00:00:00
You know what I hear a lot these days?
00:00:02
Everyone on social media
should have to use their real name.
00:00:05
Anonymity should be banned.
00:00:07
This is a bad idea.
00:00:08
Usually spoken by people
who assume that the world treats
00:00:12
everyone like it treats them.
00:00:14
Anyone who's ever had to say something
unpopular knows how important privacy is.
00:00:20
It gives us the ability
to speak, explore, and connect
00:00:24
without fear of punishment
from those who'd prefer we stay silent.
00:00:28
Despite what some people seem to think,
anonymity isn't something
00:00:33
that should be banned.
00:00:34
It's something that should be protected.
00:00:36
Wanting it doesn't make you dangerous.
00:00:39
It makes you normal.
00:00:40
Let me give you an example.
00:00:42
The other week I had dinner
00:00:43
with a group of wonderful people,
well known economists, bestselling
00:00:47
authors, people that I'd only ever known
in a professional context.
00:00:52
But that night,
I saw a completely different side of them.
00:00:55
Wicked humor, unexpected opinions.
00:00:58
The kind of off the cuff brilliance
that never makes it into a dense
00:01:02
economics book.
00:01:03
But for some reason, they never really
understood my passion for privacy.
00:01:08
Anyway, the next day
I saw one of them again and I said to her,
00:01:12
“You're a riot.
00:01:13
I had no idea that you were that funny”.
00:01:15
And she told me that she'd long been
thinking of starting a separate X account.
00:01:19
She said that she wanted to tell jokes
and say things
00:01:22
that didn't fit the persona people expect
from her professionally,
00:01:26
so she didn't want the new account
linked to her real name.
00:01:30
And just like that, she got it.
00:01:32
She understood the value of privacy
because privacy isn't about hiding.
00:01:38
It's about freedom.
00:01:39
The freedom to be your full self,
to explore different sides
00:01:43
of your personality,
to be more than one thing at once.
00:01:46
That's
something that we can all relate to.
00:01:49
You might have multiple interests
or roles in life.
00:01:52
Professional, personal, creative and want
to maintain separate identities for each.
00:01:58
Or maybe you want the ability to grow
and change your mind
00:02:01
without the ghosts of old online
interactions following you forever.
00:02:06
So I just got a call
from the academy, and,
00:02:08
that call basically said, Kevin, apologize
for your tweets of old.
00:02:11
I've addressed it.
00:02:13
I've spoken on it.
00:02:14
I've said who I am now versus who I was
then.
00:02:17
I've done it, and I'm in a completely
different space in my life.
00:02:20
But privacy is also about safety.
00:02:23
Maybe you want to avoid trolls
or harassment and you'd rather
00:02:26
not have your address or your kid's faces
posted by some stranger on the internet.
00:02:32
Maybe you want to speak honestly while
protecting yourself from online mobs
00:02:36
that might target your job, your family,
or your personal reputation.
00:02:40
Maybe you don't want everything
you say online to be permanently
00:02:44
linked to your real name.
00:02:45
In case in the future social norms change
and you're no longer in the mainstream.
00:02:50
But the stakes can be even higher.
00:02:52
You might be an activist, a protester,
or someone who risks persecution
00:02:57
for your beliefs.
00:02:59
And in those situations,
social media becomes a battleground.
00:03:03
It's where people rally, support and boost
morale in the face of repression.
00:03:08
But if speaking your mind
00:03:09
means risking arrest,
how are people supposed to fight back?
00:03:13
That's why privacy matters.
00:03:15
For some people, it's for comfort.
00:03:17
For others, it's for resistance.
00:03:19
Whatever your reason, privacy is power.
00:03:22
And we should be fighting to protect it.
00:03:24
So how do you actually stay anonymous
on social media?
00:03:28
Well, in this video,
we'll walk you through how to create
00:03:31
and use social platforms
in a way that protects your identity.
00:03:34
But there are countless subtle ways
that your identity can be compromised,
00:03:39
even when you think
you've covered your tracks.
00:03:41
Some people think that
if they want privacy,
00:03:44
they need to disappear off the grid.
00:03:46
But that's just not true.
00:03:48
You just need to start with understanding
your threat model.
00:03:51
Who are you trying to protect yourself
from?
00:03:54
What are the stakes?
00:03:55
Your approach should match your situation
and we’ll break it down level by level.
00:04:00
Let's go through
some examples of different threat models.
00:04:03
For example,
00:04:04
hiding your opinions from your boss
will require very different precautions
00:04:08
than hiding from a hostile government
that wants to target
00:04:11
you for your political beliefs.
