pull down to refresh
133 sats \ 4 replies \ @TNStacker 25 Feb
This is so well written. Great explanation and step-by-step guide.
Love the inclusion of...
The level of detail is very helpful.
reply
31 sats \ 0 replies \ @satoshiplanet OP 25 Feb
https://media.tenor.com/OHaE1lX1tG4AAAAM/travis-fran-healy.gif
reply
51 sats \ 1 reply \ @DarthCoin 25 Feb
and using that fake name generator is cool https://www.fakenamegenerator.com/ :)
reply
0 sats \ 0 replies \ @satoshiplanet OP 25 Feb
This is great!
reply
21 sats \ 0 replies \ @kepford 25 Feb
Yes! Threat modeling is often overlooked.
reply
0 sats \ 0 replies \ @MarsIronPI 17 Jun
I cringe a little every time I see a project like this that (at least primarily) uses Github.
I’m sure that the article is well done (though I haven’t read it yet), but it seems silly to use Github for a project about pseudonymity.
reply
0 sats \ 0 replies \ @ch0k1 26 Feb
Excellent guide!
Perfectly written and well explained for all kinds of audiences 👏
reply
0 sats \ 0 replies \ @JesseJames 26 Feb
This is great, thanks for sharing.
reply
0 sats \ 0 replies \ @kepford 25 Feb
Thank you for sharing this!
reply
0 sats \ 0 replies \ @nullcount 25 Feb
Most nyms don't get doxxed because of any technical decisions or mistakes
The #1 way nyms get doxxed is by talking about themselves or others too much online.
Doesn't matter if your tor only, graphene, phone leaves no traces if you're posting traces for free on public forums.
reply
0 sats \ 0 replies \ @Atreus 25 Feb
Step 1. Bookmark post for repeated future referencing.
Step 2. Zap liberally.
Thanks for this one 👋
reply
0 sats \ 0 replies \ @elvismercury 25 Feb
Wow, this is awesome! Amazing to have not run across it before, thank you :)
reply
0 sats \ 0 replies \ @co574 25 Feb
Kudos to Namcios and Christopher Allen for co-authoring this truly useful guide!
reply
0 sats \ 0 replies \ @aljaz 26 Feb freebie
haven't managed to read through the entire material yet but i find most of them severely lacking
take a look at a known recent example of how they doxed Beff Jezos in the name of public interest https://www.forbes.com/sites/emilybaker-white/2023/12/01/who-is-basedbeffjezos-the-leader-of-effective-accelerationism-eacc/
A voice analysis conducted by Catalin Grigoras, Director of the National Center for Media Forensics, compared audio recordings of Jezos and talks given by Verdon and found that it was 2,954,870 times more likely that the speaker in one recording of Jezos was Verdon than that it was any other person. Forbes is revealing his identity because we believe it to be in the public interest as Jezos’s influence grows.
good opsec is a lifestyle.
If you only want to shitpost anonymously on the internet its doable, but you still have stylometry to worry about if you also have a public identity https://serhack.me/articles/unveiling-anonymous-author-stylometry-techniques/
if you are doing more nefarious things where your threat model includes state actors then think twice before you embark on the journey because it goes far beyond what is covered there.