<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://gendersec.tacticaltech.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Floriana</id>
		<title>Gender and Tech Resources - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://gendersec.tacticaltech.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Floriana"/>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php/Special:Contributions/Floriana"/>
		<updated>2026-04-05T14:50:04Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.26.2</generator>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Step_1&amp;diff=9478</id>
		<title>Step 1</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Step_1&amp;diff=9478"/>
				<updated>2018-04-19T15:01:50Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: updated link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Understanding and minimising our digital shadows ===&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. Unfortunately, the internet has also become a space where people who challenge the dominant discourse often find themselves under attack. These attacks can be very personal - enabled by the fact that there is often a lot of personal information about us on the internet. &lt;br /&gt;
&lt;br /&gt;
To strengthen our defences against these kinds of attacks, it’s a good idea to start by our assessing our '''digital shadows'''. These shadows - can tell a story about us: who we are, where we live and hang out, what we are interested in, and who our friends and colleagues are. &lt;br /&gt;
&lt;br /&gt;
This can expose us to several threats. In particular, it is the publicly available traces we leave behind that expose us to online harassment. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' we can use to shape or control our digital shadows, to increase our privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing our activity online.  &lt;br /&gt;
&lt;br /&gt;
Some examples of these include controlling the amount of data we give away by consciously stripping valuable information from content and metadata; trying the art of self doxxing; and thinking about ways to play with and break up our online identity.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== '''What is a digital shadow?''' ====&lt;br /&gt;
&lt;br /&gt;
Our digital shadows can be defined as the stories data tells about us. These digital shadows are created by trillions of bits of data, digital traces we leave everyday when we connect to the Internet, our mobile phone and online services. Our digital shadows have a life of their own, are affected by others and change in unpredictable ways. Our digital shadows grow continuously, can be permanent and we have little control over them. These traces are a spectre of our past and present activities, which melt together in a permanent and ever-changing profile.&lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' The devices and the software we use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data about us. These bits of data can include our name, location, contacts, pictures, messages, tweets and likes, but also the brand of our computer, length of our phone calls and information about which websites we visit. These data traces can be put out there by ourselves as well as other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' In some cases we '''actively '''share data – for example when we share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about us, by tagging us in pictures, mentioning us in tweets or simply by communicating with us. In other cases, we give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
Our browsing habits and IP address are shared when we visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites we visit, and the information shared is collected for a wide range of purposes,  from website analytics to advertising. Our mobile phone apps also collect data on us without our active knowledge or consent – for example, the photos we take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow us as we move from one service to another - from our internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in our readers to publishing pictures from the latest protest we have covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of our messages, blogs, tweets and phone calls; it is our pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables our email to be delivered, help find files on our computer and permit mobile communication. Metadata can be our email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognized by computers.&lt;br /&gt;
&lt;br /&gt;
==== '''Who is collecting our data, and why?''' ====   &lt;br /&gt;
&lt;br /&gt;
We might wonder about the importance of one picture or one message, or think there is so much data out there that nobody knows what to do with it. However, data collection and data analysis has become very sophisticated. &lt;br /&gt;
&lt;br /&gt;
The data traces you leave are collected, analysed and sorted by various parties to create digital shadows, or '''profiles'''. Every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by companies, governments and individuals for a variety of purposes. It can be bought and sold; it can be used to control; or it can be used to create harassment strategies.&lt;br /&gt;
&lt;br /&gt;
Our digital shadows or profiles can be used to gain insight into who we are, what we do and where we have been. This data can then be used to make predictions on what we might do or where we might be in future. For example, if someone knows that we are an outspoken blogger on gender issues in country x, they know that we will probably be present at a conference on blogging and women held in that country. Profiles can also give potential harassers the ability to harass us across different platforms.  &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to our digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. We can't know exactly what is happening to our digital shadow, and that itself is a problem. &lt;br /&gt;
&lt;br /&gt;
However, there are tools and tactics we can use to manage our digital shadows and to limit their ramifications in terms of profiling and surveillance. This will be discussed in the rest of this section.&lt;br /&gt;
&lt;br /&gt;
==== '''Exploring our own digital shadow''' ====&lt;br /&gt;
&lt;br /&gt;
As we mentioned before, anyone can potentially access our digital shadow – including communications service providers, law enforcement agencies and  companies, as well as groups and individuals running their own servers.  We cannot know precisely what happens to our digital shadow and that itself is a problem. But there are tools and tactics to manage our digital shadow and to limit its ramifications in terms of  profiling and surveillance.&lt;br /&gt;
&lt;br /&gt;
Some good places to start are:&lt;br /&gt;
&lt;br /&gt;
* Exploring our individual digital shadow with '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – a tool launched by Tactical Tech, accompanied by a website that offers a lot of tips on how to protect our privacy and control our digital shadow: https://myshadow.org&lt;br /&gt;
* Identifying and materialising social networks across our online and physical activities: John Fass, researcher and designer at the Royal College of Art, has created some activities to materialise our social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* Seeing through the eyes of our mobile phone by installing a tool called '''[https://openpaths.cc/ openpaths.cc]'''. Some of our apps can see the same things. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone we can change the permissions for each app under its privacy setting.&lt;br /&gt;
&lt;br /&gt;
==== '''Control the content and metadata you share''' ====&lt;br /&gt;
&lt;br /&gt;
The good news is that we can partly control what content and metadata we give away. &lt;br /&gt;
&lt;br /&gt;
When we publish content on the web, it is always a good idea to ask ourselves if what we are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to our personal lives, the names we mention or the images we upload may contribute to a picture about who we are, what we are doing, where we are doing it and so on. This could be used by people who wish to target us. &lt;br /&gt;
&lt;br /&gt;
This does not mean that we should silence ourselves – by taking some basic measures, we can limit our risks by increasing the level of the effort that would be required to attack us or our contacts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about our life''', we can use private profiles that can only be accessed by selected contacts. When using private profiles on commercial social media, we should be aware of the regular changes to the privacy policies of that platform. This can have an impact on how “private” our profiles are. There have been cases where privacy settings have been changed, exposing pictures, content and the conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web and on publicly accessible social network profiles, we should ask ourselves if the information we spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to post information on public events only after they are finished.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices.  https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* '''Use strong passwords''', and '''use different passwords''' for each web service you use - if you you the same password for multiple services and someone intercepts your password for one of these services, they could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not usingy our real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or we can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing hidden data from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or Adblock Plus, as well as by monitoring our privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like our IP address''', thereby increasing our anonymity online.&lt;br /&gt;
&lt;br /&gt;
===='''Social domains'''====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”.&lt;br /&gt;
&lt;br /&gt;
Each of us belongs to several '''social domains''' - our work or advocacy networks, our family networks, friends, and sports teams. &lt;br /&gt;
&lt;br /&gt;
Some of these networks may be more secure than others. For example, we may tend to have a more secure communication practices for our work or advocacy activities, but less secure practices for interacting with friends on a social network. Areas where these domains intersect can turn into a threat to our security. &lt;br /&gt;
&lt;br /&gt;
If we use a single identity in all our domains, it becomes easier to gather information about us and to identify our vulnerabilities. For example, if we reveal in a social network that we like a particular kind of game and that we download files with a p2p program like Emule, an attacker who wants to investigate our work or advocacy activities might trick us into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This attacker is interested in our advocacy activities, but knows that we have increased privacy and security measures for that part of our lives. The attacker also knows that our love of games is a digital weak spot as this network is not encrypted. Thus the attacker can exploit this part of our lives to gain access to another, more secure part. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if our work identity and our Emule profile can be connected to the same person; and this is why separating our social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
==== '''Self-Doxing''' ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' (also written as &amp;quot;doxxing&amp;quot;, or &amp;quot;D0xing&amp;quot;, a word derived from &amp;quot;Documents&amp;quot;, or &amp;quot;Docx&amp;quot;) describes tracing or gathering information about someone using sources that are freely available on the internet. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. &lt;br /&gt;
&lt;br /&gt;
Doxing is premised on the idea that &amp;quot;The more you know about your target, the easier it will be to find his or her flaws”.&lt;br /&gt;
&lt;br /&gt;
Harassers and stalkers use several tools and techniques to gather information about their targets, but since these tools and techniques are mostly public and easy to use, we can also use them ourselves. &amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more than is immediately obvious about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, yellow pages, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists; or looking for images that the target has shared (and for instance may have also published in another, more personal, account). But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
We can use these same tools to explore what can be easily found out about us by others. &lt;br /&gt;
&lt;br /&gt;
Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser.&lt;br /&gt;
&lt;br /&gt;
* Useful tips on how to self-dox are available [[self-dox|here]]&lt;br /&gt;
* For more about (self-)doxing tools and techniques, visit: https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* A useful (and creepy!) tool to learn what traces we have left behind in our Facebook account is Ubisoft’s '''Digital Shadow''', a Facebook app which illustrates what third parties can know about us through our Facebook profiles: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== '''Can we remove our digital past? Creating new identities''' ====&lt;br /&gt;
''&lt;br /&gt;
&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' &lt;br /&gt;
&lt;br /&gt;
We may think that deleting certain sensitive data from social networks and web services may be enough to protect ourselves, but metadata cannot be deleted as easily.  And using just one identity through our whole life - in all our work and personal domains - creates a bulk of information that could be used to profile or attack us. &lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one or several new ones - one for each of our social domains. We might also choose to use our real identity in some areas, and our new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When we create a new identity, we should select the contacts for each one carefully, and avoid sharing contacts with other identities we use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* It's important to make sure that our various identities are not linked in any way to each other, or to our real identity. Remember that some of these connections can be tenuous: for example, did you sign up for a new, pseudonymous Gmail account using your real phone number? &lt;br /&gt;
&lt;br /&gt;
* Treating each of our extra identities as potentially disposable can be useful, as they can be discarded easily if it is compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable identities can be created for new acquaintances where appropriate – introductory profiles we can use to get to know somebody before we include them in a more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== '''Deleting identities''' ====&lt;br /&gt;
&lt;br /&gt;
If we decide to separate our domains by creating multiple identities, one of the first decisions we should make is whether to delete or keep the identity or identities that we already have.  &lt;br /&gt;
&lt;br /&gt;
To do this, we can start by investigating the traces of our existing identity or identities. (for methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
If we want to delete existing accounts:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitate the process of deleting social network profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
==== '''Mapping our social domains''' ====&lt;br /&gt;
To separate our social domains, it's helpful to first map them out and identify which ones could expose us most to cross-domain attacks. &lt;br /&gt;
&lt;br /&gt;
We can do this by thinking about our different activities and networks, and reflecting how sensitive each of these is. This will enable us to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
Partitioning one’s digital life into separate social (or &amp;quot;security&amp;quot;) domains requires some thinking. &lt;br /&gt;
&lt;br /&gt;
Polish computer security researcher Joanna Rutkowska has worked extensively on this, to the point that she developed  a security-oriented Linux distribution based on the concept of “security by isolation” (called Qubes OS). In this system, each social domain is isolated in a separate virtual machine. While Rutkowska's scheme is quite sophisticated and focused on her operating system, it can give us interesting insights on how to start thinking about separating our domains. &lt;br /&gt;
&lt;br /&gt;
The three basic domains Rutkowska identifies for herself are “work”, “personal”, and “red” (the untrusted, insecure area).&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain includes her work email, where she keeps her work PGP keys, where she prepares reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations. To add to this, she has a “work-admin” and a “work-blog” domain, in order to get a further level of security for managing her company’s servers and for writing on her blog.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes all the non-work-related stuff - such as personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the communication with her partner when she is away from home. The couple uses encrypted mails to communicate, and she has separate PGP keys for this purpose.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain, on the other hand, is totally untrusted. This is where her disposable identities or profiles belong. Rutkowska uses this domain to do everything that doesn’t fit into other domains, and which doesn’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
