The Hated One

Become Untraceable - How To Create An Anonymous Identity

Tutorial

Published on Aug 13, 2022

The Internet is a giant network of privately owned spaces open to public, where every participant knows the exact identity and location of one another and where corporate stalking is a perfectly legitimate business model. If you are not okay with automated decisions being made about your every move, you should consider creating an anonymous identity.

Anonymity is the most powerful mitigation strategy on a publicly observable network such as the Internet. It is the most direct path towards privacy. This guide will tell you exactly what you need to know and do in order to create and maintain your very own anonymous identity.

The Internet is a privacy nightmare because every action is by default identifiable and linkable. That means actions always lead to a unique location and/or account on the network and actions can built a profile over time. Linkability and identifiability are your biggest privacy and anonymity threats on the Internet. For maximum anonymity, both of these threats need to be mitigated to the fullest extent possible.

Our first step with any service will be to dissociate our account details from our personal information. The second step is to compartmentalize our anonymous identities so that they are isolated from our personal identities.

Dissociation and isolation of your anonymous identities are not the only steps to keep your anonymity. Be extremely cautious of what types of data you submit to these services while using them. Always think of the linkability and identifiability threats when using these accounts.

+++

Sources & Links

PRIVACY THREAT MODELING https://threatmodelingmanifesto.org

LINDDUN strategy for threat modeling

https://linddun.org/post/keys-to-successful-privacy-threat-modeling

https://linddun.org/linddun linddun.org/_files/ugd/cc602e_cf7e4c6b1d894bdaabc3094c48b26869.pdf

https://linddun.org/go-getting-started

Linkability

https://linddun.org/linkability

Identifiability

https://linddun.org/identifiability-1

Mitigation strategies https://linddun.org/mitigation-strategies-and-solutions

RECOMMENDED TOOLS KeepassXC https://keepassxc.org

Bitwarden

https://bitwarden.com

FIDO security keys https://fidoalliance.org/what-is-fido

GrapheneOS

https://grapheneos.org

Orbot

https://orbot.app

Tor Browser

https://torproject.org

Tutanota

httos://tutanota.com

ProtonMail

https://proton.me

Briar

https://briarproject.org

OnionShare

https://onionshare.org

Wire

https://wire.com/en

Matrix/Element

https://element.io

How to anonymously install applications https://privacyguides.org/android/#obtaining-applications

Aurora Open Source Software https://auroraoss.com

How to obtain an anonymous burner phone - The Intercept https://youtube.com/watch?v=r4gqRYkA9KE&t=0s

How to obtain an anonymous burner phone - The Hated One https://youtube.com/watch?v=vMJH-UJyENs

NEWS SOURCES Google location tracking

https://wsj.com/articles/states-file-new-suits-against-google-over-location-tracking-11643037890

Chainalysis

https://coindesk.com/business/2022/08/04/chainalysis-estimates-2b-stolen-from-cross-chain-bridge-hacks-this-year

Credits Music by:

https://youtube.com/channel/UCcavSftXHgxLBWwLDm_bNvA

Follow me:

https://twitter.com/The_HatedOne_ reddit.com/r/thehatedone

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

+++

Privacy Link:

https://youtu.be/G_QsQp7DyjE

Onion (Tor) Invidious Link:

http://inv.nadekonw7plitnjuawu6ytjsl7jlglk2t6pyq6eftptmiv3dvqndwvyd.onion/watch?v=G_QsQp7DyjE

Reply to this note

Please Login to reply.

Discussion

No replies yet.