Setting up pseudonymous social media

00:21:25
https://www.youtube.com/watch?v=dgd5_2pfEd0

Ringkasan

TLDREl vídeo argumenta que l'anonimat a les xarxes socials és essencial per a la llibertat d'expressió i la seguretat personal. S'exploren les raons per les quals la privadesa hauria de ser protegida, incloent la capacitat de parlar sense por de represàlies i la necessitat de separar diferents aspectes de la vida personal i professional. El vídeo ofereix consells sobre com mantenir l'anonimat, incloent la creació de comptes pseudònims, l'ús d'adreces de correu electrònic alternatives i números de telèfon VoIP. També es discuteixen diferents models de amenaça i la importància de comprendre el nivell de risc personal. Finalment, es destaca que la privadesa és un dret normal que tothom hauria de poder exercir.

Takeaways

  • 🔒 La privadesa és essencial per a l'expressió personal.
  • 🛡️ L'anonimat protegeix contra represàlies i assetjament.
  • 📊 Hi ha diferents models de amenaça que requereixen diferents proteccions.
  • 📧 Utilitza correus electrònics alternatius per a comptes pseudònims.
  • 📱 Evita compartir informació personal a les xarxes socials.
  • 🔄 Rotar identitats pot reduir l'exposició i el risc d'identificació.
  • 🌐 Utilitza navegadors enfocats en la privadesa per a una millor seguretat.
  • ⚠️ Si estàs en risc extrem, busca ajuda d'experts en seguretat.
  • 📝 La privadesa no és només per a aquells en situacions extremes, és un dret normal.
  • 💪 Cada pas cap a la privadesa fa una diferència.

Garis waktu

  • 00:00:00 - 00:05:00

    L'anonimat a les xarxes socials és essencial per a la llibertat d'expressió i la privadesa. La importància de poder parlar sense por de represàlies és destacada, i l'exemple d'una economista que volia un compte separat per fer broma il·lustra com la privadesa permet explorar diferents aspectes de la personalitat.

  • 00:05:00 - 00:10:00

    La privadesa no només és per a la comoditat, sinó també per a la seguretat. Les persones poden voler evitar assetjament o trolls, i la privadesa permet parlar honestament sense por de repercussió. La importància de la privadesa és especialment alta per a activistes o persones que podrien ser perseguides per les seves creences.

  • 00:10:00 - 00:15:00

    El vídeo ofereix consells sobre com mantenir l'anonimat a les xarxes socials, començant per la creació d'un compte pseudònim. Es recomana evitar l'ús de noms reals, correus electrònics i números de telèfon que puguin vincular-se a la identitat real, així com evitar seguir persones properes o compartir detalls personals.

  • 00:15:00 - 00:21:25

    Es presenten diferents nivells de protecció per a usuaris amb diferents models de risc. Les proteccions bàsiques són per a aquells amb un model de baix risc, mentre que les proteccions avançades són per a aquells amb un model de risc més alt. Es recomana l'ús de navegadors enfocats en la privadesa i la separació d'identitats per evitar la correlació entre comptes.

Tampilkan lebih banyak

Peta Pikiran

Video Tanya Jawab

  • Per què és important l'anonimat a les xarxes socials?

    L'anonimat permet a les persones expressar-se sense por de represàlies, explorar idees i connectar amb altres sense ser jutjades.

  • Quins són els models de amenaça que es mencionen?

    Els models de amenaça es divideixen en tres nivells: proteccions bàsiques, avançades i extremes, depenent del risc que corre l'usuari.

  • Quines són algunes tècniques per mantenir l'anonimat?

    Algunes tècniques inclouen l'ús d'adreces de correu electrònic alternatives, números de telèfon VoIP, i la creació de perfils que no estiguin vinculats a la identitat real.

  • Què fer si estic en una situació de risc extrem?

    Si estàs en una situació de risc extrem, és recomanable buscar ajuda d'experts en seguretat i privadesa.