* Besides these three main domains, Rutkowska has several other separate domains. One is dedicated to '''shopping''', for accessing e-commerce sites. What defines this domain is access to her credit card numbers and her personal address (for shipping). Then there is the '''vault''' domain, the ultimately trusted place where she generates and keeps all her passwords (using KeePassX) and master GPG keys. Finally, she has a domain for all the Qubes development (&amp;quot;qubes-dev&amp;quot;), one for '''accounting''', and another one for '''work archives'''.&lt;br /&gt;
&lt;br /&gt;
Of course we don’t have to separate our domains in such a complex way, and using Qubes Os to keep them separated is just one solution – and one that requires a powerful machine to run on. Yet Rutkowska’s reflections on domain mapping can be an enlightening starting point to analyse our activities, and to separate our social domains for enhanced security.&lt;br /&gt;
&lt;br /&gt;
* Joanna Rutkowska’s article on security domains can be found here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
=== '''2. Assessing risks and potentials: how to choose which online identity fits our purpose''' ===&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;'''Real&amp;quot; or virtual identity?''' ====&lt;br /&gt;
&lt;br /&gt;
Once we have identified our different social domains and the digital activities and contacts that go with them, what we need to do is decide if we want to differentiate our identities accordingly, or if we'd rather stick to our official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
We may want to keep our work connected to our legal or &amp;quot;real&amp;quot; identity, or think that our activism should be anonymous, but these are decisions that need to be thought about carefully.&lt;br /&gt;
&lt;br /&gt;
For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social networks, and her online activist identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known in this context?&lt;br /&gt;
&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known in this context?&lt;br /&gt;
&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once we have '''assessed our risk,''' we can then consider different strategies for separating our identities online. &lt;br /&gt;
&lt;br /&gt;
For more on assessing risk, visit: https://ssd.eff.org/en/module/introduction-threat-modeling  &lt;br /&gt;
&lt;br /&gt;
==== '''Strategies for separating identities online''' ====&lt;br /&gt;
&lt;br /&gt;
'''strategies''' for maintaining separate identities can range range full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding talks about her decision to start writing under her real name, dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”. &lt;br /&gt;
&lt;br /&gt;
Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is dangerous one.&lt;br /&gt;
http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name&lt;br /&gt;
&lt;br /&gt;
In &amp;quot;The Girl's Guide to Staying Safe Online,&amp;quot; Sady Doyle writes that while becoming visible &amp;quot;creates a specific vulnerability&amp;quot;, giving up on our online activities is exactly what the misogynists and harassers expect from us - and so the best way to ‘stay safe’ online may simply be to stay online. &amp;quot;After all: If there’s no one left willing to complain about the harassment, what are the odds that it’s going to change?”&lt;br /&gt;
http://inthesetimes.com/article/12311/the_girls_guide_to_staying_safe_online&lt;br /&gt;
&lt;br /&gt;
As such, we have several options available to us: We can attempt to participate online anonymously. We can use a &amp;quot;persistent pseudonym&amp;quot;.  We can identify fully with our real or legal name, or we can divide our online lives, using our real or legal name sometimes and a pseudonym at other times. The following section will explore the pros and cons of each option, so we can determine which options are best for each one of us.&lt;br /&gt;
&lt;br /&gt;
==== '''Anonymity''' ====&lt;br /&gt;
Total anonymity can be both isolating and difficult to maintain, but is useful in settings where we don't need to gain other people's trust, when there are few or no people we can trust, or when we don't want to expose others in our life to risks. &lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in certain specific situations, such as researching or participating in message boards about health issues, or when sharing sensitive information. We may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
On anonymity, Vani, a human rights activist, writes: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”. [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity speaks of their participation on social networks anonymously]&lt;br /&gt;
&lt;br /&gt;
But while anonymity is a good option in many situations, it can also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely: “Anonymity also isolates you”, a blogger writes. “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
Anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. When we adopt anonymity as a strategy we may use pseudonyms, but these pseudonyms are not used across different networks or social domains, and some may only be used once and then discarded. For more information on how to be anonymous online, see '''Anonymizing tools'''.&lt;br /&gt;
&lt;br /&gt;
==== '''Persistent Pseudonymity''' ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves using a pseudonym consistently over a period of time. &lt;br /&gt;
&lt;br /&gt;
The Oxford English Dictionary defines a pseudonym as &amp;quot;a fictitious name, especially one used by an author.&amp;quot; In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. &lt;br /&gt;
&lt;br /&gt;
Jillian C. York, in a blog post for the Electronic Frontier Foundation, writes: &amp;quot;There are myriad reasons why individuals may wish to use a name other than the one they were born with. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent discrimination or they may use a name that’s easier to pronounce or spell in a given culture.&amp;quot;&lt;br /&gt;
https://www.eff.org/deeplinks/2011/07/case-pseudonyms&lt;br /&gt;
&lt;br /&gt;
Pseudonymous speech has played a critical role throughout history, says York. &amp;quot;From the literary efforts of George Eliot and Mark Twain to the explicitly political advocacy of Publius in the Federalist Papers or Junius' letters to the Public Advertiser in 18th century London, people have contributed strongly to public debate under pseudonyms and continue to do so to this day.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity,&amp;quot; which typically means using your legal name or the name by which you are commonly known. This policy has caused some users, such as a group of drag performers in California, to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that a risk of doing so is being reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is using a name-shaped pseudonym.&lt;br /&gt;
https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers us '''visibility'''. Visibility allows us to network with others, and by pinning our voice to a particular name we can develop an '''online reputation'''. An online reputation allows others to decide whether we are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to our legal identity, or not. The choice to connect our online reputation to our &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== '''Collective Identity''' ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. This could mean a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity. &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice we make, what is important is that we keep our domains effectively separated. &lt;br /&gt;
&lt;br /&gt;
No matter how many domains we identify in our digital life, and how many corresponding identities we create, on the internet every identity - even the one bearing our real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means that you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you; gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' can be beneficial at times, but can also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': few opportunities to gain trust and reputation, or to network with others.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': difficult; requires caution. Might also require the use of anonymisation tools (for example Tor.)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonym could be linked to our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify us across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if we are also using our real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': possible exposure of our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
=== '''4. Creating a new online identity''' ===&lt;br /&gt;
&lt;br /&gt;
==== '''What’s in a name?''' ====&lt;br /&gt;
&lt;br /&gt;
The practice of naming varies greatly from one culture to another. While names, in one form or another, have existed across cultures for milennia,  the concept of a &amp;quot;legal name&amp;quot; is a fairly new one. &lt;br /&gt;
&lt;br /&gt;
Different countries regulate the practice of naming in different ways; for example, in Morocco, names must be chosen from a government-approved list, while in Germany a name must be clearly reflective of the baby's gender. &lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgement on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If we want to use commercial social networks, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that we use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once we have decided on a name, a surname, and a username for our virtual persona, we should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if we wish to develop our own reputation, we don’t want to be confused with someone else, especially if they don’t share our views of the world!&lt;br /&gt;
&lt;br /&gt;
==== '''Writing our own story''' ==== &lt;br /&gt;
&lt;br /&gt;
The practice of “story telling” (and of creating a social mask, for that matter) is an old one, and creating a new persona with a story makes it a lot easier to maintain the role. &lt;br /&gt;
&lt;br /&gt;
We can base our story on a “known” person’s story, a superhero, a fictional character from our favourite novel, or adopt a “group identity” like Anonymous/Anonymiss or the Guerrilla Girls. If we feel particularly inspired, we can invent a new story.&lt;br /&gt;
&lt;br /&gt;
The main point is that when we create an identity we should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: [[Roleplay]]&lt;br /&gt;
&lt;br /&gt;
==== '''Creating a credible persona''' ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If we keep all our normal identifying traits - such as our gender, job, attitude or the way we write - it might be possible for someone to connect the dots and connect our pseudonymous personas with our real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': One of the things to consider is our '''linguistic fingerprint'''. This could be identified through a so-called &amp;quot;stylometric analysis&amp;quot; using tools that are increasingly usable, even for non-experts, that make it possible to identify the author of a particular text.  We can, for example, give away our real identity through our particular way of writing certain words, our typical typos, and our style and tone.  To change this, we can start by using a spell-checker in our word processor to check for consistent typos. We could also think about adopting a different writing attitude. To keep it simple, we could adopt one simple rule for each persona, e.g. making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks, or a spelling criminal, always putting apostrophes in the wrong place or mistyping words. What we decide to do with our writing style should match the character we choose for our new identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': To be sure that our pseudonymous avatar cannot be tracked back to us, our persona should have a job that is different from ours, but not so different that we don’t know anything about that field: for example, they shouldn’t be a surgeon if we don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select our persona's skills and the main topics they focus on and write about. These can, of course, overlap - for example a journalist who writes about national politics may have an alternative identity that talks about national politics as well, but only casually (and their main interest will be something different, like carpentry or feminism or food).&lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': As for psychological attitude, a good rule of thumb is to give our persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, we are able to weather the strikes and even have some fun in the process. For example, if we have a very strong sense of humour, we could choose a severe lack of humour as our persona's biggest weakness, so that if that weakness comes under attack we can enjoy impersonating a humourless persona without really being psychologically harmed. &lt;br /&gt;
&lt;br /&gt;
What is most important is to remember that on the internet, each one of our identities - even the one connected to our real name - is a “virtual” identity, and it is always better to decide what character traits we want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for our “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for our identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
==== '''Creating online profiles''' ====&lt;br /&gt;
&lt;br /&gt;
Once we have created several personas, it's important keep them separate in both our physical and digital lives. While keeping notes on our identities might help ensure that we remember our story, there are technical measures we can take to make sure that our profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social network accounts''' for each of our identities. A good rule of thumb is to always use different apps for each account/identity and, if possible, to separate our identities per device or operating system (see '''6. A different machine for each identity''').&lt;br /&gt;
&lt;br /&gt;
==== Creating separate browser profiles and mailboxes ====&lt;br /&gt;
&lt;br /&gt;
''Browser profiles:'' To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles  . For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
&lt;br /&gt;
''Mailboxes:'' When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
===='''Disposable email addresses''' ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains we need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all we need is a '''disposable email address''' that we only need to use once or few times, for example for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if we decide to have just one identity online, using disposable email addresses prevents sites from building up a history of our activities and ensures that if that account gets compromised we can simply delete it and create a new one, keeping our digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are:''' '''https://anonbox.net'''&amp;lt;nowiki/&amp;gt;''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': Making the process of creating a disposable account easier, '''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': We can also make use of existing fake or disposable email accounts. '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
==== '''Mail aliases''' ====&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to our main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised we can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill our main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org), two secure, autonomous servers that are particularly focused on the right to privacy and anonymity.&lt;br /&gt;
&lt;br /&gt;
==== '''Managing our identities on social networks''' ====&lt;br /&gt;
&lt;br /&gt;
Note: When we use social networking platforms, we should always access them with a secure HTTPS connection. &lt;br /&gt;
&lt;br /&gt;
* When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?)&lt;br /&gt;
&lt;br /&gt;
*Also be very careful about the''' profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for us in that social network, regardless of our privacy settings.&lt;br /&gt;
&lt;br /&gt;
* Make sure your contacts do not overlap with your other identities, and to make sure your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
* Most social networking platforms will display your location where they can. This function is generally provided when we interact with the platform using a GPS-enabled phone, but it can also happen if we are connecting from other devices - for example the network our computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
* Photos and videos can also reveal a lot of information without you realising it. Many cameras will embed metadata into your photos, which can include the date, time and location of the photo, camera type, etc. Photo and video sharing sites may publish this information when we upload content to their sites.&lt;br /&gt;
&lt;br /&gt;
* If we access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
* Publish from your various identities at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read:https://www.facebook.com/help/389849807718635  . Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