00:04:13
Everyone's situation is different,
but to keep things manageable,
00:04:16
we're going to break threat models
into three levels.
00:04:19
That way, you can figure out what kind of
protections make sense for you.
00:04:23
Level one basic protections are for people
with a low stakes threat model.
00:04:27
Level two advanced protections
are for people with a higher threat model.
00:04:31
Level three extreme protections are
for those living under a hostile regime,
00:04:36
where political dissent is dangerous
and the consequences of being identified
00:04:41
online are severe.
00:04:42
We won't be covering this level
in this video
00:04:45
not because it isn't important,
but because the stakes are too high
00:04:48
for shortcuts, or the kind of advice
you get from generalized privacy videos.
00:04:53
If your life or freedom could be at risk,
please seek help from experts
00:04:58
who specialize in operating anonymously
under repressive conditions.
00:05:02
Some organizations
that might be able to help
00:05:04
include The Citizen Lab,
Freedom of the Press Foundation, and EFF.
00:05:08
So we'll post links to their sites
in the video description.
00:05:11
Now, most people watching this video
will probably fall into the level
00:05:14
one category, and anything beyond
that might feel overwhelming.
00:05:18
So if that's you, feel free to skip ahead
to the end of the video
00:05:22
once that section is done.
00:05:24
I want to quickly mention
that your approach
00:05:26
will also depend on
which social media platform you're using.
00:05:30
Take Facebook for example.
00:05:31
It aggressively pushes users
to use real names
00:05:35
and actively works to de anonymize
its user base.
00:05:38
You can only change your birthday
a few times before they lock it
00:05:41
permanently.
00:05:42
They've been caught doing countless
sneaky and wildly unethical things
00:05:46
to collect data, like secretly
monitoring the browsing activity
00:05:50
of those who have the app installed.
00:05:52
Other platforms are more flexible
when it comes to pseudonymous accounts.
00:05:56
X is one example.
00:05:58
It still collects a ton of data about you,
but it's a space where
00:06:02
satire, personas, and anonymous commentary
are common and widely accepted.
00:06:07
We're not going to cover every platform
because there are too many,
00:06:11
and how they surveil users evolves
constantly.
00:06:14
Instead, we'll focus on general privacy
techniques and apply them broadly to X.
00:06:19
But the idea is that you'll walk away
with strategies that you can use anywhere.
00:06:24
Let's start with level
one basic protections
00:06:27
for creating a pseudonymous
social media account.
00:06:29
The goal here
is to keep a clean separation between
00:06:32
your online persona
and your real world identity.
00:06:36
You're not being targeted,
and you don't expect anyone
00:06:38
to spend serious resources
trying to find you.
00:06:41
You're mostly
hiding from the general public,
00:06:44
and you want to make sure
that even low level platform employees
00:06:47
can't casually connect
your posts to your real name.
00:06:51
And if your credentials
ever leak in a data breach,
00:06:54
you want enough precautions in place
to prevent easy linkages.
00:06:57
Let's start with account set up.
00:06:59
For your profile name
avoid birthdays, locations, nicknames,
00:07:03
or anything with an obvious connection
to your real world identity.
00:07:07
You'll also want to make this unique
and not something
00:07:10
that you've used on other platforms
or a derivative thereof.
00:07:13
For email,
don't use your regular email address.
00:07:16
Instead, generate an alias using a service
like Simple Login, or use
00:07:21
a custom domain that you own that isn't
publicly linked to your real identity.
00:07:26
This email should be used for this account
only and never reused elsewhere.
00:07:30
Why bother with protecting your email
when this isn't publicly visible
00:07:34
on your profile?
00:07:35
Well, data breaches are extremely common.
00:07:38
X itself has past breaches
that exposed users
00:07:41
sign in emails,
and it's bound to happen again.
00:07:44
Assume that your login credentials
will be leaked
00:07:47
and choose an email address
that won't lead back to you.
00:07:50
Similarly,
don't use your regular cell number.
00:07:53
Instead, generate a new number
through a VoIP service
00:07:56
like MySudo or Cloaked and use it
exclusively for this account.
00:08:00
Don't link it to anything else.
00:08:02
Otherwise, if that number
ever ends up in a data breach,
00:08:06
it would be trivially easy
to trace the account back to you.
00:08:09
Next, let's talk about behavior.
00:08:12
First, don't follow your real account
or people closely
00:08:15
tied to you like your best friend,
sibling, or coworker.
00:08:19
When you write tweets
or fill out your profile,
00:08:22
avoid mentioning real world hobbies
or your profession.
