Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)W
Posts
1
Comments
10
Joined
1 yr. ago

  • youre welcome!

  • Hey, thanks for feedback! I will rewrite it a bit - expand the threat model and maybe will add some security "level" thing.

  • good catch! Will change it.

  • Hey, appreciate the review! You're absolutely right - stylometry isnt bulletproof, but its practical threat lies in correlation rather than precision. Intelligence agencies dont need 100% certainty - just enough probability to justify further surveillance. And with modern AI driven linguistic analysis, even "imperfect" stylometry becomes a powerful profiling tool.

    Good point on tor traffic obfuscation. Random background activity helps break traffic patterns, but it's important not to tunnel everything through tor - that just makes correlation attacks easier. Using monero syncing, onion services, and intermittent activity as cover noise is a solid approach, but layering it with non-tor traffic is key.

    I'm Curious are you designing your lesson plan for general opsec education, or is it for a more specific field?

  • Hi thanks again! Can you expand what you mean by "it could use a few edit passes to get things condensed into fewer categories" and "I felt I was reading the same advice in multiple contexts". Would love to fix it.

  • Thanks! Hope it will help you sharing the knowledge, good luck!

  • Thanks! Take your time and share your opinion after reading.

  • thanks for the feedback! I will add these things, appreciate it bro.

  • Privacy @lemmy.ml

    A Practical opsec guide – looking for feedback & suggestions

    whos-zycher.github.io /opsec-guide/