*  It can be a good idea to follow, from our pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance our real identity from our pseudonymous identities, we can also write (and hashtag on Twitter) posts under our pseudonymous profiles about events that we are not attending, especially if they are taking place far away from us. It can also be fun to publish and then delete posts that look like we have exposed our identity, so as to further confuse anyone who may try to unmask us. &lt;br /&gt;
&lt;br /&gt;
* Whatever social networking platform we decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
==== '''Alternative social networks''' ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if our aim is to publicise as widely as possible an event we are organizing or a project we are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close our accounts if they find that our contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If we add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to our data, the best solution is to limit the use of commercial social networking platforms to specific projects we want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
* Social networking platform '''Ello''' explicitly states in its manifesto that “You are not a product”. It also does not require &amp;quot;real names&amp;quot; - a rarity amongst commercial social networks. It's important to be aware, however, that Ello is still a commercial project&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendi.ca)] and '''Crabgrass '''(https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so we way wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, we should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (eg related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, How is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can we choose to share our videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of our activity and information?&lt;br /&gt;
&lt;br /&gt;
==== '''Creating a blog or website''' ====&lt;br /&gt;
Writing from our social networking accounts - especially if we have found a more privacy-friendly option - may be all we need to voice our opinions and to interact with a given network of people (or with several networks, if we are using different identities online). On the other hand, we may want a more independent platform to spread our ideas, plans or creations. For this we can create a website or a blog.&lt;br /&gt;
&lt;br /&gt;
* Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com). &lt;br /&gt;
&lt;br /&gt;
* Based on Wordpress, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org/ http://noblogs.org) and Nadir’s '''BlackBlogs '''– (http://blackblogs.org/ http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see &amp;lt;nowiki/&amp;gt;https://www.autistici.org/en/links.html &amp;lt;nowiki/&amp;gt;and &amp;lt;nowiki/&amp;gt;https://blackblogs.org/policy &amp;lt;nowiki/&amp;gt;respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
* If we want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, we can create our own website. For this we need to get some space in a server through a webhosting service. There are many webhosting services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
* If we want to use our own '''domain''' name, bypassing payments and identifications may get difficult unless we use Bitcoin or another anonymous payment system. The personal data we will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, we can register our domain with the data of an association and use a prepaid credit card that is not connected to our own data (if available in our country). Alternatively, we can use a registrar like Gandi.net ([https://www.gandi.net/ https://www.gandi.net]) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
=== '''5. Managing collective online identities''' ===&lt;br /&gt;
&lt;br /&gt;
==== '''Collective virtual personas''' ====&lt;br /&gt;
&lt;br /&gt;
General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power.&lt;br /&gt;
&lt;br /&gt;
If we want to adopt a collective identity, we can adopt one that already exists, like Anonymous/Anonymiss, or create a new one that we can then share. &lt;br /&gt;
 &lt;br /&gt;
* A very interesting study on collective identity is anthropologist Gabriella Coleman’s book ''Hacker, Hoaxer, Whistleblower, Spy. The Many Faces of Anonymous ''(2014), based on an anthropological research on how Anonymous became a well-known and powerful collective identity with multiple faces and attitudes.&lt;br /&gt;
&lt;br /&gt;
* In her PhD dissertation ''Networked Disruption. Rethinking Oppositions in Art, Hacktivism and the Business of Social Networking ''(2011), Tatiana Bazzichelli describes how multiple identities have been used to disrupt the fundamental notions of power and hegemony on which Western culture is based, and how this works in the web today.&lt;br /&gt;
&lt;br /&gt;
==== '''Managing collective identities... or simple collective accounts''' ====&lt;br /&gt;
&lt;br /&gt;
While the collaboration of many individuals can help create a rich collective identity, managing a collective project may have some security and technological challenges we should keep in mind.&lt;br /&gt;
&lt;br /&gt;
Since a single weak link in a security chain can break the entire system, our security and anonymity depend on the precautions each member of our group takes. We may decide that we don’t want to be absolutely anonymous; that our close friends can know about our collective activities. The degree of security we may want to attain for our group depends on the possible threats we face and on our adversaries’ power and skills. &lt;br /&gt;
&lt;br /&gt;
Nonetheless, there are some important things we don't want want to lose, like the password to our collective mailbox or to our group’s social networking accounts. If we decide that we are going to share those passwords with the whole group, each member needs to be trained on how to store a password securely. &lt;br /&gt;
&lt;br /&gt;
To minimise this kind of risk, we should try to use services that provide for different accounts and passwords whenever possible. For example, instead of using a single mailbox, we may create a mailing list that all the group members subscribe to. If we allow non-subscribed people to write to it, each group member will be able to read that e-mail in their own mailbox rather than in a collective one with a dangerously shared password. &lt;br /&gt;
&lt;br /&gt;
Similarly, if coordination really needs to happen through Facebook, it is much better to share information in a dedicated group rather than do everything within a collective account.&lt;br /&gt;
&lt;br /&gt;
=== '''6. A different machine for each identity''' ===&lt;br /&gt;
&lt;br /&gt;
If we use the same operating system for our several identities, no matter how carefully we separate our profiles we can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile we have assigned to our true identity, or get infected by a malware that allows our attacker to monitor everything we do online, with all our identities.&lt;br /&gt;
&lt;br /&gt;
Both risks can be limited by using a virtual machine for each of our domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on our physical computer. We can think of a VM as a &amp;lt;em&amp;gt;computer within a computer&amp;lt;/em&amp;gt;. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For our purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== '''Whonix: compartmentalizing our identities through a secure virtual machine''' ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix '''(https://www.whonix.org) is an operating system that aims at protecting our anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. &lt;br /&gt;
&lt;br /&gt;
Whonix’s website offers a wide documentation, ranging from very clear installation and usage instructions to thorough recommendations on security and the risks we may run: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== '''Tails: a live system that leaves no traces''' ====&lt;br /&gt;
&lt;br /&gt;
Using virtual machines, Whonix in particular, is a good idea if we have our own computer where we are free to install whatever we want, especially if it is a powerful machine. But if we use an older box or just connect to the internet from cybercafes, installing a virtual machine becomes unsustainable. In this case, we may turn to a live Linux distribution, a USB-stick with a Linux operating system installed on it that runs in the computer we are using as soon as we switch it on.&lt;br /&gt;
&lt;br /&gt;
A particularly secure live distribution focused on security and anonymity is '''Tails''', or '''The Amnesic Incognito Live System''', a free and open-source Debian-based Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections.&lt;br /&gt;
&lt;br /&gt;
When we launch Tails, we have a complete operating system that, just as Whonix, comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, we can access the internet, communicate, and do all we need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless we ask it to do so.&lt;br /&gt;
&lt;br /&gt;
When using different identities, it is not advisable to use the same Tails session to perform two tasks or endorse two contextual identities that we really want to keep separate from another, for example hiding our location to check our personal email and publishing a document on our pseudonymous blog.&lt;br /&gt;
&lt;br /&gt;
The first reason is that Tor tends to reuse the same circuits, for example amongst a same browsing session, making it easier for a powerful adversary to correlate the several browsing requests as part of a same circuit and possibly made by a same user. Second, in case of a security hole or a misuse in using Tails or one of its applications, information about our session could be leaked. That could reveal that the same person was behind the various actions made during the session.&lt;br /&gt;
&lt;br /&gt;
T''he solution to both threats is to shut down and restart Tails every time we are using a new identity''.&lt;br /&gt;
&lt;br /&gt;
==== '''Security by isolation: Qubes OS''' ====&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting us; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, the most pessimistic, and realistic, approach is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that we want to secure.&lt;br /&gt;
&lt;br /&gt;
In order to implement security by isolation, for instance, '''Whonix''' is divided into two parts: Whonix-Workstation, which is the system we access for our work, and Whonix-Gateway, which routes all internet traffic through Tor and, by being isolated from the workstation, averts many threats posed by malware, misbehaving applications, and user error.&lt;br /&gt;
&lt;br /&gt;
But while Whonix needs a virtual machine to run on and its main focus is anonymization, there is an operating system that has security by isolation as its main purpose and that can make life a lot easier to someone who manages several social domains and/or identities in her digital life.&lt;br /&gt;
&lt;br /&gt;
Called '''Qubes OS''' – https://www.qubes-os.org – and developed by computer security researcher Joanna Rutkowska, Qubes is a free and open-source security-oriented operating system based on '''Fedora''', a Linux distribution, and '''Xen''', a virtual machine monitor (or hypervisor), that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things we do on our computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, we can do everything on a single physical computer without having to worry that one successful cyberattack harms our whole system, potentially revealing all the connections among our several identities.&lt;br /&gt;
&lt;br /&gt;
A plus of Qubes OS for the purposes of multiple identities management is its user-friendly window manager, that assigns a different colour to each domain. Thus, the colour of the frame makes each window clearly recognizable as belonging to the domain corresponding to that colour and prevents potential human mistakes in the management of our identities.&lt;br /&gt;
&lt;br /&gt;
==== '''Tails, Whonix, Qubes OS: how to choose''' ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described in the last few paragraphs – Whonix, Tails and Qubes OS – all allow us to use a completely separate operating system for managing our alternate identities, and can be quite useful to make sure that we don’t reveal our true identity while we use the anonymous one(s). Still better, if we can afford it, would be to have a different machine for each of our identities, as well as an air-gapped one to store our most sensitive data. Of course, the choice depends on the resources we can dedicate to securing our digital life and on our threat-model, especially on the adversaries we expect to face: if we are pretty sure that in our country harassers work together with the regime to slander (or worse) people like us, we may want to be absolutely sure that none of our data is leaked and – if we have enough funds or are connected to a network of hacktivists – we may decide to ask for an expert’s help to check that we have taken all the necessary measures to keep doing an efficient work and to stop any ill-intentioned actors from tampering with our data. On the other hand, if we feel sufficiently protected by our community and/or by our government, and we expect our adversaries not to be very skilled in technological matters, perhaps all we need is to separate our browser profiles and mailboxes, to use a secure HTTPS connection and some basic common sense and to keep developing a network of support for vocal women online.&lt;br /&gt;
&lt;br /&gt;
If we think that using a different operating system is really necessary, or that it can be helpful to keep things logically and graphically separated (or we just want to explore all the possibilities we have for the fun of it!), we should assess our resources and our needs in order to identify the best solution for us.&lt;br /&gt;
&lt;br /&gt;
''Comparison between Tails, Whonix and Qubes Os:''&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Tails'''&lt;br /&gt;
!'''Whonix'''&lt;br /&gt;
!'''Qubes OS'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Required hardware/software'''&lt;br /&gt;
|&amp;quot;x86 compatible and/or Virtual Machines; DVD, USB stick, or SD card for booting the system&amp;quot;&lt;br /&gt;
|&amp;quot;x86 compatible pc with VirtualBox&amp;quot;&lt;br /&gt;
|&amp;quot;a powerful pc capable of running Qubes OS&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''System requirements'''&lt;br /&gt;
|&amp;quot;lowest&amp;quot;&lt;br /&gt;
|&amp;quot;high&amp;quot;&lt;br /&gt;
|&amp;quot;highest&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Difficulty to install'''&lt;br /&gt;
|&amp;quot;medium&amp;quot;&lt;br /&gt;
|&amp;quot;medium&amp;quot;&lt;br /&gt;
|&amp;quot;easy&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Difficulty to configure'''&lt;br /&gt;
|&amp;quot;low&amp;quot;&lt;br /&gt;
|&amp;quot;medium&amp;quot;&lt;br /&gt;
|&amp;quot;high&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Learning curve'''&lt;br /&gt;
|&amp;quot;low&amp;quot;&lt;br /&gt;
|&amp;quot;low&amp;quot;&lt;br /&gt;
|&amp;quot;high&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Anonymization by default'''&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|&amp;quot;no&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Security by isolation'''&lt;br /&gt;
|&amp;quot;no&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Pre-installed applications'''&lt;br /&gt;
|&amp;quot;nice selection&amp;quot;&lt;br /&gt;
|&amp;quot;not many&amp;quot;&lt;br /&gt;
|&amp;quot;not many, and some, like Tor or Virtualbox cannot be installed at all&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Persistence'''&lt;br /&gt;
|&amp;quot;no (available option)&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
As we can see in the table above, '''Tails''' just needs a normal computer and a DVD or a bootable device to launch the system, but installing the system in this device, as well as having the DVD, USB stick or SD card actually boot in the computer we are using, can be tricky, and we may need some external help. After that, though, using Tails is pretty easy, and if what we need to do with our alternate persona needs a focus on ''anonymization'', then it may be worthwhile to overcome the initial obstacle. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. One particular advantage of Tails is that after we have switched the computer off, we leave no traces and everything we have done vanishes into thin air. But if on the other hand we need ''persistence'', i.e. we want to keep some files we have created or downloaded in our USB stick or we have changed some system settings and want to keep them also in the future, we need to enable this option when we start the system. Last but not least, Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what we need is both ''anonymity'' and ''security by isolation'' and we have a good machine – https://www.whonix.org/wiki/System_Requirements – where we can run Virtualbox, installing '''Whonix''' in one or more virtual machines, according to the number of our alternative identities, seems a good solution that caters to all our needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if we want to keep all our activities inside our own computer without having to install anything else and if what we are trying to do is to effectively ''separate'' our identities rather than anonymize our activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if we feel that we really need to protect ourselves against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protects us from every threat, and we shouldn’t look at them as a magic potion that will make us invulnerable. Nevertheless, by using any of them, according to our needs and resources, we will raise the level of effort that an attacker will need to harm us, thus making an attack less likely.&lt;br /&gt;