00:08:25
Specific locations,
or distinctive personal details.
00:08:29
And be careful with the pictures you post.
00:08:31
Don't reuse photos from other accounts,
because reverse image searches
00:08:36
can link them.
00:08:37
Consider
AI generated or royalty free images.
00:08:40
These steps will give you
00:08:41
a solid foundation of protection
against low level doxing threats.
00:08:45
If that's all you need,
feel free to skip ahead to the conclusion
00:08:49
for final thoughts.
00:08:50
Otherwise, let's move on to level
two advanced protections.
00:08:54
Before we dive in, I want to be clear
this isn't just a step up from level one.
00:08:59
This is a big leap.
00:09:01
Most people will fall comfortably
into the level one category,
00:09:05
but I wanted to include this section
to help you understand
00:09:09
the more advanced ways
that platforms can de anonymize users.
00:09:12
So this section is for the curious
and for those with a higher threat model.
00:09:17
And it requires
more sophisticated compartmentalization.
00:09:21
If you're disciplined,
you can reach a point where
00:09:23
even the platform itself can't confidently
link your account to your real identity
00:09:29
either through your IP, device
or behavioral patterns.
00:09:33
And to be clear,
this level is not for people in life
00:09:36
threatening situations
or under hostile regimes.
00:09:39
It's designed for lower risk scenarios
where you want to increase your privacy
00:09:44
but don't need to achieve
perfect anonymity.
00:09:47
These steps are for people who want
to avoid profiling, not evade subpoenas.
00:09:52
It's also not an exhaustive checklist
or a guarantee,
00:09:55
but it is a solid reference point.
00:09:57
If your goal is to get serious about
how pseudonyms can be broken
00:10:01
and how to prevent that
from happening to you.
00:10:03
So let's get into it.
00:10:04
You'll need to start by doing
everything we covered in level one.
00:10:08
Then let's add a stronger
compartmentalization
00:10:11
starting with account setup.
00:10:12
If you are subscribing to something like X
premium, don't use your real bank card.
00:10:17
A masked credit card service
like privacy.com lets you generate burner
00:10:21
card numbers tied to fake names
and billing addresses,
00:10:25
adding a layer of separation
00:10:26
between your pseudonymous account
and your legal identity.
00:10:29
If your threat model is more serious,
you might want to go even further,
00:10:33
buying a prepaid card with cash
or a privacy focused cryptocurrency.
00:10:37
As for the email and phone number
associated with your account, you already
00:10:41
set up solid protections in level one
by using an email alias and a VoIP number.
00:10:46
But if you want to go further,
you can ensure that those accounts
00:10:50
themselves
were created in a clean environment
00:10:53
without any links to your real identity.
00:10:56
Again, this isn't something
that most people need to worry about.
00:10:59
It's a step reserved
for those facing more targeted threats.
00:11:02
Next, let's talk about metadata hidden
inside your photos and videos you upload.
00:11:07
One important protection is stripping Exif
data from images
00:11:11
and removing embedded metadata from videos
before posting them.
00:11:15
Exif data, for example, can include
the make and model of your device,
00:11:19
the time the photo was taken,
and in many cases, your exact geolocation.
00:11:24
We go into more detail in our video
on metadata scrubbing, but in short,
00:11:28
there are many tools that let you remove
metadata from media before uploading.
00:11:33
One neat trick
that I like is to use Signal to do this.
00:11:36
If you send a photo to yourself
via Signal,
00:11:39
Signal will automatically strip
out the metadata for you.
00:11:43
Now let's talk about device and browser
hygiene.
00:11:45
This is a longer section
and it could go on forever.
00:11:49
But let's talk basic principles.
00:11:51
First, avoid installing social media
apps on your phone.
00:11:55
They usually have really invasive
permissions, can
00:11:58
access your contacts, device ID, installed
apps,
00:12:02
and run background processes
that silently collect data.
00:12:06
Many include third party SDK or code
00:12:09
that extracts telemetry
and behavioral information.
00:12:12
Instead, access your social media accounts
through a browser
00:12:16
and preferably a privacy focused one.
00:12:19
Such browsers sandbox
your activity, restrict permissions,
00:12:23
and limit how much data
the platform can harvest from your device.
00:12:26
You can see how well browsers compare
00:12:29
when it comes to privacy
by visiting privacytests.org.
00:12:32
Now let's talk about fingerprinting.
00:12:34
Platforms and third parties can track you
using things like your screen resolution,
00:12:40
time zone, font list, and system
configuration.