  • Com puc protegir la meva privadesa a les xarxes socials?

    Utilitza noms d'usuari únics, evita compartir informació personal, i considera l'ús de navegadors enfocats en la privadesa.

  • Quins són els riscos de no protegir la meva identitat en línia?

    Els riscos inclouen l'assetjament, la pèrdua de reputació, i la possibilitat de ser identificat per governs o entitats hostils.

  • Què és el model de amenaça de nivell 1?

    El model de amenaça de nivell 1 es refereix a persones amb un baix nivell de risc que busquen proteccions bàsiques per mantenir la seva privadesa.

  • Quines plataformes són més flexibles amb comptes pseudònims?

    Plataformes com X (anteriorment Twitter) són més acceptants amb comptes pseudònims en comparació amb Facebook.

  • Per què és important rotar identitats?

    Rotar identitats ajuda a reduir l'exposició i el risc de ser identificat a mesura que es recopila més informació al llarg del temps.

  • Què és la privadesa en línia?

    La privadesa en línia és la capacitat de controlar la informació personal que es comparteix a Internet i de mantenir l'anonimat.

Lihat lebih banyak ringkasan video

Dapatkan akses instan ke ringkasan video YouTube gratis yang didukung oleh AI!
Teks
en
Gulir Otomatis:
  • 00:00:00
    You know what I hear a lot these days?
  • 00:00:02
    Everyone on social media should have to use their real name.
  • 00:00:05
    Anonymity should be banned.
  • 00:00:07
    This is a bad idea.
  • 00:00:08
    Usually spoken by people who assume that the world treats
  • 00:00:12
    everyone like it treats them.
  • 00:00:14
    Anyone who's ever had to say something unpopular knows how important privacy is.
  • 00:00:20
    It gives us the ability to speak, explore, and connect
  • 00:00:24
    without fear of punishment from those who'd prefer we stay silent.
  • 00:00:28
    Despite what some people seem to think, anonymity isn't something
  • 00:00:33
    that should be banned.
  • 00:00:34
    It's something that should be protected.
  • 00:00:36
    Wanting it doesn't make you dangerous.
  • 00:00:39
    It makes you normal.
  • 00:00:40
    Let me give you an example.
  • 00:00:42
    The other week I had dinner
  • 00:00:43
    with a group of wonderful people, well known economists, bestselling
  • 00:00:47
    authors, people that I'd only ever known in a professional context.
  • 00:00:52
    But that night, I saw a completely different side of them.
  • 00:00:55
    Wicked humor, unexpected opinions.
  • 00:00:58
    The kind of off the cuff brilliance that never makes it into a dense
  • 00:01:02
    economics book.
  • 00:01:03
    But for some reason, they never really understood my passion for privacy.
  • 00:01:08
    Anyway, the next day I saw one of them again and I said to her,
  • 00:01:12
    “You're a riot.
  • 00:01:13
    I had no idea that you were that funny”.
  • 00:01:15
    And she told me that she'd long been thinking of starting a separate X account.
  • 00:01:19
    She said that she wanted to tell jokes and say things
  • 00:01:22
    that didn't fit the persona people expect from her professionally,
  • 00:01:26
    so she didn't want the new account linked to her real name.
  • 00:01:30
    And just like that, she got it.
  • 00:01:32
    She understood the value of privacy because privacy isn't about hiding.
  • 00:01:38
    It's about freedom.
  • 00:01:39
    The freedom to be your full self, to explore different sides
  • 00:01:43
    of your personality, to be more than one thing at once.
  • 00:01:46
    That's something that we can all relate to.
  • 00:01:49
    You might have multiple interests or roles in life.
  • 00:01:52
    Professional, personal, creative and want to maintain separate identities for each.
  • 00:01:58
    Or maybe you want the ability to grow and change your mind
  • 00:02:01
    without the ghosts of old online interactions following you forever.
  • 00:02:06
    So I just got a call from the academy, and,
  • 00:02:08
    that call basically said, Kevin, apologize for your tweets of old.
  • 00:02:11
    I've addressed it.
