[ 3 / biz / cgl / ck / diy / fa / ic / jp / lit / sci / vr / vt ] [ index / top / reports ] [ become a patron ] [ status ]
2023-11: Warosu is now out of extended maintenance.

/biz/ - Business & Finance

Search:


View post   

>> No.54797976 [View]
File: 53 KB, 969x613, PrivatevsSecret.png [View same] [iqdb] [saucenao] [google]
54797976

>Compartmentalization in action

So far we have talked about what bad practises look like, the types of information that should be segregated and how to get an overview of our digital footprint, but lets see what a simple use case scenario looks like.
In this case we have Anon A, this user has social media accounts, an online banking account and frequents Dread and a DNM. In this scenario we could break down the accounts into two of the three tiers, public and secret, with Anon's social media accounts being public and his Dread, DNM and banking accounts being secret.
As you can see in picrel, the social media accounts could be linked together, which in this case is by design, but could be further segregated as required by your threat model. In the secret category, we see that all usernames and email's are different, with tor activities happening on a hardened laptop (preferably utilizing an amnesic OS like Tails, or a fully encrypted machine running a privacy oriented OS). Another item not mentioned in my info-graphic is the use of VPN's, while often overrated as a privacy tool, a trusted VPN can be useful when accessing accounts, especially banking, while on public wifi where a MITM attack could be a concern.

Navigation
View posts[+24][+48][+96]