&lt;br /&gt;
For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Step_1&amp;diff=9476</id>
		<title>Step 1</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Step_1&amp;diff=9476"/>
				<updated>2018-04-05T14:25:46Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: Floriana moved page Step 1 Control content metadata to Step 1 over redirect&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Understanding and minimising our digital shadows ===&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. Unfortunately, the internet has also become a space where people who challenge the dominant discourse often find themselves under attack. These attacks can be very personal - enabled by the fact that there is often a lot of personal information about us on the internet. &lt;br /&gt;
&lt;br /&gt;
To strengthen our defences against these kinds of attacks, it’s a good idea to start by our assessing our '''digital shadows'''. These shadows - can tell a story about us: who we are, where we live and hang out, what we are interested in, and who our friends and colleagues are. &lt;br /&gt;
&lt;br /&gt;
This can expose us to several threats. In particular, it is the publicly available traces we leave behind that expose us to online harassment. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' we can use to shape or control our digital shadows, to increase our privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing our activity online.  &lt;br /&gt;
&lt;br /&gt;
Some examples of these include controlling the amount of data we give away by consciously stripping valuable information from content and metadata; trying the art of self doxxing; and thinking about ways to play with and break up our online identity.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== '''What is a digital shadow?''' ====&lt;br /&gt;
&lt;br /&gt;
Our digital shadows can be defined as the stories data tells about us. These digital shadows are created by trillions of bits of data, digital traces we leave everyday when we connect to the Internet, our mobile phone and online services. Our digital shadows have a life of their own, are affected by others and change in unpredictable ways. Our digital shadows grow continuously, can be permanent and we have little control over them. These traces are a spectre of our past and present activities, which melt together in a permanent and ever-changing profile.&lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' The devices and the software we use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data about us. These bits of data can include our name, location, contacts, pictures, messages, tweets and likes, but also the brand of our computer, length of our phone calls and information about which websites we visit. These data traces can be put out there by ourselves as well as other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' In some cases we '''actively '''share data – for example when we share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about us, by tagging us in pictures, mentioning us in tweets or simply by communicating with us. In other cases, we give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
Our browsing habits and IP address are shared when we visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites we visit, and the information shared is collected for a wide range of purposes,  from website analytics to advertising. Our mobile phone apps also collect data on us without our active knowledge or consent – for example, the photos we take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow us as we move from one service to another - from our internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in our readers to publishing pictures from the latest protest we have covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of our messages, blogs, tweets and phone calls; it is our pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables our email to be delivered, help find files on our computer and permit mobile communication. Metadata can be our email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognized by computers.&lt;br /&gt;
&lt;br /&gt;
==== '''Who is collecting our data, and why?''' ====   &lt;br /&gt;
&lt;br /&gt;
We might wonder about the importance of one picture or one message, or think there is so much data out there that nobody knows what to do with it. However, data collection and data analysis has become very sophisticated. &lt;br /&gt;
&lt;br /&gt;
The data traces you leave are collected, analysed and sorted by various parties to create digital shadows, or '''profiles'''. Every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by companies, governments and individuals for a variety of purposes. It can be bought and sold; it can be used to control; or it can be used to create harassment strategies.&lt;br /&gt;
&lt;br /&gt;
Our digital shadows or profiles can be used to gain insight into who we are, what we do and where we have been. This data can then be used to make predictions on what we might do or where we might be in future. For example, if someone knows that we are an outspoken blogger on gender issues in country x, they know that we will probably be present at a conference on blogging and women held in that country. Profiles can also give potential harassers the ability to harass us across different platforms.  &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to our digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. We can't know exactly what is happening to our digital shadow, and that itself is a problem. &lt;br /&gt;
&lt;br /&gt;
However, there are tools and tactics we can use to manage our digital shadows and to limit their ramifications in terms of profiling and surveillance. This will be discussed in the rest of this section.&lt;br /&gt;
&lt;br /&gt;
==== '''Exploring our own digital shadow''' ====&lt;br /&gt;
&lt;br /&gt;
As we mentioned before, anyone can potentially access our digital shadow – including communications service providers, law enforcement agencies and  companies, as well as groups and individuals running their own servers.  We cannot know precisely what happens to our digital shadow and that itself is a problem. But there are tools and tactics to manage our digital shadow and to limit its ramifications in terms of  profiling and surveillance.&lt;br /&gt;
&lt;br /&gt;
Some good places to start are:&lt;br /&gt;
&lt;br /&gt;
* Exploring our individual digital shadow with '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – a tool launched by Tactical Tech, accompanied by a website that offers a lot of tips on how to protect our privacy and control our digital shadow: https://myshadow.org&lt;br /&gt;
* Identifying and materialising social networks across our online and physical activities: John Fass, researcher and designer at the Royal College of Art, has created some activities to materialise our social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* Seeing through the eyes of our mobile phone by installing a tool called '''[https://openpaths.cc/ openpaths.cc]'''. Some of our apps can see the same things. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone we can change the permissions for each app under its privacy setting.&lt;br /&gt;
&lt;br /&gt;
==== '''Control the content and metadata you share''' ====&lt;br /&gt;
&lt;br /&gt;
The good news is that we can partly control what content and metadata we give away. &lt;br /&gt;
&lt;br /&gt;
When we publish content on the web, it is always a good idea to ask ourselves if what we are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to our personal lives, the names we mention or the images we upload may contribute to a picture about who we are, what we are doing, where we are doing it and so on. This could be used by people who wish to target us. &lt;br /&gt;
&lt;br /&gt;
This does not mean that we should silence ourselves – by taking some basic measures, we can limit our risks by increasing the level of the effort that would be required to attack us or our contacts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about our life''', we can use private profiles that can only be accessed by selected contacts. When using private profiles on commercial social media, we should be aware of the regular changes to the privacy policies of that platform. This can have an impact on how “private” our profiles are. There have been cases where privacy settings have been changed, exposing pictures, content and the conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web and on publicly accessible social network profiles, we should ask ourselves if the information we spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to post information on public events only after they are finished.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices.  https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* '''Use strong passwords''', and '''use different passwords''' for each web service you use - if you you the same password for multiple services and someone intercepts your password for one of these services, they could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not usingy our real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or we can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing hidden data from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or Adblock Plus, as well as by monitoring our privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like our IP address''', thereby increasing our anonymity online.&lt;br /&gt;
&lt;br /&gt;
===='''Social domains'''====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”.&lt;br /&gt;
&lt;br /&gt;
Each of us belongs to several '''social domains''' - our work or advocacy networks, our family networks, friends, and sports teams. &lt;br /&gt;
&lt;br /&gt;
Some of these networks may be more secure than others. For example, we may tend to have a more secure communication practices for our work or advocacy activities, but less secure practices for interacting with friends on a social network. Areas where these domains intersect can turn into a threat to our security. &lt;br /&gt;
&lt;br /&gt;
If we use a single identity in all our domains, it becomes easier to gather information about us and to identify our vulnerabilities. For example, if we reveal in a social network that we like a particular kind of game and that we download files with a p2p program like Emule, an attacker who wants to investigate our work or advocacy activities might trick us into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This attacker is interested in our advocacy activities, but knows that we have increased privacy and security measures for that part of our lives. The attacker also knows that our love of games is a digital weak spot as this network is not encrypted. Thus the attacker can exploit this part of our lives to gain access to another, more secure part. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if our work identity and our Emule profile can be connected to the same person; and this is why separating our social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
==== '''Self-Doxing''' ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' (also written as &amp;quot;doxxing&amp;quot;, or &amp;quot;D0xing&amp;quot;, a word derived from &amp;quot;Documents&amp;quot;, or &amp;quot;Docx&amp;quot;) describes tracing or gathering information about someone using sources that are freely available on the internet. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. &lt;br /&gt;
&lt;br /&gt;
Doxing is premised on the idea that &amp;quot;The more you know about your target, the easier it will be to find his or her flaws”.&lt;br /&gt;
&lt;br /&gt;
Harassers and stalkers use several tools and techniques to gather information about their targets, but since these tools and techniques are mostly public and easy to use, we can also use them ourselves. &amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more than is immediately obvious about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, yellow pages, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists; or looking for images that the target has shared (and for instance may have also published in another, more personal, account). But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
We can use these same tools to explore what can be easily found out about us by others. &lt;br /&gt;
&lt;br /&gt;
Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser.&lt;br /&gt;
&lt;br /&gt;
* Useful tips on how to self-dox are available [[self-dox|here]]&lt;br /&gt;
* For more about (self-)doxing tools and techniques, visit: https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* A useful (and creepy!) tool to learn what traces we have left behind in our Facebook account is Ubisoft’s '''Digital Shadow''', a Facebook app which illustrates what third parties can know about us through our Facebook profiles: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== '''Can we remove our digital past? Creating new identities''' ====&lt;br /&gt;
''&lt;br /&gt;
&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' &lt;br /&gt;
&lt;br /&gt;
We may think that deleting certain sensitive data from social networks and web services may be enough to protect ourselves, but metadata cannot be deleted as easily.  And using just one identity through our whole life - in all our work and personal domains - creates a bulk of information that could be used to profile or attack us. &lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one or several new ones - one for each of our social domains. We might also choose to use our real identity in some areas, and our new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When we create a new identity, we should select the contacts for each one carefully, and avoid sharing contacts with other identities we use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* It's important to make sure that our various identities are not linked in any way to each other, or to our real identity. Remember that some of these connections can be tenuous: for example, did you sign up for a new, pseudonymous Gmail account using your real phone number? &lt;br /&gt;
&lt;br /&gt;
* Treating each of our extra identities as potentially disposable can be useful, as they can be discarded easily if it is compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable identities can be created for new acquaintances where appropriate – introductory profiles we can use to get to know somebody before we include them in a more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== '''Deleting identities''' ====&lt;br /&gt;
&lt;br /&gt;
If we decide to separate our domains by creating multiple identities, one of the first decisions we should make is whether to delete or keep the identity or identities that we already have.  &lt;br /&gt;
&lt;br /&gt;
To do this, we can start by investigating the traces of our existing identity or identities. (for methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
If we want to delete existing accounts:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitate the process of deleting social network profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
==== '''Mapping our social domains''' ====&lt;br /&gt;
To separate our social domains, it's helpful to first map them out and identify which ones could expose us most to cross-domain attacks. &lt;br /&gt;
&lt;br /&gt;
We can do this by thinking about our different activities and networks, and reflecting how sensitive each of these is. This will enable us to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
Partitioning one’s digital life into separate social (or &amp;quot;security&amp;quot;) domains requires some thinking. &lt;br /&gt;
&lt;br /&gt;
Polish computer security researcher Joanna Rutkowska has worked extensively on this, to the point that she developed  a security-oriented Linux distribution based on the concept of “security by isolation” (called Qubes OS). In this system, each social domain is isolated in a separate virtual machine. While Rutkowska's scheme is quite sophisticated and focused on her operating system, it can give us interesting insights on how to start thinking about separating our domains. &lt;br /&gt;
&lt;br /&gt;
The three basic domains Rutkowska identifies for herself are “work”, “personal”, and “red” (the untrusted, insecure area).&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain includes her work email, where she keeps her work PGP keys, where she prepares reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations. To add to this, she has a “work-admin” and a “work-blog” domain, in order to get a further level of security for managing her company’s servers and for writing on her blog.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes all the non-work-related stuff - such as personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the communication with her partner when she is away from home. The couple uses encrypted mails to communicate, and she has separate PGP keys for this purpose.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain, on the other hand, is totally untrusted. This is where her disposable identities or profiles belong. Rutkowska uses this domain to do everything that doesn’t fit into other domains, and which doesn’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
