[HN Gopher] Be anonymous
       ___________________________________________________________________
        
       Be anonymous
        
       Author : kashnote
       Score  : 189 points
       Date   : 2022-02-20 18:54 UTC (4 hours ago)
        
 (HTM) web link (kg.dev)
 (TXT) w3m dump (kg.dev)
        
       | ronnier wrote:
       | I don't care about being anon, but I don't want all my info
       | sitting in databases, so I've made done the following and trying
       | to evolve over time and fix gaps that I currently have. This is
       | things I've done...
       | 
       | * Use Brave browser with ublock origins and privacy badger
       | 
       | * Use pihole + unbound to resolve my own DNS and do not use
       | google
       | 
       | * Run wireguard on my home network that I connect to when I'm out
       | and need to use wifi
       | 
       | * Be anti-google as much as possible. I'm still in the process of
       | this, i'll switch my domain based email off of google soon
       | 
       | * Be anti-facebook and delete all accounts (whatsapp and insta
       | included)
       | 
       | * Be anti-reddit
       | 
       | * Be anti-cloud and host everything internally as much as
       | possible (except for encrypted backups, say for video cam
       | footage)
       | 
       | * All of my home automation is local and blocked from the
       | internet. If I want access, I'll connect to my VPN.
       | 
       | * Use signal with disappearing chats to communicate with my
       | friends.
       | 
       | Still a lot to do, but it's a start...
        
         | hammock wrote:
         | I believe Brave browser has fallen out of favor but I'm not an
         | expert on why
        
           | ronnier wrote:
           | Interesting. Please let me know if you have a better
           | alternative. Ideally I'd like to just run chromium but then I
           | have to build it myself or use some build by some untrusted
           | person so I've decided I'll trust Brave for now...
        
             | xvector wrote:
             | Aside from Tor Browser, Firefox with arkenfox/user.js is
             | ideal for privacy [1].
             | 
             | Chromium-based browsers like Brave are ideal for security
             | [2].
             | 
             | An ideal solution for privacy and security would be running
             | Firefox+user.js in Qubes OS [3], or for even more
             | anonymity, Tor Browser in Qubes-Whonix [4]. However, even
             | this isn't bulletproof, and a 3 letter agency can still
             | determine who you are with techniques like keystroke
             | deanonymization [5] or other techniques [6] like traffic
             | analysis. Tor is also not reliable for anonymity because
             | the project is kind of a shitshow [7], so there's really
             | nothing you can do to truly hide.
             | 
             | [1]: https://github.com/arkenfox/user.js
             | 
             | [2]: https://madaidans-insecurities.github.io/firefox-
             | chromium.ht...
             | 
             | [3]: https://www.qubes-os.org/
             | 
             | [4]: https://www.whonix.org/wiki/Qubes
             | 
             | [5]: https://www.whonix.org/wiki/Keystroke_Deanonymization
             | 
             | [6]: https://www.whonix.org/wiki/Warning
             | 
             | [7]: https://www.hackerfactor.com/blog/index.php?/archives/
             | 906-To...
        
       | cellis wrote:
       | As careful as some of the things he suggests are...if you're
       | truly wanted by a state-level actor or sufficiently motivated
       | attacker, you won't be able to hide by simply using VPN and Tor.
       | Especially if you're running something with many transactions
       | like AlphaBay. You would need to obfuscate quite a bit more:
       | 
       | - if you're using VPN traffic but most people "around" you
       | aren't, you're a suspicious node; your ISP could easily flag you
       | to your government. If you use wifi at a common point you're
       | likely to be flagged and there isn't an easy way other than
       | keeping on the move. But moving often is another anomalous event,
       | and it's very difficult to do even for Drug Lords ( El Chapo ) or
       | Terrorists that it behooves to do. This puts you in a sort of
       | _Zugzwang_ , to borrow a chess term.
       | 
       | - there's always leakage, for instance, in the way you talk with
       | people in the real world. At some point you send enough
       | communication for sophisticated frequency analysis.
       | 
       | - and there are other patterns of usage that could be used to
       | identify you, like searches or even keyboard frequency on
       | anonymized accounts can be de-anonymized by very specific markers
       | ( ML works! ).
       | 
       | - off ramps for crypto aren't very good. If you're in e.g.
       | Brazil, haha, yeah, good luck spending bitcoin or any other
       | crypto and going unnoticed. Mixers and tumblers will eventually
       | leak and you'll be caught.
       | 
       | - you're very vulnerable to social engineering by people you do
       | business with. one slip where you stop communicating in a
       | transactional mode of communication and that's a weak link in
       | your armor.
       | 
       | In the end, the FBI only has to be right once, and you have to be
       | right every time.
        
