its own laptop or phone, which no other persona of yours will have access to.   * You can put each persona on its own laptop or phone, which no other persona of yours will have access to.
   * You may run each persona from separate virtual servers, out of different datacenters in the cloud, each paid for by different names with different anonymous payment methods.   * You may run each persona from separate virtual servers, out of different datacenters in the cloud, each paid for by different names with different anonymous payment methods.
-  * A persona whose character background involves video games might want to make use of browsers and apps on a **gaming console** (running through a VPN on your local network) to sell the fingerprint. That persona might communicate with people from that console's chat applications, as opposed to another persona, who might just use [[tools:signal|Signal]] or **Proton Mail** on a VM elsewhere.+  * A persona whose character background involves video games might want to make use of browsers and apps on a **gaming console** (running through a VPN on your local network) to sell the fingerprint. That persona might communicate with people from that console's chat applications, as opposed to another persona, who might just use **Signal** or **Proton Mail** on a VM elsewhere.
   * You may use [[tactics:airgap|airgapped]] offline devices for things like drafting posts, reading ebooks, listening to music, tracking to-do lists, or managing your personal life, preventing unintentional bleedover onto machines where you do work online, where every nuance of your habits can be studied by AI. If you are using hardware 2FA, make sure you have a spare airgapped key or two stashed away somewhere, so you can get back into your personas if your devices are stolen or lost. PIN-protect the airgapped key in case it is stolen.   * You may use [[tactics:airgap|airgapped]] offline devices for things like drafting posts, reading ebooks, listening to music, tracking to-do lists, or managing your personal life, preventing unintentional bleedover onto machines where you do work online, where every nuance of your habits can be studied by AI. If you are using hardware 2FA, make sure you have a spare airgapped key or two stashed away somewhere, so you can get back into your personas if your devices are stolen or lost. PIN-protect the airgapped key in case it is stolen.
  
Line 84: Line 84:
 [{{ :diy:heath-joker.jpg?350|Hey kids, don't fly too close to the sun!}}] [{{ :diy:heath-joker.jpg?350|Hey kids, don't fly too close to the sun!}}]
  
-In the film industry, it helps some actors if they mentally become the persona they are portraying - never breaking character. This is a key technique of [[wp>Method acting|Method Acting]], and it is one that is equally-applicable for internet larpers. Not breaking character between persona changes is known to reduce the chances of various out-of-character slip-ups, though your mileage may vary. Many Anons do not need this trick at all.+In the film industry, it helps some actors if they mentally become the persona they are portraying - never breaking character. This is a key technique of [[wp>Method acting|Method Acting]], and it is one that is equally-applicable for internet larpers. Not breaking character between persona changes is known to reduce the chances of various out-of-character slip-ups, though your mileage may vary. Many professional shitposters do not need this trick at all.
  
-It should be noted that mental compartmentalization has long been exploited by various cults and governments, dating back to the Ancient World. Because of this, it is no surprise that modern governments have figured out how to exploit people prone to [[wp>Splitting (psychology)|splitting]], [[wp>Dissociation (psychology)|dissociation]] or other [[wp>Dissociative disorders|DID/MPD behaviors]], for the purposes of information security & mind control. (//The **Ministry of Occult Sciences** notes that people with **temporal lobe dysfunctions** are sometimes exploited in this manner as well.//) Anonymous has verifiably encountered cases where two personas online didn't even know they were part of the same host body. Conversely, some Anons with DID deliberately make full conscious use of [[wp>Multiplicity_(subculture)#Characteristics|their system's quirks]] to compartmentalize their multiple digital presences, as a safeguard from external threats or saboteurs.+It should be noted that mental compartmentalization has long been exploited by various cults and governments, dating back to the Ancient World. Because of this, it is no surprise that [[hazards:fediverse|intelligence agencies]] have figured out how to exploit people prone to [[wp>Splitting (psychology)|splitting]], [[wp>Dissociation (psychology)|dissociation]] or other [[wp>Dissociative disorders|DID/MPD behaviors]], for the purposes of information security & mind control. People with **temporal lobe dysfunctions** are sometimes exploited in this manner as well. I've encountered cases where two personas online didn't even know they were part of the same host body. Conversely, others with DID deliberately make full conscious use of [[wp>Multiplicity_(subculture)#Characteristics|their system's quirks]] to compartmentalize their multiple digital presences, as a safeguard from external threats or saboteurs.
  
