You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: pseudonymous-identity.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -165,15 +165,18 @@ Having understood privacy basics, taken initial steps to increase your online pr
165
165
Below are choices you can take based on their required dedication of time, money, effort, and skill level, from the least to the most demanding.
166
166
167
167
-**Tor Browser**. You should opt for using the Tor Browser for your pseudonymous identity only if you have absolutely _no time, no money, no technical skills, no effort to allocate, and very limited resources_. The reason is that it will provide the smallest level of protection for you, but is also the easiest to use, as you also would not need to purchase additional hardware. You can simply use the computer you already use, install Tor Browser in it, and use that for your advocacy needs. But beware of the shortcomings of this setup too, notably the limited protection it will give you. Tor usage can be deanonymized based on your non-Tor usage and behaviors, so keep that in mind.
168
-
-**Tails**. If you have a bigger amount of time and learning motivation, but still has limited resources and can't purchase a dedicated laptop, you might want to use [Tails](https://tails.boum.org/index.en.html). Although [not perfect](https://tails.boum.org/doc/about/warnings/index.en.html), Tails can help you [protect your digital life from censorship and surveillance](https://tails.boum.org/about/index.en.html) in a somewhat easy way. You can setup a Tails USB stick to temporarily turn your computer into a secure machine or stay safe while using the computer of somebody else. Do note that if used on a compromised machine, for instance a computer with viruses or with malicious hardware, like keyloggers, Tails won't always be able to protect you. And considering how difficult it can be to spot some malicious software and hardware in a given device, physical compartmentalization is always a better choice.
169
-
-**Tails on a dedicated laptop**.
168
+
-**Tails**. If you have a bigger amount of time and learning motivation, but still has limited resources and can't purchase a dedicated laptop, you might want to use [Tails](https://tails.boum.org/index.en.html). Although [not perfect](https://tails.boum.org/doc/about/warnings/index.en.html), Tails can help you [protect your digital life from censorship and surveillance](https://tails.boum.org/about/index.en.html) in a somewhat easy way. You can setup a Tails USB stick to temporarily turn your computer into a secure machine or stay safe while using the computer of somebody else. Do note that if used on a compromised machine, for instance a computer with viruses or with malicious hardware, like keyloggers, Tails won't _always_ be able to protect you. And considering how difficult it can be to spot some malicious software and hardware in a given device, physical compartmentalization is always a better choice.
169
+
-**Tails on a dedicated laptop**. If your budget allows it, you might want to purchase a dedicated laptop to use for your sensitive activities over Tor on Tails. You can purchase an used business laptop for cash and install Debian on it for increased privacy and security and lower costs. You can also buy an used MacBook Air from 2012 or 2013 for cheap, reset it, and [harden it for increased security and privacy](https://github.com/drduh/macOS-Security-and-Privacy-Guide); then you can use it more safely with Tails. Just make sure you only use this computer for the very specific set of activities your identity needs.
170
+
-**Whonix or Qubes OS on a dedicated laptop.** The reason for having these two operating systems separately here is because of the increased hardware and system specifications they require. Both Whonix and Qubes OS are more demanding to the machine they run in, so you'd need a bigger budget –– and more time and effort –– to set it up. Also reference [this comparison](https://www.whonix.org/wiki/Comparison_with_Others) (onion site [here](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/wiki/Comparison_with_Others)) to judge which system would be better for your specific case.
171
+
172
+
Please note that depending on your threat model you may be required to go at greater lengths to have full anonymity, including anonymous phone numbers. If that's your case, please reference [The Hitchhiker's Guide to Online Anonymity](http://thgtoa7imksbg7rit4grgijl2ef6kc7b56bp56pmtta4g354lydlzkqd.onion/guide.pdf).
170
173
171
174
172
175
## Create Your New Identity
173
176
174
177
After you have taken basic yet important steps to increase present privacy, carefully thought about your threat model, and identified where and how you can harden your privacy and security, you can begin the identity creation process.
175
178
176
-
It is important to define the _scope_ of your new identity. As you've completed the steps above, think about how your identity will interact with the world. More precisely, what will your identity do, through which mediums, with which tools, and when? Having that clear (and often written down) will help you along the way to prevent you from getting
179
+
It is important to define the _scope_ of your new identity. As you've completed the steps above, think about how your identity will interact with the world. More precisely, what will your identity do, through which mediums, with which tools, and when? Having that clear (and often written down) will help you along the way to prevent you from getting distracted.
0 commit comments