         | weq wrote:
         | Scamming is BOOMING. We are talking entire developing countries
         | getting onboard. The noise ratio is very high on all these
         | services. There are hundreds of "alphabays" running RIGHT now
         | with millions of people using them, right now. This isnt 2013,
         | those big take-downs of high profile sites did nothing but
         | diversify, fracture the community.
         | 
         | Sure, if u piss off the wrong agent and they spend a few years
         | on the case you may get busted. But the vast majority?
        
         | xvector wrote:
         | > keyboard frequency on anonymized accounts can be de-
         | anonymized
         | 
         | Whonix uses Kloak to mitigate this [1], but unfortunately it
         | isn't available in Qubes-Whonix.
         | 
         | > Mixers and tumblers will eventually leak
         | 
         | Don't use mixers and tumblers, use Monero and/or Monero atomic
         | swaps.
         | 
         | But, you are right that it is futile to maintain defense
         | against a determined 3 letter agency.
         | 
         | [1]:
         | https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak
        
         | 323 wrote:
         | What you said and much more.
         | 
         | For example, you buy a burner phone, but the place you bought
         | it from, even if a second hand shop, had a security camera.
         | Maybe they also record IMEI's before selling phones.
         | 
         | Or you carry your burner phone together with your real phone.
         | Or alternatively, you leave one at home when using the other.
         | Both of these things can be linked by a sufficiently determined
         | actor (FBI/NSA level).
         | 
         | Or they track you to using a public square WiFi one day. Again,
         | cameras are everywhere.
         | 
         | If they got your real name, no matter how, it's game over. You
         | will be surveilled and they will find proof to link you. This
         | is why all those posts "if only DPR used this kind of
         | encryption or dead-men-switch" are ridiculous. Once they knew
         | his real name it was just a matter of time and building a case.
        
           | cellis wrote:
           | I would say that if you're caught and ... _somehow_ manage to
           | delete all the evidence linking you ( you have device
           | explosives or, idk, 2048 bit encryption ), you _may_ be able
           | to escape, but come on, who are we kidding: the FBI has like
           | a 99.96% conviction rate and that 's without even going to
           | into the "parallel construction" or other conspiratorial
           | lines of attack.
        
             | 323 wrote:
             | I don't think the FBI would be that dumb to arrest you
             | before they have solid proof.
        
         | ogisan wrote:
         | You're absolutely right. It is not enough to use anonymity
         | tools, you also have to make sure everything else around you
         | doesn't compromise your anonymity. Made me think of a Harvard
         | bomb threat incident where the student posting a fake bomb
         | threat (through Tor) to avoid final exams was the only person
         | using Tor on campus at the time, which trivially identified
         | him.
         | 
         | https://theprivacyblog.com/blog/anonymity/why-tor-failed-to-...
        
           | klysm wrote:
           | Many anonymity tools have the k-anonymity property. It's
           | really unfortunate for k to be 1.
        
             | 323 wrote:
             | This is the big problem of crypto coin mixers. 99% of their
             | users are trying to launder illegal bitcoin.
        
         | blowski wrote:
         | It's a bit like Schneier's Law. You can put in place
         | protections that you personally cannot workaround, but that
         | doesn't mean someone with sufficient means and motivation would
         | also be blocked.
        