00:12:44
Privacy focused browsers like Brave help
limit this fingerprinting by blocking
00:12:49
trackers, spoofing certain attributes,
and reducing the uniqueness of your setup.
00:12:54
You can even go further
by disabling JavaScript when possible,
00:12:58
and also by minimizing
the number of browser extensions
00:13:01
you use,
which also acts as a unique fingerprint.
00:13:04
Even if you use a privacy focused browser,
you should still make a habit
00:13:08
of clearing out your cookies,
cache and local storage.
00:13:12
These can persist across sessions
and allow platforms to track you
00:13:16
or even link your pseudonymous account
to your real identity.
00:13:20
Clearing this stuff regularly helps
keep your identities compartmentalized.
00:13:24
For even more separation, consider using
a different browser for each identity.
00:13:29
For example, Brave for identity
A and Mullvad browser for identity B.
00:13:35
This keeps cookies
history and local storage isolated,
00:13:39
and generates different browser
fingerprints that are harder to correlate.
00:13:43
Another option is to use separate
user profiles on your computer,
00:13:47
or even a separate operating system
for different activities.
00:13:50
This could mean running a virtual machine
or using privacy focused OSes
00:13:55
like Tails or Qubes to further
isolate your identities
00:13:58
and to go even more extreme.
00:14:00
You can consider
00:14:01
using an entirely separate device
for your pseudonymous activities.
00:14:06
It could be a computer
dedicated solely to social media,
00:14:09
and one that you never use to log
into your real account.
00:14:13
To level up further, you might purchase
the device anonymously using cash.
00:14:17
Avoid stores with surveillance cameras
00:14:19
and physically disable
or remove its microphones and cameras.
00:14:23
Again, these last steps of the people
with very elevated threat models.
00:14:27
Most users won't need to go that far,
but it's important
00:14:31
to understand
that each of these is a potential link
00:14:34
that could be used to de anonymize you,
if someone is highly motivated.
00:14:38
Next, let's talk about network privacy.
00:14:41
Start by using a reputable VPN.
00:14:44
Many VPNs are shady
data collection fronts, so be careful.
00:14:49
I like Proton and Mullvad VPN.
00:14:51
A good VPN hides your real IP address from
the platform and encrypts your traffic.
00:14:56
If you want to go further,
consider paying for your VPN anonymously.
00:15:00
Mullvad, for example,
accepts cash in the mail.
00:15:03
This removes your financial identity
from the equation.
00:15:06
If you're in a higher risk category,
you might consider avoiding networks
00:15:10
that are tied to your real world identity,
like your home, work or school Wi-Fi.
00:15:15
Instead, you can connect to social media
over public networks
00:15:19
in locations far from places
associated with you.
00:15:22
This prevents your real IP from becoming
part of your metadata footprint.
00:15:26
If your VPN ever disconnects or leaks.
00:15:29
Also be aware that your device can leak
information via Wi-Fi and Bluetooth
00:15:34
signals, such as probe requests
and background broadcasts.
00:15:38
These can reveal your location, history,
and movement patterns over time by showing
00:15:42
where and when your device has appeared
near certain networks or other devices.
00:15:47
For example, if you carry
both your real phone and your pseudonymous
00:15:52
device to the same places,
they can be passively correlated.
00:15:56
Linking the two identities together.
00:15:58
So be mindful about where you bring
your pseudonymous device.
00:16:02
If your threat model is higher, consider
adding Tor as an additional layer.
00:16:06
It routes your traffic
through multiple encrypted relays,
00:16:10
masking both your IP address
and the destination.
00:16:13
It's not foolproof
against targeted surveillance,
00:16:15
but when used carefully, it can be
a powerful tool for increasing anonymity.
00:16:20
Then there are your patterns of behavior
to be mindful of.
00:16:23
For example, if account A and account
00:16:26
B, always log in at around the same time,
or use similar phrasing,
00:16:30
or interact with the same niche
communities, platforms can correlate them.
00:16:35
Even if you're using different devices
or VPNs.
00:16:38
To reduce that risk, try
to vary your posting habits and maintain
00:16:42
clear distinctions in your tone,
language, and subject matter.
00:16:46
Avoid engaging with people or topics
tied to your real world identity,
00:16:50
and steer clear of references
to events, locations, or communities
00:16:54
that could reveal who or where you are.
00:16:56
You should also be careful with
interactions outside the platform itself.
00:17:01
Promotional emails
from social media services often contain
00:17:05
tracking pixels or UTM codes,
so don't click on them.
