Rating: 89.22
- Tutorial -
Become untraceable by creating anonymous identities.
This is how it's done.

The Internet is a giant network of privately owned spaces open to public, where every participant knows the exact identity and location of one another and where corporate stalking is a perfectly legitimate business model. If you are not okay with automated decisions being made about your every move, you should consider creating an anonymous identity.

Anonymity is the most powerful mitigation strategy on a publicly observable network such as the Internet. It is the most direct path towards privacy. This guide will tell you exactly what you need to know and do in order to create and maintain your very own anonymous identity.

The Internet is a privacy nightmare because every action is by default identifiable and linkable. That means actions always lead to a unique location and/or account on the network and actions can built a profile over time.

Linkability and identifiability are your biggest privacy and anonymity threats on the Internet. For maximum anonymity, both of these threats need to be mitigated to the fullest extent possible.

Our first step with any service will be to dissociate our account details from our personal information. The second step is to compartmentalize our anonymous identities so that they are isolated from our personal identities.

Dissociation and isolation of your anonymous identities are not the only steps to keep your anonymity. Be extremely cautious of what types of data you submit to these services while using them. Always think of the linkability and identifiability threats when using these accounts.


PRIVACY THREAT MODELING
https://www.threatmodelingmanifesto.org/

LINDDUN
Strategy for threat modeling
https://www.linddun.org/post/keys-to-successful-privacy-threat-modeling

https://www.linddun.org/linddun


PDF - Detailed Info
https://www.linddun.org/_files/ugd/cc602e_cf7e4c6b1d894bdaabc3094c48b26869.pdf

Instructions
https://www.linddun.org/go-getting-started


Linkability
https://www.linddun.org/linkability

Identifiability
https://www.linddun.org/identifiabili...

Mitigation strategies
https://www.linddun.org/mitigation-st...


RECOMMENDED
TOOLS

KeepassXC
https://keepassxc.org/

Bitwarden
https://bitwarden.com/

FIDO security keys
https://fidoalliance.org/what-is-fido/

GrapheneOS
https://grapheneos.org/

Orbot
https://orbot.app/

Tor Browser
https://www.torproject.org/

Tutanota
https://tutanota.com/

ProtonMail
https://proton.me/

Briar
https://briarproject.org/

OnionShare
https://onionshare.org/

Wire
https://wire.com/en/

Matrix/Element
https://element.io/

How to anonymously
install applications
https://www.privacyguides.org/android...

Aurora
Open Source Software
https://auroraoss.com/

How to obtain an
Anonymous burner phone
- The Intercept
https://www.youtube.com/watch?v=r4gqR...

How to obtain an
Anonymous burner phone
- The Hated One
https://www.youtube.com/watch?v=vMJH-...


NEWS SOURCES
Google location tracking
https://www.wsj.com/articles/states-file-new-suits-against-google-over-location-tracking-11643037890

Chainalysis https://www.coindesk.com/business/2022/08/04/chainalysis-estimates-2b-stolen-from-cross-chain-bridge-hacks-this-year/


LCS-Team:
IF You LIKE...
The Content and the efforts the Video Creator then please Support independent research and analysis by joining his Patreon Page: https://www.patreon.com/thehatedone

NOTE: We feature multiple of his videos, as they are helpful and contain good advice !

NO we are NOT sponsored by him and/or affiliated with his channel We just like his efforts and trying to assist him to get donations.

  TOS    © 2017-2025 LanggaCyberSpace.Com     Coalition Production of: USA and Philippines