       | 14 wrote:
       | This reminds me of a time I was having a yelling match with a guy
       | on reddit and he started calling me names. I google searched his
       | username and he had used it across multiple sites, several being
       | porn sites, and he also posted his reddit user name on his
       | Facebook and a Facebook search I found his real name and pictures
       | of him. When I called him by his real name and linked a picture
       | of him he immediately changed his tune. In the end he and I both
       | laughed and thought it was funny and he was more curious how I
       | found all those thing. I told him he used the same username
       | across multiple sites including Facebook. He said he was a lot
       | younger and didn't think of those things when he originally did
       | it. I removed any post where I used his name and tried not to dox
       | him for others to see.
        
       | Barrin92 wrote:
       | It's good advice. The problem with anonymity in an environment of
       | ubiquitous surveillance is that it's paradoxical. The point of
       | anonymity is achieving freedom, but staying anonymous expends
       | energy and makes you a target, so you can't actually do any
       | things that anonymity was supposed to get you.
       | 
       | If what you really want is sovereignty, which is what most people
       | confuse anonymity with, the goal is to be like what Ernst Junger
       | called the _anarch_ (in contrast to the _anarchist_ ), which is
       | someone who complies and renders herself indifferent to
       | authority, rather than standing out and drawing attention.
       | 
       | A much better practice is to be as open as possible about the
       | boring stuff, so you're not constrained and can do what everyone
       | else does. Trying to be absolutist about anonymity is
       | automatically like wearing a straitjacket.
        
         | roughly wrote:
         | > If what you really want is sovereignty, which is what most
         | people confuse anonymity with, the goal is to be like what
         | Ernst Junger called the anarch (in contrast to the anarchist),
         | which is someone who complies and renders herself indifferent
         | to authority, rather than standing out and drawing attention.
         | 
         | This works right up until the thing you want to do - or the
         | person you find yourself to be - is something authority is not
         | indifferent to.
        
         | chaxor wrote:
         | > expending energy
         | 
         | One thing I noticed out of many of the list items given in the
         | post here:
         | 
         | > Only use Tor > Always use a VPN > Never use Google -- only
         | DuckDuckGo > Disable JavaScript on your browser > Watch all
         | incoming and outgoing network calls regularly and scan for
         | abnormalities > Encrypt your laptop and any external drives >
         | End-to-end encrypted communication only > Don't use Gmail --
         | use ProtonMail > Never pay with cards. Use cryptocurrencies. >
         | Turn off all location services from your laptop and phone
         | 
         | Is that these can actually be solved with technology in a way
         | that these are the _default_ and popular behavior (as TLS 1.3
         | is in HTTPS). So it 's important that we realize that these
         | technologies (or something like them) are important and
         | _desired by everyone_ , but just need a bit of development to
         | work. Https and signal are great examples. Many of my parents
         | and grandparents are on signal now, because it's better than
         | most other apps (whatscrap, Facebook msg, imsg, etc). Is the
         | Loki network and Session better? Sure. Of course. But
         | grandparents aren't using it yet because not everyone they know
         | is on it yet like signal, just the tech knowledgeable, or many
         | of their grandchildren.
         | 
         | But ultimately, _None of this should require any effort
         | whatsoever_.
         | 
         | The rest of the points about concealing your name or not is
         | more obviously a choice by the user, as they have to provide it
         | knowingly - so it's less of an issue because they're more
         | likely aware of their choice.
         | 
         | > Don't buy domain names I'm not sure I understand this one -
         | anyone have an explanation?
        
           | cure wrote:
           | > Don't buy domain names I'm not sure I understand this one -
           | anyone have an explanation?
           | 
           | When you buy a domain name, you are supposed to supply
           | accurate ownership information. If you do not, the registry
           | can yank your domain when they discover that. Most registrars
           | obfuscate/hide the information in their whois service, but
           | they still need to have it to comply with the rules of the
           | registry. That information can be subpoenaed.
           | 
           | The purchase/renewal transaction(s) also leave a trail that
           | can be followed.
        