  • 00:02:13
    I've spoken on it.
  • 00:02:14
    I've said who I am now versus who I was then.
  • 00:02:17
    I've done it, and I'm in a completely different space in my life.
  • 00:02:20
    But privacy is also about safety.
  • 00:02:23
    Maybe you want to avoid trolls or harassment and you'd rather
  • 00:02:26
    not have your address or your kid's faces posted by some stranger on the internet.
  • 00:02:32
    Maybe you want to speak honestly while protecting yourself from online mobs
  • 00:02:36
    that might target your job, your family, or your personal reputation.
  • 00:02:40
    Maybe you don't want everything you say online to be permanently
  • 00:02:44
    linked to your real name.
  • 00:02:45
    In case in the future social norms change and you're no longer in the mainstream.
  • 00:02:50
    But the stakes can be even higher.
  • 00:02:52
    You might be an activist, a protester, or someone who risks persecution
  • 00:02:57
    for your beliefs.
  • 00:02:59
    And in those situations, social media becomes a battleground.
  • 00:03:03
    It's where people rally, support and boost morale in the face of repression.
  • 00:03:08
    But if speaking your mind
  • 00:03:09
    means risking arrest, how are people supposed to fight back?
  • 00:03:13
    That's why privacy matters.
  • 00:03:15
    For some people, it's for comfort.
  • 00:03:17
    For others, it's for resistance.
  • 00:03:19
    Whatever your reason, privacy is power.
  • 00:03:22
    And we should be fighting to protect it.
  • 00:03:24
    So how do you actually stay anonymous on social media?
  • 00:03:28
    Well, in this video, we'll walk you through how to create
  • 00:03:31
    and use social platforms in a way that protects your identity.
  • 00:03:34
    But there are countless subtle ways that your identity can be compromised,
  • 00:03:39
    even when you think you've covered your tracks.
  • 00:03:41
    Some people think that if they want privacy,
  • 00:03:44
    they need to disappear off the grid.
  • 00:03:46
    But that's just not true.
  • 00:03:48
    You just need to start with understanding your threat model.
  • 00:03:51
    Who are you trying to protect yourself from?
  • 00:03:54
    What are the stakes?
  • 00:03:55
    Your approach should match your situation and we’ll break it down level by level.
  • 00:04:00
    Let's go through some examples of different threat models.
  • 00:04:03
    For example,
  • 00:04:04
    hiding your opinions from your boss will require very different precautions
  • 00:04:08
    than hiding from a hostile government that wants to target
  • 00:04:11
    you for your political beliefs.
  • 00:04:13
    Everyone's situation is different, but to keep things manageable,
  • 00:04:16
    we're going to break threat models into three levels.
  • 00:04:19
    That way, you can figure out what kind of protections make sense for you.
  • 00:04:23
    Level one basic protections are for people with a low stakes threat model.
  • 00:04:27
    Level two advanced protections are for people with a higher threat model.
  • 00:04:31
    Level three extreme protections are for those living under a hostile regime,
  • 00:04:36
    where political dissent is dangerous and the consequences of being identified
  • 00:04:41
    online are severe.
  • 00:04:42
    We won't be covering this level in this video
  • 00:04:45
    not because it isn't important, but because the stakes are too high
  • 00:04:48
    for shortcuts, or the kind of advice you get from generalized privacy videos.
  • 00:04:53
    If your life or freedom could be at risk, please seek help from experts
  • 00:04:58
    who specialize in operating anonymously under repressive conditions.
  • 00:05:02
    Some organizations that might be able to help
  • 00:05:04
    include The Citizen Lab, Freedom of the Press Foundation, and EFF.
  • 00:05:08
    So we'll post links to their sites in the video description.
  • 00:05:11
    Now, most people watching this video will probably fall into the level
  • 00:05:14
    one category, and anything beyond that might feel overwhelming.