* Besides these three main domains, Rutkowska has several other separate domains. One is dedicated to '''shopping''', for accessing e-commerce sites. What defines this domain is access to her credit card numbers and her personal address (for shipping). Then there is the '''vault''' domain, the ultimately trusted place where she generates and keeps all her passwords (using KeePassX) and master GPG keys. Finally, she has a domain for all the Qubes development (&amp;quot;qubes-dev&amp;quot;), one for '''accounting''', and another one for '''work archives'''.&lt;br /&gt;
&lt;br /&gt;
Of course we don’t have to separate our domains in such a complex way, and using Qubes Os to keep them separated is just one solution – and one that requires a powerful machine to run on. Yet Rutkowska’s reflections on domain mapping can be an enlightening starting point to analyse our activities, and to separate our social domains for enhanced security.&lt;br /&gt;
&lt;br /&gt;
* Joanna Rutkowska’s article on security domains can be found here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
=== '''2. Assessing risks and potentials: how to choose which online identity fits our purpose''' ===&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;'''Real&amp;quot; or virtual identity?''' ====&lt;br /&gt;
&lt;br /&gt;
Once we have identified our different social domains and the digital activities and contacts that go with them, what we need to do is decide if we want to differentiate our identities accordingly, or if we'd rather stick to our official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
We may want to keep our work connected to our legal or &amp;quot;real&amp;quot; identity, or think that our activism should be anonymous, but these are decisions that need to be thought about carefully.&lt;br /&gt;
&lt;br /&gt;
For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social networks, and her online activist identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known in this context?&lt;br /&gt;
&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known in this context?&lt;br /&gt;
&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once we have '''assessed our risk,''' we can then consider different strategies for separating our identities online. &lt;br /&gt;
&lt;br /&gt;
For more on assessing risk, visit: https://ssd.eff.org/en/module/introduction-threat-modeling  &lt;br /&gt;
&lt;br /&gt;
==== '''Strategies for separating identities online''' ====&lt;br /&gt;
&lt;br /&gt;
'''strategies''' for maintaining separate identities can range range full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding talks about her decision to start writing under her real name, dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”. &lt;br /&gt;
&lt;br /&gt;
Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is dangerous one.&lt;br /&gt;
http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name&lt;br /&gt;
&lt;br /&gt;
In &amp;quot;The Girl's Guide to Staying Safe Online,&amp;quot; Sady Doyle writes that while becoming visible &amp;quot;creates a specific vulnerability&amp;quot;, giving up on our online activities is exactly what the misogynists and harassers expect from us - and so the best way to ‘stay safe’ online may simply be to stay online. &amp;quot;After all: If there’s no one left willing to complain about the harassment, what are the odds that it’s going to change?”&lt;br /&gt;
http://inthesetimes.com/article/12311/the_girls_guide_to_staying_safe_online&lt;br /&gt;
&lt;br /&gt;
As such, we have several options available to us: We can attempt to participate online anonymously. We can use a &amp;quot;persistent pseudonym&amp;quot;.  We can identify fully with our real or legal name, or we can divide our online lives, using our real or legal name sometimes and a pseudonym at other times. The following section will explore the pros and cons of each option, so we can determine which options are best for each one of us.&lt;br /&gt;
&lt;br /&gt;
==== '''Anonymity''' ====&lt;br /&gt;
Total anonymity can be both isolating and difficult to maintain, but is useful in settings where we don't need to gain other people's trust, when there are few or no people we can trust, or when we don't want to expose others in our life to risks. &lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in certain specific situations, such as researching or participating in message boards about health issues, or when sharing sensitive information. We may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
On anonymity, Vani, a human rights activist, writes: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”. [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity speaks of their participation on social networks anonymously]&lt;br /&gt;
&lt;br /&gt;
But while anonymity is a good option in many situations, it can also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely: “Anonymity also isolates you”, a blogger writes. “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
Anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. When we adopt anonymity as a strategy we may use pseudonyms, but these pseudonyms are not used across different networks or social domains, and some may only be used once and then discarded. For more information on how to be anonymous online, see '''Anonymizing tools'''.&lt;br /&gt;
&lt;br /&gt;
==== '''Persistent Pseudonymity''' ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves using a pseudonym consistently over a period of time. &lt;br /&gt;
&lt;br /&gt;
The Oxford English Dictionary defines a pseudonym as &amp;quot;a fictitious name, especially one used by an author.&amp;quot; In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. &lt;br /&gt;
&lt;br /&gt;
Jillian C. York, in a blog post for the Electronic Frontier Foundation, writes: &amp;quot;There are myriad reasons why individuals may wish to use a name other than the one they were born with. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent discrimination or they may use a name that’s easier to pronounce or spell in a given culture.&amp;quot;&lt;br /&gt;
https://www.eff.org/deeplinks/2011/07/case-pseudonyms&lt;br /&gt;
&lt;br /&gt;
Pseudonymous speech has played a critical role throughout history, says York. &amp;quot;From the literary efforts of George Eliot and Mark Twain to the explicitly political advocacy of Publius in the Federalist Papers or Junius' letters to the Public Advertiser in 18th century London, people have contributed strongly to public debate under pseudonyms and continue to do so to this day.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity,&amp;quot; which typically means using your legal name or the name by which you are commonly known. This policy has caused some users, such as a group of drag performers in California, to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that a risk of doing so is being reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is using a name-shaped pseudonym.&lt;br /&gt;
https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers us '''visibility'''. Visibility allows us to network with others, and by pinning our voice to a particular name we can develop an '''online reputation'''. An online reputation allows others to decide whether we are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to our legal identity, or not. The choice to connect our online reputation to our &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== '''Collective Identity''' ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. This could mean a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity. &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice we make, what is important is that we keep our domains effectively separated. &lt;br /&gt;
&lt;br /&gt;
No matter how many domains we identify in our digital life, and how many corresponding identities we create, on the internet every identity - even the one bearing our real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means that you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you; gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' can be beneficial at times, but can also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': few opportunities to gain trust and reputation, or to network with others.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': difficult; requires caution. Might also require the use of anonymisation tools (for example Tor.)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonym could be linked to our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify us across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if we are also using our real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': possible exposure of our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
=== '''4. Creating a new online identity''' ===&lt;br /&gt;
&lt;br /&gt;
==== '''What’s in a name?''' ====&lt;br /&gt;
&lt;br /&gt;
The practice of naming varies greatly from one culture to another. While names, in one form or another, have existed across cultures for milennia,  the concept of a &amp;quot;legal name&amp;quot; is a fairly new one. &lt;br /&gt;
&lt;br /&gt;
Different countries regulate the practice of naming in different ways; for example, in Morocco, names must be chosen from a government-approved list, while in Germany a name must be clearly reflective of the baby's gender. &lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgement on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If we want to use commercial social networks, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that we use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once we have decided on a name, a surname, and a username for our virtual persona, we should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if we wish to develop our own reputation, we don’t want to be confused with someone else, especially if they don’t share our views of the world!&lt;br /&gt;
&lt;br /&gt;
==== '''Writing our own story''' ==== &lt;br /&gt;
&lt;br /&gt;
The practice of “story telling” (and of creating a social mask, for that matter) is an old one, and creating a new persona with a story makes it a lot easier to maintain the role. &lt;br /&gt;
&lt;br /&gt;
We can base our story on a “known” person’s story, a superhero, a fictional character from our favourite novel, or adopt a “group identity” like Anonymous/Anonymiss or the Guerrilla Girls. If we feel particularly inspired, we can invent a new story.&lt;br /&gt;
&lt;br /&gt;
The main point is that when we create an identity we should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: [[Roleplay]]&lt;br /&gt;
&lt;br /&gt;
==== '''Creating a credible persona''' ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If we keep all our normal identifying traits - such as our gender, job, attitude or the way we write - it might be possible for someone to connect the dots and connect our pseudonymous personas with our real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': One of the things to consider is our '''linguistic fingerprint'''. This could be identified through a so-called &amp;quot;stylometric analysis&amp;quot; using tools that are increasingly usable, even for non-experts, that make it possible to identify the author of a particular text.  We can, for example, give away our real identity through our particular way of writing certain words, our typical typos, and our style and tone.  To change this, we can start by using a spell-checker in our word processor to check for consistent typos. We could also think about adopting a different writing attitude. To keep it simple, we could adopt one simple rule for each persona, e.g. making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks, or a spelling criminal, always putting apostrophes in the wrong place or mistyping words. What we decide to do with our writing style should match the character we choose for our new identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': To be sure that our pseudonymous avatar cannot be tracked back to us, our persona should have a job that is different from ours, but not so different that we don’t know anything about that field: for example, they shouldn’t be a surgeon if we don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select our persona's skills and the main topics they focus on and write about. These can, of course, overlap - for example a journalist who writes about national politics may have an alternative identity that talks about national politics as well, but only casually (and their main interest will be something different, like carpentry or feminism or food).&lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': As for psychological attitude, a good rule of thumb is to give our persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, we are able to weather the strikes and even have some fun in the process. For example, if we have a very strong sense of humour, we could choose a severe lack of humour as our persona's biggest weakness, so that if that weakness comes under attack we can enjoy impersonating a humourless persona without really being psychologically harmed. &lt;br /&gt;
&lt;br /&gt;
What is most important is to remember that on the internet, each one of our identities - even the one connected to our real name - is a “virtual” identity, and it is always better to decide what character traits we want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for our “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for our identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
==== '''Creating online profiles''' ====&lt;br /&gt;
&lt;br /&gt;
Once we have created several personas, it's important keep them separate in both our physical and digital lives. While keeping notes on our identities might help ensure that we remember our story, there are technical measures we can take to make sure that our profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social network accounts''' for each of our identities. A good rule of thumb is to always use different apps for each account/identity and, if possible, to separate our identities per device or operating system (see '''6. A different machine for each identity''').&lt;br /&gt;
&lt;br /&gt;
==== Creating separate browser profiles and mailboxes ====&lt;br /&gt;
&lt;br /&gt;
''Browser profiles:'' To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles  . For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
&lt;br /&gt;
''Mailboxes:'' When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
===='''Disposable email addresses''' ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains we need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all we need is a '''disposable email address''' that we only need to use once or few times, for example for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if we decide to have just one identity online, using disposable email addresses prevents sites from building up a history of our activities and ensures that if that account gets compromised we can simply delete it and create a new one, keeping our digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are:''' '''https://anonbox.net'''&amp;lt;nowiki/&amp;gt;''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': Making the process of creating a disposable account easier, '''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': We can also make use of existing fake or disposable email accounts. '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
==== '''Mail aliases''' ====&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to our main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised we can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill our main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org), two secure, autonomous servers that are particularly focused on the right to privacy and anonymity.&lt;br /&gt;
&lt;br /&gt;
==== '''Managing our identities on social networks''' ====&lt;br /&gt;
&lt;br /&gt;
Note: When we use social networking platforms, we should always access them with a secure HTTPS connection. &lt;br /&gt;
&lt;br /&gt;
* When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?)&lt;br /&gt;
&lt;br /&gt;
*Also be very careful about the''' profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for us in that social network, regardless of our privacy settings.&lt;br /&gt;
&lt;br /&gt;
* Make sure your contacts do not overlap with your other identities, and to make sure your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
* Most social networking platforms will display your location where they can. This function is generally provided when we interact with the platform using a GPS-enabled phone, but it can also happen if we are connecting from other devices - for example the network our computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
* Photos and videos can also reveal a lot of information without you realising it. Many cameras will embed metadata into your photos, which can include the date, time and location of the photo, camera type, etc. Photo and video sharing sites may publish this information when we upload content to their sites.&lt;br /&gt;
&lt;br /&gt;
* If we access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
* Publish from your various identities at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read:https://www.facebook.com/help/389849807718635  . Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
*  It can be a good idea to follow, from our pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance our real identity from our pseudonymous identities, we can also write (and hashtag on Twitter) posts under our pseudonymous profiles about events that we are not attending, especially if they are taking place far away from us. It can also be fun to publish and then delete posts that look like we have exposed our identity, so as to further confuse anyone who may try to unmask us. &lt;br /&gt;