       | blakesterz wrote:
       | "Ultimately, anonymity comes down to one thing: Control. You
       | should educate yourself on data privacy and make sure that you
       | know what data you're sharing and what is possibly out there."
       | 
       | That's some REALLY good Solid advice.
        
         | touisteur wrote:
         | And be OK that sometimes some people don't want to interact
         | with anonymous randos... Credentials are not everything, but
         | they _are_ a filter on medias with large amounts of time-
         | wasters...
        
       | chillycurve wrote:
       | I have been afraid of sharing my ideas, post history, etc. in a
       | way that could be easily traced back to my identity for years. I
       | made sure my accounts and usernames bore no personally
       | identifiable tid-bits. I use a VPN religiously (that won't
       | change).
       | 
       | I've since decided that I am done with all that.
       | 
       | I was afraid my employer might question my Reddit posting history
       | (they wouldn't.) I was worried someone who Googled me would think
       | my past self was dumb (who cares).
       | 
       | Now my ideas are almost all public and growing more so by the
       | day. I am working up the energy to start a personal blog, if
       | anything just to document my ideas over time. I am adding my real
       | name and email to my Github, HN, (not Reddit, yet, though it
       | would not be hard to connect), IH, etc.
       | 
       | I want someone to be able to Google me and find my best work.
       | 
       | On the other hand, there are clearly cases and types of
       | info/accounts that should remain private. I self-host as much as
       | possible. I encrypt personal files before uploading. I have
       | multiple Protonmail accounts. I use custom DNS, etc.
       | 
       | Ideas should be public. Information is a case by case basis, but
       | I generally care a lot less than I used to.
        
         | chaxor wrote:
         | What do you use as a custom DNS?
        
       | mindvirus wrote:
       | The article touches on a good point: one mistake and you're out.
       | It doesn't even have to be your mistake - you didn't choose to
       | put your SSN out there after all, yet here we are.
       | 
       | This gave me a radical company idea, on the other end of the
       | spectrum: spam as a service. Something that'll take your name,
       | email, and other things and put it all over the internet in
       | questionable and plausibly denial ways. That way, even when
       | someone is trying to find things out about you, it'll be hard to
       | find, and easy to deny. (I'm kidding of course).
        
         | [deleted]
        
         | _moof wrote:
         | _> It doesn 't even have to be your mistake_
         | 
         | This is the crucial piece. It doesn't matter how careful you
         | are; everyone who knows you has to be careful too. I have a...
         | well, I hesitate to use the word stalker, because that makes
         | them sound more motivated than they really are. But someone on
         | that spectrum, anyway. After a few years of being harassed I
         | managed to elude them. Then they found me again. You know how?
         | They pieced together two pieces of information posted publicly
         | by other people. That's all it took.
        
         | hammock wrote:
         | This idea exists but doesn't always work.
         | 
         | Example A: Apparent Nazi sympathizers planted inside the
         | Canadian protests- some people thought they were provocateurs,
         | others assumed they were legit and cast a negative light on the
         | protests overall
         | 
         | Example B: Hunter Biden's laptop (before it was acknowledged to
         | be real). Saying he was a target for disinformation campaigns
         | mostly worked
        
         | Liiiii wrote:
         | "Something that'll take your name, email, and other things and
         | put it all over the internet in questionable and plausibly
         | denial ways."
         | 
         | What if instead of spamming the correct information out, spam
         | slightly incorrect information out.
         | 
         | Correct address, incorrect middle initial, wrong birth month,
         | and a machine generated SSN would be from the right time
         | period, area number, but with an incorrect group and serial
         | number.
        
         | adelie wrote:
         | This is essentially the premise of Neal Stephenson's Fall or
         | Dodge in Hell.
        
           | [deleted]
        
         | propesh wrote:
         | Kidding aside, this is exactly how it will go down. Politician
         | in a scrape of financial corruption or etc.? Deepfake s*x video
         | or other viral blatant misinformation & obfuscation; what's the
         | risk? Upside, no one knows what to believe. Exactly what
         | various "countries" are doing. It will be extreme; to the point
         | where, don't believe half of what you actually see.
        
