TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Starting a new digital identity

248 pointsby nochabout 4 years ago

12 comments

shaneclevelandabout 4 years ago
This is more about avoiding having a digital identity. I recently created a second Twitter account to create some separation between personal and business interests, conversations, etc.<p>Not that I want to have two identities, but I would like to be able to distinguish between them. It was not difficult, but required some effort to create separation (I didn&#x27;t want twitter suggesting my &quot;business&quot; account to my friends I already followed on my personal account).<p>Facebook was another story. I have never had a Facebook account until a couple of weeks ago. I took on a new hobby recently, and the most active community around this topic is exclusively on Facebook. I joined and immediately disabled the ability to be seen to the extent I saw possible. But then Facebook disabled my account within 24 hours – the irony! They allowed a review process, which required a selfie (they clearly know my identity through facial recognition, despite having never supplied a picture myself). They let me back in fairly quickly. But I hate having to &quot;support&quot; the ecosystem. And it turns out I cannot friend anybody without allowing their friends to view my account.
评论 #26896380 未加载
评论 #26896504 未加载
评论 #26898735 未加载
评论 #26900205 未加载
vlfigabout 4 years ago
For a less romanticised, more practical resource on the topic, I recommend The Hitchhiker’s Guide to Online Anonymity <a href="https:&#x2F;&#x2F;anonymousplanet.org&#x2F;guide.html" rel="nofollow">https:&#x2F;&#x2F;anonymousplanet.org&#x2F;guide.html</a><p>(also, Monero &gt; bitcoin)
评论 #26893647 未加载
评论 #26896616 未加载
rsyncabout 4 years ago
This is a topic I think a lot about. I don&#x27;t have a lot of time this morning so I will just say a few things ...<p>First, the OP describes an eSIM for his mobile phone - in this case with a provider named &quot;silent.link&quot;. In my experience, eSIMs provide &quot;voip&quot; numbers and not actual &quot;mobile&quot; numbers. This is an important distinction since <i>most</i> 2FA verifications[1] come <i>not</i> from a phone number, but from a &quot;short code&quot;[2] and voip numbers cannot receive SMS from a short code. So you are quite limited in what services you can sign up for and maintain with just an eSIM.<p>Second, the term &quot;threat model&quot; does not appear in the article. This is important because if your threat model is &quot;everyone except state level actors&quot; or &quot;everyone but state level actors AND my bank&quot; the possibilities open up <i>dramatically</i>. I think there is a tremendous amount of benefit in remaining anonymous in relation to your carrier and the FAANGs and (various vendors) that is realistic to achieve - but anonymity in relation to state level actors is practically impossible.<p>Third, there is a big, giant blind spot in the entire chain of identity and that is the following: VISA&#x2F;MC <i>do not validate name and address</i>[3]. It seems like they do - and merchants believe that they do - but they do not. This means you can use your bank card with <i>any name you like</i> and the minimal address match (which, in the US, is zip code). I&#x27;m not going to diagram this out for you but if your threat model is (everyone except bank and state level actors) you now have the basis for a working pseudonym.<p>Fourth, a second blind spot in the chain of identity is a business tax ID (which you can get for free at[4]). Many providers (like mobile carriers) ask for things like SSN, etc., but if you say &quot;business&quot; and give them a tax ID, it&#x27;s like their brains turn off. They typically don&#x27;t even ask for ID. You can initiate service over the phone. You <i>may</i> be forced to pay a higher rate for &quot;business service&quot;.<p>[1] gmail, your bank, even twilio (ironically).<p>[2] <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Short_code" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Short_code</a><p>[3] AMEX does.<p>[4] <a href="https:&#x2F;&#x2F;sa.www4.irs.gov&#x2F;modiein&#x2F;individual&#x2F;index.jsp" rel="nofollow">https:&#x2F;&#x2F;sa.www4.irs.gov&#x2F;modiein&#x2F;individual&#x2F;index.jsp</a>
评论 #26891192 未加载
评论 #26890589 未加载
评论 #26900263 未加载
评论 #26891530 未加载
cyberlababout 4 years ago