-//**Be careful that you do not fall into any [[hazards:rabbit holes]], and DO NOT forget your [[security:totem]].** Inexperience and poor emotional regulation can be a serious [[hazards:achilles heel|Achilles' Heel]] when dissociating, and send you down an endless dark path from which you may never return. Furthermore, while multiple personalities (for those without DID) can be manifested purely meditatively without external assistance, some Anons claim to channel volatile daemonia to get the job done instead. Pharmakeia & recreational drugs offer another unstable portal into this mindset. If you are not careful when you immerse yourself in this kind of manner, you could end up dead, just like **Heath Ledger** after he used this method to portray the Joker in the 2008 film, **The Dark Knight**.//+//**Be careful that you do not fall into any [[hazards:rabbit holes]], and DO NOT forget your [[x:totem]].** Inexperience and poor emotional regulation can be a serious [[hazards:achilles heel|Achilles' Heel]] when dissociating, and send you down an endless dark path from which you may never return. Furthermore, while multiple personalities (for those without DID) can be manifested purely meditatively without external assistance, I've met people who claim to channel volatile daemonia to get the job done instead. Pharmakeia & recreational drugs offer another unstable portal into this mindset. If you are not careful when you immerse yourself in this kind of manner, you could end up dead, just like **Heath Ledger** after he used this method to portray the Joker in the 2008 film, **The Dark Knight**.//
  
 //Oh, and **DO NOT** under **ANY CIRCUMSTANCES** let **ANYBODY** induce this state in you with hypnosis, group ayahuasca ritual, occult ceremony, or any type of guided meditation! This basically gives someone a rootkit into your brain. If you cannot remain in control on your own while doing this, then it should go without saying that you **SHOULD NOT** be doing it at all!// //Oh, and **DO NOT** under **ANY CIRCUMSTANCES** let **ANYBODY** induce this state in you with hypnosis, group ayahuasca ritual, occult ceremony, or any type of guided meditation! This basically gives someone a rootkit into your brain. If you cannot remain in control on your own while doing this, then it should go without saying that you **SHOULD NOT** be doing it at all!//
Line 98: Line 98:
   * The usernames, public handles and email addresses of your personas, and the filenames of things used by those personas, **do not have to match each other, at all**. This is a useful obfuscation technique, if you can mentally keep track of it for it to be practical on the fly. Some people employ ciphers, rhymes or memories to keep track of which file or account goes to which persona. Some people throw it in maps or spreadsheets. Other people can remember without any of these things. Either way you do it, this will absolutely confuse intruders & spies that are trying to make sense of what goes where.   * The usernames, public handles and email addresses of your personas, and the filenames of things used by those personas, **do not have to match each other, at all**. This is a useful obfuscation technique, if you can mentally keep track of it for it to be practical on the fly. Some people employ ciphers, rhymes or memories to keep track of which file or account goes to which persona. Some people throw it in maps or spreadsheets. Other people can remember without any of these things. Either way you do it, this will absolutely confuse intruders & spies that are trying to make sense of what goes where.
  
-  * If you are using Linux or MacOS, [[tools:bash:customization|aliases & shell scripting]] (//or **[[tools:powershell|PowerShell scripting]]** on Windows//) can further automate & simplify the execution of many of the tips on this page. Since the methods described here use common implementations of free software, they are quite conductive to being used as part of custom scripts, if you know some {{tagpage>Programming|programming basics}}.+  * If you are using Linux or MacOS, [[tools:bash:customization|aliases & shell scripting]] (//or **[[tools:powershell|PowerShell scripting]]** on Windows//) can further automate & simplify the execution of many of the tips on this page. Since the methods described here use common implementations of free software, they are quite conductive to being used as part of custom scripts, if you know some [[tools:languages|programming basics]].
  
  
  
 {{tag>Tutorials Security}} {{tag>Tutorials Security}}
diy/identity-management.1722923295.txt.gz · Last modified: (external edit)

Find this page online at: https://bestpoint.institute/diy/identity-management