           | bee_rider wrote:
           | It should be noted that this is a pretty bad end state.
           | Reporting is already an extremely weak force for preventing
           | corruption on the part of the powerful. Journalists entering
           | a state of total uselessness is only going to make the
           | problem bigger.
           | 
           | In a realm of total bullshit the winners are the one who are
           | best at lying. "I don't know what to believe and everyone
           | involved is probably corrupt" is usually just an excuse to
           | disengage and follow base instincts.
        
         | bugBunny wrote:
         | I guess none of these suggestions really work without the last
         | one "Move to Brazil and live in the rainforest" :)
        
           | hammock wrote:
           | Even that didn't work for John McAfee
        
             | LinuxBender wrote:
             | To be fair he never lived in a rain forest. He was always
             | around people and often managed to upset many of them.
        
         | Damogran6 wrote:
         | Name it something catchy...like equiphax
        
           | HPsquared wrote:
           | "equip hax"
        
       | alliao wrote:
       | Photos easily pinpoint you too, any pictures you upload + user
       | name is pretty much game over
        
       | nickstinemates wrote:
       | The conclusion is a weird one, given the premise. The crux of the
       | argument is basically true. Its an all or nothing proposition.
       | 
       | Or you can lead a double life. One for your public persona, where
       | you don't care at all about security, and your real persona,
       | where you do. This has been my approach on the internet since
       | basically it started and handles were a common thing.
        
         | caslon wrote:
         | With that in mind, you just might have posted this comment on
         | the wrong account.
        
         | ReactiveJelly wrote:
         | > The crux of the argument is basically true. Its an all or
         | nothing proposition.
         | 
         | No, it's not.
         | 
         | Every online account (that doesn't involve money or legal
         | paperwork) can have its own name. Then you can decide whether
         | to have _some_ accounts ultimately link back to your legal
         | name, or all accounts, or none.
         | 
         | > Or you can lead a double life. ... This has been my approach
         | on the internet since basically it started and handles were a
         | common thing.
         | 
         | That's exactly what I'm doing, and neither of us are living in
         | the Brazilian rainforest, so anonymity really is a spectrum.
        
           | numpad0 wrote:
           | > Then you can decide whether to have _some_ accounts
           | ultimately link back to your legal name,
           | 
           | No, _you_ don 't. Someone else could, if there is one with
           | high enough affection to you. I think you'll have to think of
           | bulk ingestion and on-prem processing to be sure your
           | activities won't trace back to you.
        
         | aqme28 wrote:
         | I don't think it's all or nothing. Look at anonymous public
         | personas like Banksy or Dril. People have tracked them down,
         | and you can look up who they are if you try.
         | 
         | But for the most part these people are anonymous, and get to
         | enjoy some of the benefits of that.
        
       | oh_sigh wrote:
       | Alex Cazes had bad op-sec. His #2, DeSnake, didn't, and is still
       | alive and well and has restarted his marketplace and gives
       | anonymous interviews to media outlets:
       | 
       | https://www.wired.com/story/alphabay-desnake-dark-web-interv...
        
       | kwhitefoot wrote:
       | The title is misleading, clickbait. The article is in fact about
       | why it probably isn't necessary to be anonymous and even then
       | says nothing particularly important.
        
         | djur wrote:
         | A title not precisely describing the premise and conclusion of
         | the article is neither misleading nor clickbait. The article is
         | about online anonymity. It could be "On being anonymous" or "To
         | be anonymous"; "Be anonymous" is fine, too.
        