  • 00:05:18
    So if that's you, feel free to skip ahead to the end of the video
  • 00:05:22
    once that section is done.
  • 00:05:24
    I want to quickly mention that your approach
  • 00:05:26
    will also depend on which social media platform you're using.
  • 00:05:30
    Take Facebook for example.
  • 00:05:31
    It aggressively pushes users to use real names
  • 00:05:35
    and actively works to de anonymize its user base.
  • 00:05:38
    You can only change your birthday a few times before they lock it
  • 00:05:41
    permanently.
  • 00:05:42
    They've been caught doing countless sneaky and wildly unethical things
  • 00:05:46
    to collect data, like secretly monitoring the browsing activity
  • 00:05:50
    of those who have the app installed.
  • 00:05:52
    Other platforms are more flexible when it comes to pseudonymous accounts.
  • 00:05:56
    X is one example.
  • 00:05:58
    It still collects a ton of data about you, but it's a space where
  • 00:06:02
    satire, personas, and anonymous commentary are common and widely accepted.
  • 00:06:07
    We're not going to cover every platform because there are too many,
  • 00:06:11
    and how they surveil users evolves constantly.
  • 00:06:14
    Instead, we'll focus on general privacy techniques and apply them broadly to X.
  • 00:06:19
    But the idea is that you'll walk away with strategies that you can use anywhere.
  • 00:06:24
    Let's start with level one basic protections
  • 00:06:27
    for creating a pseudonymous social media account.
  • 00:06:29
    The goal here is to keep a clean separation between
  • 00:06:32
    your online persona and your real world identity.
  • 00:06:36
    You're not being targeted, and you don't expect anyone
  • 00:06:38
    to spend serious resources trying to find you.
  • 00:06:41
    You're mostly hiding from the general public,
  • 00:06:44
    and you want to make sure that even low level platform employees
  • 00:06:47
    can't casually connect your posts to your real name.
  • 00:06:51
    And if your credentials ever leak in a data breach,
  • 00:06:54
    you want enough precautions in place to prevent easy linkages.
  • 00:06:57
    Let's start with account set up.
  • 00:06:59
    For your profile name avoid birthdays, locations, nicknames,
  • 00:07:03
    or anything with an obvious connection to your real world identity.
  • 00:07:07
    You'll also want to make this unique and not something
  • 00:07:10
    that you've used on other platforms or a derivative thereof.
  • 00:07:13
    For email, don't use your regular email address.
  • 00:07:16
    Instead, generate an alias using a service like Simple Login, or use
  • 00:07:21
    a custom domain that you own that isn't publicly linked to your real identity.
  • 00:07:26
    This email should be used for this account only and never reused elsewhere.
  • 00:07:30
    Why bother with protecting your email when this isn't publicly visible
  • 00:07:34
    on your profile?
  • 00:07:35
    Well, data breaches are extremely common.
  • 00:07:38
    X itself has past breaches that exposed users
  • 00:07:41
    sign in emails, and it's bound to happen again.
  • 00:07:44
    Assume that your login credentials will be leaked
  • 00:07:47
    and choose an email address that won't lead back to you.
  • 00:07:50
    Similarly, don't use your regular cell number.
  • 00:07:53
    Instead, generate a new number through a VoIP service
  • 00:07:56
    like MySudo or Cloaked and use it exclusively for this account.
  • 00:08:00
    Don't link it to anything else.
  • 00:08:02
    Otherwise, if that number ever ends up in a data breach,
  • 00:08:06
    it would be trivially easy to trace the account back to you.
  • 00:08:09
    Next, let's talk about behavior.
  • 00:08:12
    First, don't follow your real account or people closely
  • 00:08:15
    tied to you like your best friend, sibling, or coworker.
  • 00:08:19
    When you write tweets or fill out your profile,
  • 00:08:22
    avoid mentioning real world hobbies or your profession.
  • 00:08:25
