diy:identity-management
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| diy:identity-management [2026/01/25 23:23] – [Method Acting & Dissociation] Humphrey Boa-Gart | diy:identity-management [2026/01/25 23:26] (current) – [Method Acting & Dissociation] Humphrey Boa-Gart | ||
|---|---|---|---|
| Line 86: | Line 86: | ||
| In the film industry, it helps some actors if they mentally become the persona they are portraying - never breaking character. This is a key technique of [[wp> | In the film industry, it helps some actors if they mentally become the persona they are portraying - never breaking character. This is a key technique of [[wp> | ||
| - | It should be noted that mental compartmentalization has long been exploited by various cults and governments, | + | It should be noted that mental compartmentalization has long been exploited by various cults and governments, |
| - | //**Be careful that you do not fall into any [[hazards: | + | //**Be careful that you do not fall into any [[hazards: |
| //Oh, and **DO NOT** under **ANY CIRCUMSTANCES** let **ANYBODY** induce this state in you with hypnosis, group ayahuasca ritual, occult ceremony, or any type of guided meditation! This basically gives someone a rootkit into your brain. If you cannot remain in control on your own while doing this, then it should go without saying that you **SHOULD NOT** be doing it at all!// | //Oh, and **DO NOT** under **ANY CIRCUMSTANCES** let **ANYBODY** induce this state in you with hypnosis, group ayahuasca ritual, occult ceremony, or any type of guided meditation! This basically gives someone a rootkit into your brain. If you cannot remain in control on your own while doing this, then it should go without saying that you **SHOULD NOT** be doing it at all!// | ||
| Line 98: | Line 98: | ||
| * The usernames, public handles and email addresses of your personas, and the filenames of things used by those personas, **do not have to match each other, at all**. This is a useful obfuscation technique, if you can mentally keep track of it for it to be practical on the fly. Some people employ ciphers, rhymes or memories to keep track of which file or account goes to which persona. Some people throw it in maps or spreadsheets. Other people can remember without any of these things. Either way you do it, this will absolutely confuse intruders & spies that are trying to make sense of what goes where. | * The usernames, public handles and email addresses of your personas, and the filenames of things used by those personas, **do not have to match each other, at all**. This is a useful obfuscation technique, if you can mentally keep track of it for it to be practical on the fly. Some people employ ciphers, rhymes or memories to keep track of which file or account goes to which persona. Some people throw it in maps or spreadsheets. Other people can remember without any of these things. Either way you do it, this will absolutely confuse intruders & spies that are trying to make sense of what goes where. | ||
| - | * If you are using Linux or MacOS, [[tools: | + | * If you are using Linux or MacOS, [[tools: |
| {{tag> | {{tag> | ||
diy/identity-management.1769383400.txt.gz · Last modified: by Humphrey Boa-Gart
Find this page online at: https://bestpoint.institute/diy/identity-management
Find this page online at: https://bestpoint.institute/diy/identity-management