       | sampo wrote:
       | Maybe Eric S. Raymond's advice from 21 years ago is no longer
       | true in today's internet:
       | 
       | > Concealing your identity behind a handle is a juvenile and
       | silly behavior characteristic of crackers, warez d00dz, and other
       | lower life forms. Hackers don't do this; they're proud of what
       | they do and want it associated with their real names. So if you
       | have a handle, drop it. In the hacker culture it will only mark
       | you as a loser.
       | 
       | http://www.catb.org/~esr/faqs/hacker-howto.html#style
        
         | YaBomm wrote:
        
         | hkon wrote:
         | Easily. It was advice for another time.
        
       | vmception wrote:
       | Exhibit A: Was Mary only _from_ Syracuse, or was Kash, kg.dev,
       | using dating apps _in_ Syracuse
       | 
       | well, I got tired of caring already, but maybe others havent.
        
       | alfiedotwtf wrote:
       | Good article!
       | 
       | As an experiment, a few years ago I put my mobile phone number on
       | my blog, and to date I've only received 2 anonmous messages on
       | Signal but no calls besides recruiters.
       | 
       | The old adage "No one is thinking about you as much as they are
       | thinking about themselves" is true.
       | 
       | While it's good to practice good security hygiene, be mindful of
       | also being practical.
        
       | ReactiveJelly wrote:
       | Agreed. Anonymity is a spectrum. Just like personal finance, most
       | people haven't even begun to assess what state they're in.
       | 
       | You should not accept the state you're in without knowing what
       | state that is. Most people should have more anonymity than
       | they're giving themselves.
       | 
       | "Defend your rights. Nobody else will do it for you."
       | 
       | -- ReactiveJelly
        
       | DantesKite wrote:
       | There's a middle ground somewhere here, in between "Don't be a
       | criminal" and "Don't be stupid."
       | 
       | I don't think the lesson we should take from AlphaBay is "Take
       | better privacy safeguards" but "Don't set up an illegal dark web
       | operation."
        
       | underwater wrote:
       | I mix @realname and @pseudonym accounts. I'm generally pretty
       | careful about what I post under my real name and less so under an
       | alias.
       | 
       | However, over time I drop enough clues that people could figure
       | my real identity with a little work. That leaves me with the
       | worst of both worlds. It seems safest to assume that your
       | identity is always tied to everything you do online.
        
         | can16358p wrote:
         | I think with ML getting smarter and people posting (either with
         | their identity or anonymously) more and more content, it will
         | be trivial to crossmatch anonymously posted content to real
         | identities by ML examining "styles" of text: from punctuation
         | to sentence structure to vocabulary use, and it will have an
         | accurate estimation of who that "anonymous" person is.
        
           | kibwen wrote:
           | This would be pretty easy to counter by having a tool that
           | would analyze any comment you post and strip all the
           | identifying marks out of it; no punctuation other than
           | periods, no complex or compound sentences, all words replaced
           | by equivalents from the list of the most common thousand
           | English words, all voices and tenses normalized, no
           | paragraphs, no capitalization, etc.
        
       | numpad0 wrote:
       | Notably missing aspect is precise time of events.
       | 
       | Personas like someone who posts content during 08:34:40 -
       | 09:23:23 except 08:43:30-08:55:23, never seems to be active
       | during 22:00 - 06:00, can be narrowed down to something like a
       | person commuting via bus route A from stop B to C changing to a
       | train route from C to D through passageway E in the station.
       | 
       | From there you can look for a man looking down at a phone, or
       | couple information with other factors, or throw in a bait like a
       | giant stinking dead fish or a rare and loud car in front of him
       | and watch for responses he'd make. IMSI catchers and Bluetooth
       | scanners can be useful as well if your adversaries are
       | resourceful. Time and location of transmissions and time of
       | receptions can be correlated, in theory.
       | 
       | This type of attacks can't be mitigated on fast-paced social
       | media at all; both posts and requests has to be queued and
       | obfuscated for time.
        