&lt;br /&gt;
* Whatever social networking platform we decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
==== '''Alternative social networks''' ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if our aim is to publicise as widely as possible an event we are organizing or a project we are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close our accounts if they find that our contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If we add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to our data, the best solution is to limit the use of commercial social networking platforms to specific projects we want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
* Social networking platform '''Ello''' explicitly states in its manifesto that “You are not a product”. It also does not require &amp;quot;real names&amp;quot; - a rarity amongst commercial social networks. It's important to be aware, however, that Ello is still a commercial project&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)] and '''Crabgrass '''(https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so we way wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, we should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (eg related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, How is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can we choose to share our videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of our activity and information?&lt;br /&gt;
&lt;br /&gt;
==== '''Creating a blog or website''' ====&lt;br /&gt;
Writing from our social networking accounts - especially if we have found a more privacy-friendly option - may be all we need to voice our opinions and to interact with a given network of people (or with several networks, if we are using different identities online). On the other hand, we may want a more independent platform to spread our ideas, plans or creations. For this we can create a website or a blog.&lt;br /&gt;
&lt;br /&gt;
* Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com). &lt;br /&gt;
&lt;br /&gt;
* Based on Wordpress, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org/ http://noblogs.org) and Nadir’s '''BlackBlogs '''– (http://blackblogs.org/ http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see &amp;lt;nowiki/&amp;gt;https://www.autistici.org/en/links.html &amp;lt;nowiki/&amp;gt;and &amp;lt;nowiki/&amp;gt;https://blackblogs.org/policy &amp;lt;nowiki/&amp;gt;respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
* If we want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, we can create our own website. For this we need to get some space in a server through a webhosting service. There are many webhosting services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
* If we want to use our own '''domain''' name, bypassing payments and identifications may get difficult unless we use Bitcoin or another anonymous payment system. The personal data we will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, we can register our domain with the data of an association and use a prepaid credit card that is not connected to our own data (if available in our country). Alternatively, we can use a registrar like Gandi.net ([https://www.gandi.net/ https://www.gandi.net]) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
=== '''5. Managing collective online identities''' ===&lt;br /&gt;
&lt;br /&gt;
==== '''Collective virtual personas''' ====&lt;br /&gt;
&lt;br /&gt;
General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power.&lt;br /&gt;
&lt;br /&gt;
If we want to adopt a collective identity, we can adopt one that already exists, like Anonymous/Anonymiss, or create a new one that we can then share. &lt;br /&gt;
 &lt;br /&gt;
* A very interesting study on collective identity is anthropologist Gabriella Coleman’s book ''Hacker, Hoaxer, Whistleblower, Spy. The Many Faces of Anonymous ''(2014), based on an anthropological research on how Anonymous became a well-known and powerful collective identity with multiple faces and attitudes.&lt;br /&gt;
&lt;br /&gt;
* In her PhD dissertation ''Networked Disruption. Rethinking Oppositions in Art, Hacktivism and the Business of Social Networking ''(2011), Tatiana Bazzichelli describes how multiple identities have been used to disrupt the fundamental notions of power and hegemony on which Western culture is based, and how this works in the web today.&lt;br /&gt;
&lt;br /&gt;
==== '''Managing collective identities... or simple collective accounts''' ====&lt;br /&gt;
&lt;br /&gt;
While the collaboration of many individuals can help create a rich collective identity, managing a collective project may have some security and technological challenges we should keep in mind.&lt;br /&gt;
&lt;br /&gt;
Since a single weak link in a security chain can break the entire system, our security and anonymity depend on the precautions each member of our group takes. We may decide that we don’t want to be absolutely anonymous; that our close friends can know about our collective activities. The degree of security we may want to attain for our group depends on the possible threats we face and on our adversaries’ power and skills. &lt;br /&gt;
&lt;br /&gt;
Nonetheless, there are some important things we don't want want to lose, like the password to our collective mailbox or to our group’s social networking accounts. If we decide that we are going to share those passwords with the whole group, each member needs to be trained on how to store a password securely. &lt;br /&gt;
&lt;br /&gt;
To minimise this kind of risk, we should try to use services that provide for different accounts and passwords whenever possible. For example, instead of using a single mailbox, we may create a mailing list that all the group members subscribe to. If we allow non-subscribed people to write to it, each group member will be able to read that e-mail in their own mailbox rather than in a collective one with a dangerously shared password. &lt;br /&gt;
&lt;br /&gt;
Similarly, if coordination really needs to happen through Facebook, it is much better to share information in a dedicated group rather than do everything within a collective account.&lt;br /&gt;
&lt;br /&gt;
=== '''6. A different machine for each identity''' ===&lt;br /&gt;
&lt;br /&gt;
If we use the same operating system for our several identities, no matter how carefully we separate our profiles we can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile we have assigned to our true identity, or get infected by a malware that allows our attacker to monitor everything we do online, with all our identities.&lt;br /&gt;
&lt;br /&gt;
Both risks can be limited by using a virtual machine for each of our domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on our physical computer. We can think of a VM as a &amp;lt;em&amp;gt;computer within a computer&amp;lt;/em&amp;gt;. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For our purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== '''Whonix: compartmentalizing our identities through a secure virtual machine''' ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix '''(https://www.whonix.org) is an operating system that aims at protecting our anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. &lt;br /&gt;
&lt;br /&gt;
Whonix’s website offers a wide documentation, ranging from very clear installation and usage instructions to thorough recommendations on security and the risks we may run: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== '''Tails: a live system that leaves no traces''' ====&lt;br /&gt;
&lt;br /&gt;
Using virtual machines, Whonix in particular, is a good idea if we have our own computer where we are free to install whatever we want, especially if it is a powerful machine. But if we use an older box or just connect to the internet from cybercafes, installing a virtual machine becomes unsustainable. In this case, we may turn to a live Linux distribution, a USB-stick with a Linux operating system installed on it that runs in the computer we are using as soon as we switch it on.&lt;br /&gt;
&lt;br /&gt;
A particularly secure live distribution focused on security and anonymity is '''Tails''', or '''The Amnesic Incognito Live System''', a free and open-source Debian-based Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections.&lt;br /&gt;
&lt;br /&gt;
When we launch Tails, we have a complete operating system that, just as Whonix, comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, we can access the internet, communicate, and do all we need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless we ask it to do so.&lt;br /&gt;
&lt;br /&gt;
When using different identities, it is not advisable to use the same Tails session to perform two tasks or endorse two contextual identities that we really want to keep separate from another, for example hiding our location to check our personal email and publishing a document on our pseudonymous blog.&lt;br /&gt;
&lt;br /&gt;
The first reason is that Tor tends to reuse the same circuits, for example amongst a same browsing session, making it easier for a powerful adversary to correlate the several browsing requests as part of a same circuit and possibly made by a same user. Second, in case of a security hole or a misuse in using Tails or one of its applications, information about our session could be leaked. That could reveal that the same person was behind the various actions made during the session.&lt;br /&gt;
&lt;br /&gt;
T''he solution to both threats is to shut down and restart Tails every time we are using a new identity''.&lt;br /&gt;
&lt;br /&gt;
==== '''Security by isolation: Qubes OS''' ====&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting us; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, the most pessimistic, and realistic, approach is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that we want to secure.&lt;br /&gt;
&lt;br /&gt;
In order to implement security by isolation, for instance, '''Whonix''' is divided into two parts: Whonix-Workstation, which is the system we access for our work, and Whonix-Gateway, which routes all internet traffic through Tor and, by being isolated from the workstation, averts many threats posed by malware, misbehaving applications, and user error.&lt;br /&gt;
&lt;br /&gt;
But while Whonix needs a virtual machine to run on and its main focus is anonymization, there is an operating system that has security by isolation as its main purpose and that can make life a lot easier to someone who manages several social domains and/or identities in her digital life.&lt;br /&gt;
&lt;br /&gt;
Called '''Qubes OS''' – https://www.qubes-os.org – and developed by computer security researcher Joanna Rutkowska, Qubes is a free and open-source security-oriented operating system based on '''Fedora''', a Linux distribution, and '''Xen''', a virtual machine monitor (or hypervisor), that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things we do on our computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, we can do everything on a single physical computer without having to worry that one successful cyberattack harms our whole system, potentially revealing all the connections among our several identities.&lt;br /&gt;
&lt;br /&gt;
A plus of Qubes OS for the purposes of multiple identities management is its user-friendly window manager, that assigns a different colour to each domain. Thus, the colour of the frame makes each window clearly recognizable as belonging to the domain corresponding to that colour and prevents potential human mistakes in the management of our identities.&lt;br /&gt;
&lt;br /&gt;
==== '''Tails, Whonix, Qubes OS: how to choose''' ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described in the last few paragraphs – Whonix, Tails and Qubes OS – all allow us to use a completely separate operating system for managing our alternate identities, and can be quite useful to make sure that we don’t reveal our true identity while we use the anonymous one(s). Still better, if we can afford it, would be to have a different machine for each of our identities, as well as an air-gapped one to store our most sensitive data. Of course, the choice depends on the resources we can dedicate to securing our digital life and on our threat-model, especially on the adversaries we expect to face: if we are pretty sure that in our country harassers work together with the regime to slander (or worse) people like us, we may want to be absolutely sure that none of our data is leaked and – if we have enough funds or are connected to a network of hacktivists – we may decide to ask for an expert’s help to check that we have taken all the necessary measures to keep doing an efficient work and to stop any ill-intentioned actors from tampering with our data. On the other hand, if we feel sufficiently protected by our community and/or by our government, and we expect our adversaries not to be very skilled in technological matters, perhaps all we need is to separate our browser profiles and mailboxes, to use a secure HTTPS connection and some basic common sense and to keep developing a network of support for vocal women online.&lt;br /&gt;
&lt;br /&gt;
If we think that using a different operating system is really necessary, or that it can be helpful to keep things logically and graphically separated (or we just want to explore all the possibilities we have for the fun of it!), we should assess our resources and our needs in order to identify the best solution for us.&lt;br /&gt;
&lt;br /&gt;
''Comparison between Tails, Whonix and Qubes Os:''&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Tails'''&lt;br /&gt;
!'''Whonix'''&lt;br /&gt;
!'''Qubes OS'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Required hardware/software'''&lt;br /&gt;
|&amp;quot;x86 compatible and/or Virtual Machines; DVD, USB stick, or SD card for booting the system&amp;quot;&lt;br /&gt;
|&amp;quot;x86 compatible pc with VirtualBox&amp;quot;&lt;br /&gt;
|&amp;quot;a powerful pc capable of running Qubes OS&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''System requirements'''&lt;br /&gt;
|&amp;quot;lowest&amp;quot;&lt;br /&gt;
|&amp;quot;high&amp;quot;&lt;br /&gt;
|&amp;quot;highest&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Difficulty to install'''&lt;br /&gt;
|&amp;quot;medium&amp;quot;&lt;br /&gt;
|&amp;quot;medium&amp;quot;&lt;br /&gt;
|&amp;quot;easy&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Difficulty to configure'''&lt;br /&gt;
|&amp;quot;low&amp;quot;&lt;br /&gt;
|&amp;quot;medium&amp;quot;&lt;br /&gt;
|&amp;quot;high&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Learning curve'''&lt;br /&gt;
|&amp;quot;low&amp;quot;&lt;br /&gt;
|&amp;quot;low&amp;quot;&lt;br /&gt;
|&amp;quot;high&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Anonymization by default'''&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|&amp;quot;no&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Security by isolation'''&lt;br /&gt;
|&amp;quot;no&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Pre-installed applications'''&lt;br /&gt;
|&amp;quot;nice selection&amp;quot;&lt;br /&gt;
|&amp;quot;not many&amp;quot;&lt;br /&gt;
|&amp;quot;not many, and some, like Tor or Virtualbox cannot be installed at all&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Persistence'''&lt;br /&gt;
|&amp;quot;no (available option)&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
As we can see in the table above, '''Tails''' just needs a normal computer and a DVD or a bootable device to launch the system, but installing the system in this device, as well as having the DVD, USB stick or SD card actually boot in the computer we are using, can be tricky, and we may need some external help. After that, though, using Tails is pretty easy, and if what we need to do with our alternate persona needs a focus on ''anonymization'', then it may be worthwhile to overcome the initial obstacle. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. One particular advantage of Tails is that after we have switched the computer off, we leave no traces and everything we have done vanishes into thin air. But if on the other hand we need ''persistence'', i.e. we want to keep some files we have created or downloaded in our USB stick or we have changed some system settings and want to keep them also in the future, we need to enable this option when we start the system. Last but not least, Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what we need is both ''anonymity'' and ''security by isolation'' and we have a good machine – https://www.whonix.org/wiki/System_Requirements – where we can run Virtualbox, installing '''Whonix''' in one or more virtual machines, according to the number of our alternative identities, seems a good solution that caters to all our needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if we want to keep all our activities inside our own computer without having to install anything else and if what we are trying to do is to effectively ''separate'' our identities rather than anonymize our activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if we feel that we really need to protect ourselves against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protects us from every threat, and we shouldn’t look at them as a magic potion that will make us invulnerable. Nevertheless, by using any of them, according to our needs and resources, we will raise the level of effort that an attacker will need to harm us, thus making an attack less likely.&lt;br /&gt;
&lt;br /&gt;
For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Step_1_Control_content_metadata&amp;diff=9477</id>