    Specific locations, or distinctive personal details.
  • 00:08:29
    And be careful with the pictures you post.
  • 00:08:31
    Don't reuse photos from other accounts, because reverse image searches
  • 00:08:36
    can link them.
  • 00:08:37
    Consider AI generated or royalty free images.
  • 00:08:40
    These steps will give you
  • 00:08:41
    a solid foundation of protection against low level doxing threats.
  • 00:08:45
    If that's all you need, feel free to skip ahead to the conclusion
  • 00:08:49
    for final thoughts.
  • 00:08:50
    Otherwise, let's move on to level two advanced protections.
  • 00:08:54
    Before we dive in, I want to be clear this isn't just a step up from level one.
  • 00:08:59
    This is a big leap.
  • 00:09:01
    Most people will fall comfortably into the level one category,
  • 00:09:05
    but I wanted to include this section to help you understand
  • 00:09:09
    the more advanced ways that platforms can de anonymize users.
  • 00:09:12
    So this section is for the curious and for those with a higher threat model.
  • 00:09:17
    And it requires more sophisticated compartmentalization.
  • 00:09:21
    If you're disciplined, you can reach a point where
  • 00:09:23
    even the platform itself can't confidently link your account to your real identity
  • 00:09:29
    either through your IP, device or behavioral patterns.
  • 00:09:33
    And to be clear, this level is not for people in life
  • 00:09:36
    threatening situations or under hostile regimes.
  • 00:09:39
    It's designed for lower risk scenarios where you want to increase your privacy
  • 00:09:44
    but don't need to achieve perfect anonymity.
  • 00:09:47
    These steps are for people who want to avoid profiling, not evade subpoenas.
  • 00:09:52
    It's also not an exhaustive checklist or a guarantee,
  • 00:09:55
    but it is a solid reference point.
  • 00:09:57
    If your goal is to get serious about how pseudonyms can be broken
  • 00:10:01
    and how to prevent that from happening to you.
  • 00:10:03
    So let's get into it.
  • 00:10:04
    You'll need to start by doing everything we covered in level one.
  • 00:10:08
    Then let's add a stronger compartmentalization
  • 00:10:11
    starting with account setup.
  • 00:10:12
    If you are subscribing to something like X premium, don't use your real bank card.
  • 00:10:17
    A masked credit card service like privacy.com lets you generate burner
  • 00:10:21
    card numbers tied to fake names and billing addresses,
  • 00:10:25
    adding a layer of separation
  • 00:10:26
    between your pseudonymous account and your legal identity.
  • 00:10:29
    If your threat model is more serious, you might want to go even further,
  • 00:10:33
    buying a prepaid card with cash or a privacy focused cryptocurrency.
  • 00:10:37
    As for the email and phone number associated with your account, you already
  • 00:10:41
    set up solid protections in level one by using an email alias and a VoIP number.
  • 00:10:46
    But if you want to go further, you can ensure that those accounts
  • 00:10:50
    themselves were created in a clean environment
  • 00:10:53
    without any links to your real identity.
  • 00:10:56
    Again, this isn't something that most people need to worry about.
  • 00:10:59
    It's a step reserved for those facing more targeted threats.
  • 00:11:02
    Next, let's talk about metadata hidden inside your photos and videos you upload.
  • 00:11:07
    One important protection is stripping Exif data from images
  • 00:11:11
    and removing embedded metadata from videos before posting them.
  • 00:11:15
    Exif data, for example, can include the make and model of your device,
  • 00:11:19
    the time the photo was taken, and in many cases, your exact geolocation.
  • 00:11:24
    We go into more detail in our video on metadata scrubbing, but in short,
  • 00:11:28
    there are many tools that let you remove metadata from media before uploading.
  • 00:11:33
    One neat trick that I like is to use Signal to do this.
  • 00:11:36
    If you send a photo to yourself via Signal,