         | mhitza wrote:
         | That's a bultin feature of messaging systems like I2P-bote
         | (running on I2P darknet). It's been a while since experimenting
         | with Bitmessage but I think they queue/batch messages as well.
         | But for forum like software that's definitely true, can't
         | easily have variable delayed posting.
         | 
         | Another aspect that's important and often ignored, is writing
         | style anonymization. You practically want an offline tool, that
         | removes idiosyncrasies from the text you write and makes it
         | sound as bland as possible.
         | 
         | edit:
         | 
         | A related story. Around 2010-2012 I was working for a company,
         | and I was part of a somewhat managerial group. At one point we
         | decided to pull in direct employee feedback in an anonymous
         | free-text form. Due to their writing style being reflective on
         | the way they spoke, it was possible to point exactly who wrote
         | what message. Of course, few exceptions existed, I didn't
         | personally know all the employees in the company.
        
       | chayesfss wrote:
       | Share accounts with others, widely. No reason not to unless
       | you're trying to build up some type of e-cred with your other
       | account.
        
       | indigodaddy wrote:
       | Feels like the article is slanting this Alex guy as a hero of
       | sorts? I don't like the tone of the article and wish I hadn't
       | clicked on it now..
        
       | ChrisMarshallNY wrote:
       | I'm sort of the opposite.
       | 
       | I make sure that I can be found and attributed. I deleted my last
       | anonymous account, a couple of years ago. In the Days of Yore, I
       | was pretty much "Dick From the Internet." A real neckbeard troll.
       | 
       | There's a lot of reasons that I do it. The biggest, is that I
       | want to be in control of my narrative. I learned from a couple of
       | folks that are _really good_ at curating their SEO results.
       | 
       | Also, these days (for a change), I'm pretty well-behaved. Doing
       | it this way, helps to keep it that way.
        
       | srmarm wrote:
       | Privacy is on a spectrum, but is also compounded by time and once
       | the cats out the bag it can be impossible to turn back. In the
       | example given of Alex Cazes he could change the from email but
       | the damage was already done - there's no way to recall the emails
       | already sent that led a trail back to him.
        
         | upofadown wrote:
         | The article states that _anonymity_ is on a spectrum. Privacy
         | is a different issue. You can lead an entirely private but non-
         | anonymous life.
        
       | formerly_proven wrote:
       | Be anonymous
       | 
       | Become ungovernable
        
       | jefftk wrote:
       | The article presents a spectrum, dismisses both extremes, and
       | advocates that people aim for the middle. The problem is, you may
       | think you are hanging out in the middle, but you probably have
       | much less privacy than you think you do. Even if you are making
       | the right choices for today, you can't trust that the future will
       | keep things private (advances in ML, ubiquitous surveillance) and
       | you don't know that futures isn't here yet.
       | 
       | Personally, I hang out at the fully open end of that spectrum.
       | This has worked out pretty well for me; I don't think I've run
       | into any downsides.
        
       | psacawa wrote:
       | > Don't buy domain names
       | 
       | Can anyone explain this? Assuming your data isn't in the WHOIS
       | record, why does this increase your exposure more than any other
       | company knowing your name?
       | 
       | A search shows up options for anonymous domain name services.
        
       | ur-whale wrote:
       | I would _strongly_ advise anyone who really wants to be anonymous
       | on the internet such as a freedom activist in a totalitarian
       | country, _not_ to follow the advice listed at the end of the
       | article.
       | 
       | Or rather: these are very basic and very naive recommendations,
       | certainly good first steps, but absolutely nowhere near enough to
       | guarantee strong anonymity on the internet.
       | 
       | Remaining truly anonymous on the net is _extremely_ hard,
       | especially in these days where ML can be used to statistically
       | narrow down and pinpoint who wrote a specific piece of text only
       | based on things like use of punctuation, vocabulary, sentence
       | structure and style.
        