		<title>Step 1 Control content metadata</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Step_1_Control_content_metadata&amp;diff=9477"/>
				<updated>2018-04-05T14:25:46Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: Floriana moved page Step 1 Control content metadata to Step 1 over redirect&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Step 1]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Step_1&amp;diff=9475</id>
		<title>Step 1</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Step_1&amp;diff=9475"/>
				<updated>2018-04-05T14:23:53Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: changed title of subsection&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Understanding and minimising our digital shadows ===&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. Unfortunately, the internet has also become a space where people who challenge the dominant discourse often find themselves under attack. These attacks can be very personal - enabled by the fact that there is often a lot of personal information about us on the internet. &lt;br /&gt;
&lt;br /&gt;
To strengthen our defences against these kinds of attacks, it’s a good idea to start by our assessing our '''digital shadows'''. These shadows - can tell a story about us: who we are, where we live and hang out, what we are interested in, and who our friends and colleagues are. &lt;br /&gt;
&lt;br /&gt;
This can expose us to several threats. In particular, it is the publicly available traces we leave behind that expose us to online harassment. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' we can use to shape or control our digital shadows, to increase our privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing our activity online.  &lt;br /&gt;
&lt;br /&gt;
Some examples of these include controlling the amount of data we give away by consciously stripping valuable information from content and metadata; trying the art of self doxxing; and thinking about ways to play with and break up our online identity.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== '''What is a digital shadow?''' ====&lt;br /&gt;
&lt;br /&gt;
Our digital shadows can be defined as the stories data tells about us. These digital shadows are created by trillions of bits of data, digital traces we leave everyday when we connect to the Internet, our mobile phone and online services. Our digital shadows have a life of their own, are affected by others and change in unpredictable ways. Our digital shadows grow continuously, can be permanent and we have little control over them. These traces are a spectre of our past and present activities, which melt together in a permanent and ever-changing profile.&lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' The devices and the software we use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data about us. These bits of data can include our name, location, contacts, pictures, messages, tweets and likes, but also the brand of our computer, length of our phone calls and information about which websites we visit. These data traces can be put out there by ourselves as well as other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' In some cases we '''actively '''share data – for example when we share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about us, by tagging us in pictures, mentioning us in tweets or simply by communicating with us. In other cases, we give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
Our browsing habits and IP address are shared when we visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites we visit, and the information shared is collected for a wide range of purposes,  from website analytics to advertising. Our mobile phone apps also collect data on us without our active knowledge or consent – for example, the photos we take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow us as we move from one service to another - from our internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in our readers to publishing pictures from the latest protest we have covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of our messages, blogs, tweets and phone calls; it is our pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables our email to be delivered, help find files on our computer and permit mobile communication. Metadata can be our email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognized by computers.&lt;br /&gt;
&lt;br /&gt;
==== '''Who is collecting our data, and why?''' ====   &lt;br /&gt;
&lt;br /&gt;
We might wonder about the importance of one picture or one message, or think there is so much data out there that nobody knows what to do with it. However, data collection and data analysis has become very sophisticated. &lt;br /&gt;
&lt;br /&gt;
The data traces you leave are collected, analysed and sorted by various parties to create digital shadows, or '''profiles'''. Every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by companies, governments and individuals for a variety of purposes. It can be bought and sold; it can be used to control; or it can be used to create harassment strategies.&lt;br /&gt;
&lt;br /&gt;
Our digital shadows or profiles can be used to gain insight into who we are, what we do and where we have been. This data can then be used to make predictions on what we might do or where we might be in future. For example, if someone knows that we are an outspoken blogger on gender issues in country x, they know that we will probably be present at a conference on blogging and women held in that country. Profiles can also give potential harassers the ability to harass us across different platforms.  &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to our digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. We can't know exactly what is happening to our digital shadow, and that itself is a problem. &lt;br /&gt;
&lt;br /&gt;
However, there are tools and tactics we can use to manage our digital shadows and to limit their ramifications in terms of profiling and surveillance. This will be discussed in the rest of this section.&lt;br /&gt;
&lt;br /&gt;
==== '''Exploring our own digital shadow''' ====&lt;br /&gt;
&lt;br /&gt;
As we mentioned before, anyone can potentially access our digital shadow – including communications service providers, law enforcement agencies and  companies, as well as groups and individuals running their own servers.  We cannot know precisely what happens to our digital shadow and that itself is a problem. But there are tools and tactics to manage our digital shadow and to limit its ramifications in terms of  profiling and surveillance.&lt;br /&gt;
&lt;br /&gt;
Some good places to start are:&lt;br /&gt;
&lt;br /&gt;
* Exploring our individual digital shadow with '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – a tool launched by Tactical Tech, accompanied by a website that offers a lot of tips on how to protect our privacy and control our digital shadow: https://myshadow.org&lt;br /&gt;
* Identifying and materialising social networks across our online and physical activities: John Fass, researcher and designer at the Royal College of Art, has created some activities to materialise our social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* Seeing through the eyes of our mobile phone by installing a tool called '''[https://openpaths.cc/ openpaths.cc]'''. Some of our apps can see the same things. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone we can change the permissions for each app under its privacy setting.&lt;br /&gt;
&lt;br /&gt;
==== '''Control the content and metadata you share''' ====&lt;br /&gt;
&lt;br /&gt;
The good news is that we can partly control what content and metadata we give away. &lt;br /&gt;
&lt;br /&gt;
When we publish content on the web, it is always a good idea to ask ourselves if what we are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to our personal lives, the names we mention or the images we upload may contribute to a picture about who we are, what we are doing, where we are doing it and so on. This could be used by people who wish to target us. &lt;br /&gt;
&lt;br /&gt;
This does not mean that we should silence ourselves – by taking some basic measures, we can limit our risks by increasing the level of the effort that would be required to attack us or our contacts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about our life''', we can use private profiles that can only be accessed by selected contacts. When using private profiles on commercial social media, we should be aware of the regular changes to the privacy policies of that platform. This can have an impact on how “private” our profiles are. There have been cases where privacy settings have been changed, exposing pictures, content and the conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web and on publicly accessible social network profiles, we should ask ourselves if the information we spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to post information on public events only after they are finished.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices.  https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* '''Use strong passwords''', and '''use different passwords''' for each web service you use - if you you the same password for multiple services and someone intercepts your password for one of these services, they could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not usingy our real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or we can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing hidden data from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or Adblock Plus, as well as by monitoring our privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like our IP address''', thereby increasing our anonymity online.&lt;br /&gt;
&lt;br /&gt;
===='''Social domains'''====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”.&lt;br /&gt;
&lt;br /&gt;
Each of us belongs to several '''social domains''' - our work or advocacy networks, our family networks, friends, and sports teams. &lt;br /&gt;
&lt;br /&gt;
Some of these networks may be more secure than others. For example, we may tend to have a more secure communication practices for our work or advocacy activities, but less secure practices for interacting with friends on a social network. Areas where these domains intersect can turn into a threat to our security. &lt;br /&gt;
&lt;br /&gt;
If we use a single identity in all our domains, it becomes easier to gather information about us and to identify our vulnerabilities. For example, if we reveal in a social network that we like a particular kind of game and that we download files with a p2p program like Emule, an attacker who wants to investigate our work or advocacy activities might trick us into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This attacker is interested in our advocacy activities, but knows that we have increased privacy and security measures for that part of our lives. The attacker also knows that our love of games is a digital weak spot as this network is not encrypted. Thus the attacker can exploit this part of our lives to gain access to another, more secure part. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if our work identity and our Emule profile can be connected to the same person; and this is why separating our social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
==== '''Self-Doxing''' ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' (also written as &amp;quot;doxxing&amp;quot;, or &amp;quot;D0xing&amp;quot;, a word derived from &amp;quot;Documents&amp;quot;, or &amp;quot;Docx&amp;quot;) describes tracing or gathering information about someone using sources that are freely available on the internet. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. &lt;br /&gt;
&lt;br /&gt;
Doxing is premised on the idea that &amp;quot;The more you know about your target, the easier it will be to find his or her flaws”.&lt;br /&gt;
&lt;br /&gt;
Harassers and stalkers use several tools and techniques to gather information about their targets, but since these tools and techniques are mostly public and easy to use, we can also use them ourselves. &amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more than is immediately obvious about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, yellow pages, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists; or looking for images that the target has shared (and for instance may have also published in another, more personal, account). But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
We can use these same tools to explore what can be easily found out about us by others. &lt;br /&gt;
&lt;br /&gt;
Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser.&lt;br /&gt;
&lt;br /&gt;
* Useful tips on how to self-dox are available [[self-dox|here]]&lt;br /&gt;
* For more about (self-)doxing tools and techniques, visit: https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* A useful (and creepy!) tool to learn what traces we have left behind in our Facebook account is Ubisoft’s '''Digital Shadow''', a Facebook app which illustrates what third parties can know about us through our Facebook profiles: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== '''Can we remove our digital past? Creating new identities''' ====&lt;br /&gt;
''&lt;br /&gt;
&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' &lt;br /&gt;
&lt;br /&gt;
We may think that deleting certain sensitive data from social networks and web services may be enough to protect ourselves, but metadata cannot be deleted as easily.  And using just one identity through our whole life - in all our work and personal domains - creates a bulk of information that could be used to profile or attack us. &lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one or several new ones - one for each of our social domains. We might also choose to use our real identity in some areas, and our new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When we create a new identity, we should select the contacts for each one carefully, and avoid sharing contacts with other identities we use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* It's important to make sure that our various identities are not linked in any way to each other, or to our real identity. Remember that some of these connections can be tenuous: for example, did you sign up for a new, pseudonymous Gmail account using your real phone number? &lt;br /&gt;
&lt;br /&gt;
* Treating each of our extra identities as potentially disposable can be useful, as they can be discarded easily if it is compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable identities can be created for new acquaintances where appropriate – introductory profiles we can use to get to know somebody before we include them in a more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== '''Deleting identities''' ====&lt;br /&gt;
&lt;br /&gt;
If we decide to separate our domains by creating multiple identities, one of the first decisions we should make is whether to delete or keep the identity or identities that we already have.  &lt;br /&gt;
&lt;br /&gt;
To do this, we can start by investigating the traces of our existing identity or identities. (for methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
If we want to delete existing accounts:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitate the process of deleting social network profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
==== '''Mapping our social domains''' ====&lt;br /&gt;
To separate our social domains, it's helpful to first map them out and identify which ones could expose us most to cross-domain attacks. &lt;br /&gt;
&lt;br /&gt;
We can do this by thinking about our different activities and networks, and reflecting how sensitive each of these is. This will enable us to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
Partitioning one’s digital life into separate social (or &amp;quot;security&amp;quot;) domains requires some thinking. &lt;br /&gt;
&lt;br /&gt;
Polish computer security researcher Joanna Rutkowska has worked extensively on this, to the point that she developed  a security-oriented Linux distribution based on the concept of “security by isolation” (called Qubes OS). In this system, each social domain is isolated in a separate virtual machine. While Rutkowska's scheme is quite sophisticated and focused on her operating system, it can give us interesting insights on how to start thinking about separating our domains. &lt;br /&gt;
&lt;br /&gt;
The three basic domains Rutkowska identifies for herself are “work”, “personal”, and “red” (the untrusted, insecure area).&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain includes her work email, where she keeps her work PGP keys, where she prepares reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations. To add to this, she has a “work-admin” and a “work-blog” domain, in order to get a further level of security for managing her company’s servers and for writing on her blog.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes all the non-work-related stuff - such as personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the communication with her partner when she is away from home. The couple uses encrypted mails to communicate, and she has separate PGP keys for this purpose.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain, on the other hand, is totally untrusted. This is where her disposable identities or profiles belong. Rutkowska uses this domain to do everything that doesn’t fit into other domains, and which doesn’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