  • 00:11:39
    Signal will automatically strip out the metadata for you.
  • 00:11:43
    Now let's talk about device and browser hygiene.
  • 00:11:45
    This is a longer section and it could go on forever.
  • 00:11:49
    But let's talk basic principles.
  • 00:11:51
    First, avoid installing social media apps on your phone.
  • 00:11:55
    They usually have really invasive permissions, can
  • 00:11:58
    access your contacts, device ID, installed apps,
  • 00:12:02
    and run background processes that silently collect data.
  • 00:12:06
    Many include third party SDK or code
  • 00:12:09
    that extracts telemetry and behavioral information.
  • 00:12:12
    Instead, access your social media accounts through a browser
  • 00:12:16
    and preferably a privacy focused one.
  • 00:12:19
    Such browsers sandbox your activity, restrict permissions,
  • 00:12:23
    and limit how much data the platform can harvest from your device.
  • 00:12:26
    You can see how well browsers compare
  • 00:12:29
    when it comes to privacy by visiting privacytests.org.
  • 00:12:32
    Now let's talk about fingerprinting.
  • 00:12:34
    Platforms and third parties can track you using things like your screen resolution,
  • 00:12:40
    time zone, font list, and system configuration.
  • 00:12:44
    Privacy focused browsers like Brave help limit this fingerprinting by blocking
  • 00:12:49
    trackers, spoofing certain attributes, and reducing the uniqueness of your setup.
  • 00:12:54
    You can even go further by disabling JavaScript when possible,
  • 00:12:58
    and also by minimizing the number of browser extensions
  • 00:13:01
    you use, which also acts as a unique fingerprint.
  • 00:13:04
    Even if you use a privacy focused browser, you should still make a habit
  • 00:13:08
    of clearing out your cookies, cache and local storage.
  • 00:13:12
    These can persist across sessions and allow platforms to track you
  • 00:13:16
    or even link your pseudonymous account to your real identity.
  • 00:13:20
    Clearing this stuff regularly helps keep your identities compartmentalized.
  • 00:13:24
    For even more separation, consider using a different browser for each identity.
  • 00:13:29
    For example, Brave for identity A and Mullvad browser for identity B.
  • 00:13:35
    This keeps cookies history and local storage isolated,
  • 00:13:39
    and generates different browser fingerprints that are harder to correlate.
  • 00:13:43
    Another option is to use separate user profiles on your computer,
  • 00:13:47
    or even a separate operating system for different activities.
  • 00:13:50
    This could mean running a virtual machine or using privacy focused OSes
  • 00:13:55
    like Tails or Qubes to further isolate your identities
  • 00:13:58
    and to go even more extreme.
  • 00:14:00
    You can consider
  • 00:14:01
    using an entirely separate device for your pseudonymous activities.
  • 00:14:06
    It could be a computer dedicated solely to social media,
  • 00:14:09
    and one that you never use to log into your real account.
  • 00:14:13
    To level up further, you might purchase the device anonymously using cash.
  • 00:14:17
    Avoid stores with surveillance cameras
  • 00:14:19
    and physically disable or remove its microphones and cameras.
  • 00:14:23
    Again, these last steps of the people with very elevated threat models.
  • 00:14:27
    Most users won't need to go that far, but it's important
  • 00:14:31
    to understand that each of these is a potential link
  • 00:14:34
    that could be used to de anonymize you, if someone is highly motivated.
  • 00:14:38
    Next, let's talk about network privacy.
  • 00:14:41
    Start by using a reputable VPN.
  • 00:14:44
    Many VPNs are shady data collection fronts, so be careful.
  • 00:14:49
    I like Proton and Mullvad VPN.
  • 00:14:51
    A good VPN hides your real IP address from the platform and encrypts your traffic.
  • 00:14:56
    If you want to go further, consider paying for your VPN anonymously.
  • 00:15:00