         | kgeist wrote:
         | >especially in these days where ML can be used to statistically
         | narrow down and pinpoint who wrote a specific piece of text
         | only based on things like use of punctuation, vocabulary,
         | sentence structure and style.
         | 
         | I think you can fight ML with ML - for example, use GPT-like
         | algorithms generate text for you. But then you must also be
         | careful about when you post - I remember some of the Russian
         | trolls were exposed because their bursts of activity coincided
         | with 9am-6pm Moscow time. So you have to use a random number
         | generator decide when to appear online if you want to hide your
         | location. There's always something which can narrow down their
         | search. One small mistake and you are busted. They don't even
         | need to pinpoint you exactly, if it's narrowed down to
         | 1000-10000 people who meet the criteria, they already win
         | because they have the capacity to go through the list one by
         | one and eventually find you.
        
         | Swenrekcah wrote:
         | Would the solution be a digital version of the old newspaper
         | cutout ransom letter?
         | 
         | Generate via GPT-3 a text giving roughly the impression you
         | want to make and then copy/paste sentences from online news
         | media if you need the names of particular persons or events.
         | 
         | Would be rather crude though, but less tedious than literally
         | cutting and pasting letters was.
        
           | kgeist wrote:
           | I had a similar idea in a sibling post. But this only works
           | if you basically have a secret alter ego which has nothing to
           | do with your work/public persona, because otherwise they can
           | match your favorite topics in those GPT-3 generated texts to
           | your interests in real life, by factoring in also other
           | little facts, like when you usually appear online, etc. It's
           | probably enough to protect the average Joe but imho not
           | enough to protect a targeted freedom activist, unless their
           | activism is their alter ago and publicly they aren't known to
           | be activists. Otherwise their every step is monitored in a
           | typical dictatorship and it's not that hard for them to
           | connect the dots who was the author of a certain message.
        
       | m348e912 wrote:
       | I don't know if dating app users understand that it doesn't take
       | much information to find out who they really are. Sometimes all
       | that's needed is a first name, profession, or university is
       | enough if one of the three is somewhat unique for the area. If
       | you're concerned about privacy on dating apps, you're better off
       | being really vague about basic aspects of your life, or trying a
       | bar instead :)
        
       | Ansil849 wrote:
       | > Don't use macOS or Windows -- only Linux
       | 
       | > Move to Brazil and live in the rainforest
       | 
       | Juvenile, snarky, irreverent and irrelevant advice I'd expect to
       | read on a 12 year old's Reddit post.
        
         | retrac wrote:
         | > I don't know about you, but I don't want to do all of that.
         | [...] I don't recommend being on either extreme of this
         | spectrum.
         | 
         | It's a list of extreme techniques for protecting ones' identity
         | online. Of course, completely sanitizing your online presence
         | is difficult, and probably unnecessary. I thought the two lists
         | were a nice rhetorical framing - present a dilemma (total
         | openness vs. total anonymity) and then wiggle out of it to a
         | compromise.
        
           | Ansil849 wrote:
           | > It's a list of extreme techniques for protecting ones'
           | identity online.
           | 
           | The items I quoted do nothing to protect ones' identity
           | online. Snark is only effective if relevant.
        
             | RustyConsul wrote:
             | holy cow! I literally laughed out loud when i read the
             | rainforest remark. Chill out dude, you're reading something
             | called 'Thoughts' by some random dude on the internet lol
        
             | AitchEmArsey wrote:
             | The closed nature of MacOS and Windows means that you have
             | no guarantees (and no audit mechanism) to determine how
             | much the machine is passing your data back to HQ. As the
             | post very clearly states, most people don't need to care -
             | but someone with extreme paranoia has only one obvious
             | choice here.
             | 
             | Your aggressive negativity is far less interesting than
             | this blog, and serves no purpose whatsoever.
        
         | i_am_proteus wrote:
         | That might be why the next thing in the article is:
         | 
         | >I don't know about you, but I don't want to do all of that.
        
         | can16358p wrote:
         | Linux part is perfecly valid IMO, though the rainforest was I
         | think a bit deliberate exaggeration.
        
           | fsflover wrote:
           | Linux is definitely more anonymous than Windows/Mac, but if
           | you seriously want to be anonymous, you should use Qubes with
           | Whonix.
        
       ___________________________________________________________________
       (page generated 2022-02-20 23:00 UTC)