pull down to refresh
0 new comment
133 sats \ 4 replies \ @TNStacker 25 Feb 2024
This is so well written. Great explanation and step-by-step guide.
Love the inclusion of...
The level of detail is very helpful.
reply
0 new comment
31 sats \ 0 replies \ @satoshiplanet OP 25 Feb 2024
https://media.tenor.com/OHaE1lX1tG4AAAAM/travis-fran-healy.gif
reply
0 new comment
51 sats \ 1 reply \ @DarthCoin 25 Feb 2024
and using that fake name generator is cool https://www.fakenamegenerator.com/ :)
reply
0 new comment
0 sats \ 0 replies \ @satoshiplanet OP 25 Feb 2024
This is great!
reply
0 new comment
21 sats \ 0 replies \ @kepford 25 Feb 2024
Yes! Threat modeling is often overlooked.
reply
0 new comment
0 sats \ 0 replies \ @MarsIronPI 17 Jun 2024
I cringe a little every time I see a project like this that (at least primarily) uses Github.
I’m sure that the article is well done (though I haven’t read it yet), but it seems silly to use Github for a project about pseudonymity.
reply
0 new comment
0 sats \ 0 replies \ @aljaz 26 Feb 2024 freebie
haven't managed to read through the entire material yet but i find most of them severely lacking
take a look at a known recent example of how they doxed Beff Jezos in the name of public interest https://www.forbes.com/sites/emilybaker-white/2023/12/01/who-is-basedbeffjezos-the-leader-of-effective-accelerationism-eacc/
A voice analysis conducted by Catalin Grigoras, Director of the National Center for Media Forensics, compared audio recordings of Jezos and talks given by Verdon and found that it was 2,954,870 times more likely that the speaker in one recording of Jezos was Verdon than that it was any other person. Forbes is revealing his identity because we believe it to be in the public interest as Jezos’s influence grows.
good opsec is a lifestyle.
If you only want to shitpost anonymously on the internet its doable, but you still have stylometry to worry about if you also have a public identity https://serhack.me/articles/unveiling-anonymous-author-stylometry-techniques/
if you are doing more nefarious things where your threat model includes state actors then think twice before you embark on the journey because it goes far beyond what is covered there.
0 sats \ 0 replies \ @ch0k1 26 Feb 2024
Excellent guide!
Perfectly written and well explained for all kinds of audiences 👏
reply
0 new comment
0 sats \ 0 replies \ @JesseJames 26 Feb 2024
This is great, thanks for sharing.
reply
0 new comment
0 sats \ 0 replies \ @kepford 25 Feb 2024
Thank you for sharing this!
reply
0 new comment
0 sats \ 0 replies \ @nullcount 25 Feb 2024
Most nyms don't get doxxed because of any technical decisions or mistakes
The #1 way nyms get doxxed is by talking about themselves or others too much online.
Doesn't matter if your tor only, graphene, phone leaves no traces if you're posting traces for free on public forums.
reply
0 new comment
0 sats \ 0 replies \ @Atreus 25 Feb 2024
Step 1. Bookmark post for repeated future referencing.
Step 2. Zap liberally.
Thanks for this one 👋
reply
0 new comment
0 sats \ 0 replies \ @elvismercury 25 Feb 2024
Wow, this is awesome! Amazing to have not run across it before, thank you :)
reply
0 new comment
0 sats \ 0 replies \ @co574 25 Feb 2024
Kudos to Namcios and Christopher Allen for co-authoring this truly useful guide!
reply
0 new comment