    Mullvad, for example, accepts cash in the mail.
  • 00:15:03
    This removes your financial identity from the equation.
  • 00:15:06
    If you're in a higher risk category, you might consider avoiding networks
  • 00:15:10
    that are tied to your real world identity, like your home, work or school Wi-Fi.
  • 00:15:15
    Instead, you can connect to social media over public networks
  • 00:15:19
    in locations far from places associated with you.
  • 00:15:22
    This prevents your real IP from becoming part of your metadata footprint.
  • 00:15:26
    If your VPN ever disconnects or leaks.
  • 00:15:29
    Also be aware that your device can leak information via Wi-Fi and Bluetooth
  • 00:15:34
    signals, such as probe requests and background broadcasts.
  • 00:15:38
    These can reveal your location, history, and movement patterns over time by showing
  • 00:15:42
    where and when your device has appeared near certain networks or other devices.
  • 00:15:47
    For example, if you carry both your real phone and your pseudonymous
  • 00:15:52
    device to the same places, they can be passively correlated.
  • 00:15:56
    Linking the two identities together.
  • 00:15:58
    So be mindful about where you bring your pseudonymous device.
  • 00:16:02
    If your threat model is higher, consider adding Tor as an additional layer.
  • 00:16:06
    It routes your traffic through multiple encrypted relays,
  • 00:16:10
    masking both your IP address and the destination.
  • 00:16:13
    It's not foolproof against targeted surveillance,
  • 00:16:15
    but when used carefully, it can be a powerful tool for increasing anonymity.
  • 00:16:20
    Then there are your patterns of behavior to be mindful of.
  • 00:16:23
    For example, if account A and account
  • 00:16:26
    B, always log in at around the same time, or use similar phrasing,
  • 00:16:30
    or interact with the same niche communities, platforms can correlate them.
  • 00:16:35
    Even if you're using different devices or VPNs.
  • 00:16:38
    To reduce that risk, try to vary your posting habits and maintain
  • 00:16:42
    clear distinctions in your tone, language, and subject matter.
  • 00:16:46
    Avoid engaging with people or topics tied to your real world identity,
  • 00:16:50
    and steer clear of references to events, locations, or communities
  • 00:16:54
    that could reveal who or where you are.
  • 00:16:56
    You should also be careful with interactions outside the platform itself.
  • 00:17:01
    Promotional emails from social media services often contain
  • 00:17:05
    tracking pixels or UTM codes, so don't click on them.
  • 00:17:09
    In general, avoid unnecessary engagement with the platform,
  • 00:17:12
    and when you do interact, do it strategically and in character.
  • 00:17:17
    One important rule, especially if your threat model is higher,
  • 00:17:20
    is to never discuss
  • 00:17:22
    your pseudonymous activity with people that you know in real life.
  • 00:17:25
    Even trusted friends can unintentionally expose you.
  • 00:17:29
    And once that connection is made, it's hard to walk back.
  • 00:17:32
    And finally, keep in mind that legal and jurisdictional risks vary.
  • 00:17:37
    Some keywords, search queries, or behaviors may trigger
  • 00:17:41
    automated surveillance or legal scrutiny, so make sure that you understand
  • 00:17:45
    what kinds of red flags might apply to your region.
  • 00:17:49
    One final area of advanced protections, but I want to mention,
  • 00:17:52
    especially if you're operating at a higher risk level,
  • 00:17:55
    is rotating your identity and periodically retiring old accounts.
  • 00:18:00
    The longer a pseudonymous identity lives, the more data
  • 00:18:04
    it accumulates and the more likely you are to slip up.
  • 00:18:07
    It's good practice to rotate identities regularly.
  • 00:18:10
    You might choose to periodically burn your account and start fresh.
  • 00:18:14
    Create a new email, VoIP number, device or browser profile
  • 00:18:18
    that even within an existing account, you can reduce your footprint