This is a form of blue team hacking, and instead of doing offense, you are doing defense. It&#x27;s worth remembering how it can all come crumbling down due to bad OPSEC. Read this for more information: <a href="https:&#x2F;&#x2F;blogsofwar.com&#x2F;hacker-opsec-with-the-grugq&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blogsofwar.com&#x2F;hacker-opsec-with-the-grugq&#x2F;</a><p>The covert lifestyle can be mentally taxing, and you <i>will</i> make mistakes (if you&#x27;re not <i>consistently</i> careful). Here&#x27;s a good quote from that Grugq article:<p><pre><code> As I phrased it in my “The Ten Hack Commandments” — be proactively paranoid, it doesn’t work retroactively.</code></pre>
评论 #26891483 未加载
评论 #26892181 未加载
captn3m0about 4 years ago
&gt;[...] but instead opt for a free Protonmail account<p>Protonmail faces a lot of spammer signups for their free plan and require a reCaptcha, Email, or SMS to create a free account[0]. In practice I&#x27;ve always been asked for a email or SMS.<p>They do clarify:<p>&gt;We don’t save reCaptcha results. If you are presented with Email or SMS verification, we only save a cryptographic hash of your email or phone number which is not permanently associated with the account that you create.<p>so it seems okay, but there is a temporary trail (I remember reading that they delete these after some time) to your original email&#x2F;mobile to maintain rate-limits.<p>Something to keep in mind.<p>[0]: <a href="https:&#x2F;&#x2F;protonmail.com&#x2F;support&#x2F;knowledge-base&#x2F;human-verification&#x2F;" rel="nofollow">https:&#x2F;&#x2F;protonmail.com&#x2F;support&#x2F;knowledge-base&#x2F;human-verifica...</a>
评论 #26890887 未加载
JKCalhounabout 4 years ago
Reads sort of like part nerd romance and part paranoia-tinged thriller. 3 out of 5 stars, would recommend to my engineer friends.
评论 #26896572 未加载
mywittynameabout 4 years ago
I would think that true digital hiding requires a good bit of misdirection. If you go completely off the grid, then you leave a hole where a person should be. But if you have a legitimate house, credit card, phone, facebook account, etc. then you have plausible deniability when it comes to hiding.<p>The person looking into you might shrug and be like, &quot;this is all we have on them.&quot;
评论 #26899013 未加载
tacostakohashiabout 4 years ago
A &quot;digital identity&quot; should be easy enough, using the steps mentioned or by other means.<p>I have sometimes thought it would be (more) interesting doing this with a real identity. I suspect it wouldn&#x27;t actually be that hard to find an identity &#x2F; birth certificate for someone from an obscure county, perhaps with poor &#x2F; lost records and try to build up a paper trail from there, as much as a sport as anything else.<p>I have a suspicion that it would be fairly doable to get quite far with it, but of course one slip-up and you could end up in prison.
评论 #26892414 未加载
评论 #26891640 未加载
评论 #26895073 未加载
评论 #26896577 未加载
dj_mc_merlinabout 4 years ago
Leading an identity-less life will not protect you from having your business intruded upon. It requires a lot of effort and setup, which means a lot of possible trails to leave behind. And if people look into you and see nothing where you should be, that&#x27;s immediately suspicious.<p>Criminals have been doing it for ages though, by keeping a low profile. You cannot reliably hide from the state, but if you seem insignificant you can go unnoticed for a long time. Low-level dealers in many countries just use WhatsApp, some straight up text and call, despite knowing police could always be listening. If you&#x27;re selling to a couple dozen people, the police won&#x27;t bother tracking you down. They have bigger fish to fry. Higher-level dealers engage in much more OPSEC: using fake names, not letting anyone not involved see them, meeting in person etc. This is a consequence of the fact that they are more likely to be noticed.
dobladovabout 4 years ago
I can see some logic in buying second hand devices, but wouldn&#x27;t be better to buy new ones with cash since second hand devices already have a history of usage that could lead to locate you?
评论 #26893590 未加载
评论 #26890319 未加载
mooredsabout 4 years ago
&gt; The only social media I would have is a nym twitter account<p>What is nym in this context? That&#x27;s a new word for me.
评论 #26890142 未加载
评论 #26890325 未加载
trungdq88about 4 years ago
Can someone explain to me why doesn&#x27;t he use his existing cash to buy stuff?
评论 #26890576 未加载
评论 #26890440 未加载