00:17:09
In general, avoid unnecessary engagement
with the platform,
00:17:12
and when you do interact, do it
strategically and in character.
00:17:17
One important rule,
especially if your threat model is higher,
00:17:20
is to never discuss
00:17:22
your pseudonymous activity
with people that you know in real life.
00:17:25
Even trusted friends
can unintentionally expose you.
00:17:29
And once that connection is made, it's
hard to walk back.
00:17:32
And finally, keep in mind
that legal and jurisdictional risks vary.
00:17:37
Some keywords, search queries,
or behaviors may trigger
00:17:41
automated surveillance or legal scrutiny,
so make sure that you understand
00:17:45
what kinds of red flags
might apply to your region.
00:17:49
One final area of advanced protections,
but I want to mention,
00:17:52
especially if you're operating at a higher
risk level,
00:17:55
is rotating your identity
and periodically retiring old accounts.
00:18:00
The longer a pseudonymous identity
lives, the more data
00:18:04
it accumulates
and the more likely you are to slip up.
00:18:07
It's good practice to rotate identities
regularly.
00:18:10
You might choose to periodically
burn your account and start fresh.
00:18:14
Create a new email,
VoIP number, device or browser profile
00:18:18
that even within an existing account,
you can reduce your footprint
00:18:22
by deleting content
that you no longer need.
00:18:25
And while this won't erase
00:18:26
the data from the platform's back end,
it will remove it from public view
00:18:31
and reduce exposure to data scrapers
or automated profiling tools.
00:18:35
Let's briefly reiterate what we said
earlier about level three extreme
00:18:39
protections.
00:18:40
If you live under a hostile regime
where expressing
00:18:43
dissenting opinions online carries
severe consequences.
00:18:48
Do not rely on generalized privacy guides.
00:18:51
Achieving true anonymity against
a powerful adversary is extraordinarily
00:18:55
difficult.
00:18:56
Governments have massive resources,
including surveillance, infrastructure,
00:19:00
legal coercion,
and advanced forensic tools.
00:19:04
One small mistake can unravel everything.
00:19:06
This guide does not offer operational
security for high risk environments.
00:19:11
That kind of protection requires
meticulous execution
00:19:14
of everything we've discussed here,
plus much more.
00:19:17
If your life or freedom are on the line,
seek help
00:19:20
that is specific to your situation.
00:19:22
Now for the good news.
00:19:24
Most people's threat
00:19:25
model doesn't involve being
individually targeted by a government.
00:19:29
Why does that matter?
00:19:30
Well, because targeting a specific person
takes time, effort, and resources.
00:19:35
Instead, governments overwhelmingly rely
on mass surveillance systems
00:19:39
fueled by data
that you voluntarily expose.
00:19:43
And that's why this is good news, because
most of that exposure is preventable.
00:19:48
This is why evaluating your threat model
really matters,
00:19:51
because in many cases,
you can make huge privacy gains
00:19:55
just by making better choices without
needing to overhaul your entire life.
00:20:00
You don't need extreme measures
to protect yourself.
00:20:03
By using tools like VoIP numbers, email
aliases, and privacy focused browsers,
00:20:08
you can drastically reduce
how much of your life is available
00:20:12
for collection, and by making
small changes to your behavior
00:20:16
like those mentioned in level one,
you can make it much harder
00:20:19
for surveillance systems to track, profile
or link you across platforms.
00:20:24
Achieving basic pseudonymity
online is much easier than it sounds.
00:20:29
Privacy isn't about hiding.
00:20:31
It's about having the freedom
to express yourself, to explore
00:20:34
ideas, and connect
without fear of blowback.
00:20:37
And that friend I mentioned, the start?
00:20:39
The one who wanted to tell jokes
and share her unfiltered thoughts
00:20:43
without reflecting
on her professional identity?
00:20:46
Well, she's just like all of us.
00:20:48
Just a regular person
who wants a little space to be herself.
00:20:52
Privacy
is a completely normal thing to want,
00:20:56
and you absolutely have the power
to reclaim it.
00:20:59
Start from wherever you are.
00:21:01
Every step that you take
makes a difference.
00:21:03
The Ludlow Institute is a nonprofit
dedicated to advancing
00:21:06
freedom through technology.
00:21:08
If you'd like to support this mission,
head to ludlowinstitute.org/donate.
00:21:13
We also have a shop where you can purchase
00:21:14
cool things that also support our mission.
00:21:16
Do you have a pseudonymous
social media account?
00:21:18
Post it in the comments below.
00:21:20
No, don't! It was a test.
00:21:22
Don't ever do that!