  • 00:18:22
    by deleting content that you no longer need.
  • 00:18:25
    And while this won't erase
  • 00:18:26
    the data from the platform's back end, it will remove it from public view
  • 00:18:31
    and reduce exposure to data scrapers or automated profiling tools.
  • 00:18:35
    Let's briefly reiterate what we said earlier about level three extreme
  • 00:18:39
    protections.
  • 00:18:40
    If you live under a hostile regime where expressing
  • 00:18:43
    dissenting opinions online carries severe consequences.
  • 00:18:48
    Do not rely on generalized privacy guides.
  • 00:18:51
    Achieving true anonymity against a powerful adversary is extraordinarily
  • 00:18:55
    difficult.
  • 00:18:56
    Governments have massive resources, including surveillance, infrastructure,
  • 00:19:00
    legal coercion, and advanced forensic tools.
  • 00:19:04
    One small mistake can unravel everything.
  • 00:19:06
    This guide does not offer operational security for high risk environments.
  • 00:19:11
    That kind of protection requires meticulous execution
  • 00:19:14
    of everything we've discussed here, plus much more.
  • 00:19:17
    If your life or freedom are on the line, seek help
  • 00:19:20
    that is specific to your situation.
  • 00:19:22
    Now for the good news.
  • 00:19:24
    Most people's threat
  • 00:19:25
    model doesn't involve being individually targeted by a government.
  • 00:19:29
    Why does that matter?
  • 00:19:30
    Well, because targeting a specific person takes time, effort, and resources.
  • 00:19:35
    Instead, governments overwhelmingly rely on mass surveillance systems
  • 00:19:39
    fueled by data that you voluntarily expose.
  • 00:19:43
    And that's why this is good news, because most of that exposure is preventable.
  • 00:19:48
    This is why evaluating your threat model really matters,
  • 00:19:51
    because in many cases, you can make huge privacy gains
  • 00:19:55
    just by making better choices without needing to overhaul your entire life.
  • 00:20:00
    You don't need extreme measures to protect yourself.
  • 00:20:03
    By using tools like VoIP numbers, email aliases, and privacy focused browsers,
  • 00:20:08
    you can drastically reduce how much of your life is available
  • 00:20:12
    for collection, and by making small changes to your behavior
  • 00:20:16
    like those mentioned in level one, you can make it much harder
  • 00:20:19
    for surveillance systems to track, profile or link you across platforms.
  • 00:20:24
    Achieving basic pseudonymity online is much easier than it sounds.
  • 00:20:29
    Privacy isn't about hiding.
  • 00:20:31
    It's about having the freedom to express yourself, to explore
  • 00:20:34
    ideas, and connect without fear of blowback.
  • 00:20:37
    And that friend I mentioned, the start?
  • 00:20:39
    The one who wanted to tell jokes and share her unfiltered thoughts
  • 00:20:43
    without reflecting on her professional identity?
  • 00:20:46
    Well, she's just like all of us.
  • 00:20:48
    Just a regular person who wants a little space to be herself.
  • 00:20:52
    Privacy is a completely normal thing to want,
  • 00:20:56
    and you absolutely have the power to reclaim it.
  • 00:20:59
    Start from wherever you are.
  • 00:21:01
    Every step that you take makes a difference.
  • 00:21:03
    The Ludlow Institute is a nonprofit dedicated to advancing
  • 00:21:06
    freedom through technology.
  • 00:21:08
    If you'd like to support this mission, head to ludlowinstitute.org/donate.
  • 00:21:13
    We also have a shop where you can purchase
  • 00:21:14
    cool things that also support our mission.
  • 00:21:16
    Do you have a pseudonymous social media account?
  • 00:21:18
    Post it in the comments below.
  • 00:21:20
    No, don't! It was a test.
  • 00:21:22
    Don't ever do that!
Tags
  • anonimat
  • privadesa
  • xarxes socials
  • seguretat
  • llibertat d'expressió
  • model de amenaça
  • pseudònim
  • proteccions
  • dades personals
  • identitat