* Besides these three main domains, Rutkowska has several other separate domains. One is dedicated to '''shopping''', for accessing e-commerce sites. What defines this domain is access to her credit card numbers and her personal address (for shipping). Then there is the '''vault''' domain, the ultimately trusted place where she generates and keeps all her passwords (using KeePassX) and master GPG keys. Finally, she has a domain for all the Qubes development (&amp;quot;qubes-dev&amp;quot;), one for '''accounting''', and another one for '''work archives'''.&lt;br /&gt;
&lt;br /&gt;
Of course we don’t have to separate our domains in such a complex way, and using Qubes Os to keep them separated is just one solution – and one that requires a powerful machine to run on. Yet Rutkowska’s reflections on domain mapping can be an enlightening starting point to analyse our activities, and to separate our social domains for enhanced security.&lt;br /&gt;
&lt;br /&gt;
* Joanna Rutkowska’s article on security domains can be found here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
=== '''2. Assessing risks and potentials: how to choose which online identity fits our purpose''' ===&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;'''Real&amp;quot; or virtual identity?''' ====&lt;br /&gt;
&lt;br /&gt;
Once we have identified our different social domains and the digital activities and contacts that go with them, what we need to do is decide if we want to differentiate our identities accordingly, or if we'd rather stick to our official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
We may want to keep our work connected to our legal or &amp;quot;real&amp;quot; identity, or think that our activism should be anonymous, but these are decisions that need to be thought about carefully.&lt;br /&gt;
&lt;br /&gt;
For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social networks, and her online activist identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known in this context?&lt;br /&gt;
&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known in this context?&lt;br /&gt;
&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once we have '''assessed our risk,''' we can then consider different strategies for separating our identities online. &lt;br /&gt;
&lt;br /&gt;
For more on assessing risk, visit: https://ssd.eff.org/en/module/introduction-threat-modeling  &lt;br /&gt;
&lt;br /&gt;
==== '''Strategies for separating identities online''' ====&lt;br /&gt;
&lt;br /&gt;
'''strategies''' for maintaining separate identities can range range full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding talks about her decision to start writing under her real name, dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”. &lt;br /&gt;
&lt;br /&gt;
Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is dangerous one.&lt;br /&gt;
http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name&lt;br /&gt;
&lt;br /&gt;
In &amp;quot;The Girl's Guide to Staying Safe Online,&amp;quot; Sady Doyle writes that while becoming visible &amp;quot;creates a specific vulnerability&amp;quot;, giving up on our online activities is exactly what the misogynists and harassers expect from us - and so the best way to ‘stay safe’ online may simply be to stay online. &amp;quot;After all: If there’s no one left willing to complain about the harassment, what are the odds that it’s going to change?”&lt;br /&gt;
http://inthesetimes.com/article/12311/the_girls_guide_to_staying_safe_online&lt;br /&gt;
&lt;br /&gt;
As such, we have several options available to us: We can attempt to participate online anonymously. We can use a &amp;quot;persistent pseudonym&amp;quot;.  We can identify fully with our real or legal name, or we can divide our online lives, using our real or legal name sometimes and a pseudonym at other times. The following section will explore the pros and cons of each option, so we can determine which options are best for each one of us.&lt;br /&gt;
&lt;br /&gt;
==== '''Anonymity''' ====&lt;br /&gt;
Total anonymity can be both isolating and difficult to maintain, but is useful in settings where we don't need to gain other people's trust, when there are few or no people we can trust, or when we don't want to expose others in our life to risks. &lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in certain specific situations, such as researching or participating in message boards about health issues, or when sharing sensitive information. We may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
On anonymity, Vani, a human rights activist, writes: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”. [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity speaks of their participation on social networks anonymously]&lt;br /&gt;
&lt;br /&gt;
But while anonymity is a good option in many situations, it can also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely: “Anonymity also isolates you”, a blogger writes. “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
Anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. When we adopt anonymity as a strategy we may use pseudonyms, but these pseudonyms are not used across different networks or social domains, and some may only be used once and then discarded. For more information on how to be anonymous online, see '''Anonymizing tools'''.&lt;br /&gt;
&lt;br /&gt;
==== '''Persistent Pseudonymity''' ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves using a pseudonym consistently over a period of time. &lt;br /&gt;
&lt;br /&gt;
The Oxford English Dictionary defines a pseudonym as &amp;quot;a fictitious name, especially one used by an author.&amp;quot; In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. &lt;br /&gt;
&lt;br /&gt;
Jillian C. York, in a blog post for the Electronic Frontier Foundation, writes: &amp;quot;There are myriad reasons why individuals may wish to use a name other than the one they were born with. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent discrimination or they may use a name that’s easier to pronounce or spell in a given culture.&amp;quot;&lt;br /&gt;
https://www.eff.org/deeplinks/2011/07/case-pseudonyms&lt;br /&gt;
&lt;br /&gt;
Pseudonymous speech has played a critical role throughout history, says York. &amp;quot;From the literary efforts of George Eliot and Mark Twain to the explicitly political advocacy of Publius in the Federalist Papers or Junius' letters to the Public Advertiser in 18th century London, people have contributed strongly to public debate under pseudonyms and continue to do so to this day.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity,&amp;quot; which typically means using your legal name or the name by which you are commonly known. This policy has caused some users, such as a group of drag performers in California, to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that a risk of doing so is being reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is using a name-shaped pseudonym.&lt;br /&gt;
https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers us '''visibility'''. Visibility allows us to network with others, and by pinning our voice to a particular name we can develop an '''online reputation'''. An online reputation allows others to decide whether we are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to our legal identity, or not. The choice to connect our online reputation to our &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== '''Collective Identity''' ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. This could mean a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity. &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice we make, what is important is that we keep our domains effectively separated. &lt;br /&gt;
&lt;br /&gt;
No matter how many domains we identify in our digital life, and how many corresponding identities we create, on the internet every identity - even the one bearing our real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means that you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you; gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' can be beneficial at times, but can also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': few opportunities to gain trust and reputation, or to network with others.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': difficult; requires caution. Might also require the use of anonymisation tools (for example Tor.)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonym could be linked to our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify us across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if we are also using our real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': possible exposure of our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
=== '''4. Creating a new online identity''' ===&lt;br /&gt;
&lt;br /&gt;
==== '''What’s in a name?''' ====&lt;br /&gt;
&lt;br /&gt;
The practice of naming varies greatly from one culture to another. While names, in one form or another, have existed across cultures for milennia,  the concept of a &amp;quot;legal name&amp;quot; is a fairly new one. &lt;br /&gt;
&lt;br /&gt;
Different countries regulate the practice of naming in different ways; for example, in Morocco, names must be chosen from a government-approved list, while in Germany a name must be clearly reflective of the baby's gender. &lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgement on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If we want to use commercial social networks, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that we use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once we have decided on a name, a surname, and a username for our virtual persona, we should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if we wish to develop our own reputation, we don’t want to be confused with someone else, especially if they don’t share our views of the world!&lt;br /&gt;
&lt;br /&gt;
==== '''Writing our own story''' ==== &lt;br /&gt;
&lt;br /&gt;
The practice of “story telling” (and of creating a social mask, for that matter) is an old one, and creating a new persona with a story makes it a lot easier to maintain the role. &lt;br /&gt;
&lt;br /&gt;
We can base our story on a “known” person’s story, a superhero, a fictional character from our favourite novel, or adopt a “group identity” like Anonymous/Anonymiss or the Guerrilla Girls. If we feel particularly inspired, we can invent a new story.&lt;br /&gt;
&lt;br /&gt;
The main point is that when we create an identity we should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: [[Roleplay]]&lt;br /&gt;
&lt;br /&gt;
==== '''Creating a credible persona''' ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If we keep all our normal identifying traits - such as our gender, job, attitude or the way we write - it might be possible for someone to connect the dots and connect our pseudonymous personas with our real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': One of the things to consider is our '''linguistic fingerprint'''. This could be identified through a so-called &amp;quot;stylometric analysis&amp;quot; using tools that are increasingly usable, even for non-experts, that make it possible to identify the author of a particular text.  We can, for example, give away our real identity through our particular way of writing certain words, our typical typos, and our style and tone.  To change this, we can start by using a spell-checker in our word processor to check for consistent typos. We could also think about adopting a different writing attitude. To keep it simple, we could adopt one simple rule for each persona, e.g. making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks, or a spelling criminal, always putting apostrophes in the wrong place or mistyping words. What we decide to do with our writing style should match the character we choose for our new identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': To be sure that our pseudonymous avatar cannot be tracked back to us, our persona should have a job that is different from ours, but not so different that we don’t know anything about that field: for example, they shouldn’t be a surgeon if we don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select our persona's skills and the main topics they focus on and write about. These can, of course, overlap - for example a journalist who writes about national politics may have an alternative identity that talks about national politics as well, but only casually (and their main interest will be something different, like carpentry or feminism or food).&lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': As for psychological attitude, a good rule of thumb is to give our persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, we are able to weather the strikes and even have some fun in the process. For example, if we have a very strong sense of humour, we could choose a severe lack of humour as our persona's biggest weakness, so that if that weakness comes under attack we can enjoy impersonating a humourless persona without really being psychologically harmed. &lt;br /&gt;
&lt;br /&gt;
What is most important is to remember that on the internet, each one of our identities - even the one connected to our real name - is a “virtual” identity, and it is always better to decide what character traits we want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for our “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for our identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
==== '''Creating online profiles''' ====&lt;br /&gt;
&lt;br /&gt;
Once we have created several personas, it's important keep them separate in both our physical and digital lives. While keeping notes on our identities might help ensure that we remember our story, there are technical measures we can take to make sure that our profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social network accounts''' for each of our identities. A good rule of thumb is to always use different apps for each account/identity and, if possible, to separate our identities per device or operating system (see '''6. A different machine for each identity''').&lt;br /&gt;
&lt;br /&gt;
==== Creating separate browser profiles and mailboxes ====&lt;br /&gt;
&lt;br /&gt;
''Browser profiles:'' To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles  . For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
&lt;br /&gt;
''Mailboxes:'' When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
===='''Disposable email addresses''' ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains we need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all we need is a '''disposable email address''' that we only need to use once or few times, for example for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if we decide to have just one identity online, using disposable email addresses prevents sites from building up a history of our activities and ensures that if that account gets compromised we can simply delete it and create a new one, keeping our digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are:''' '''https://anonbox.net'''&amp;lt;nowiki/&amp;gt;''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': Making the process of creating a disposable account easier, '''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': We can also make use of existing fake or disposable email accounts. '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
==== '''Mail aliases''' ====&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to our main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised we can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill our main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org), two secure, autonomous servers that are particularly focused on the right to privacy and anonymity.&lt;br /&gt;
&lt;br /&gt;
==== '''Managing our identities on social networks''' ====&lt;br /&gt;
&lt;br /&gt;
Note: When we use social networking platforms, we should always access them with a secure HTTPS connection. &lt;br /&gt;
&lt;br /&gt;
* When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?)&lt;br /&gt;
&lt;br /&gt;
*Also be very careful about the''' profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for us in that social network, regardless of our privacy settings.&lt;br /&gt;
&lt;br /&gt;
* Make sure your contacts do not overlap with your other identities, and to make sure your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
* Most social networking platforms will display your location where they can. This function is generally provided when we interact with the platform using a GPS-enabled phone, but it can also happen if we are connecting from other devices - for example the network our computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
* Photos and videos can also reveal a lot of information without you realising it. Many cameras will embed metadata into your photos, which can include the date, time and location of the photo, camera type, etc. Photo and video sharing sites may publish this information when we upload content to their sites.&lt;br /&gt;
&lt;br /&gt;
* If we access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
* Publish from your various identities at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read:https://www.facebook.com/help/389849807718635  . Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
*  It can be a good idea to follow, from our pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance our real identity from our pseudonymous identities, we can also write (and hashtag on Twitter) posts under our pseudonymous profiles about events that we are not attending, especially if they are taking place far away from us. It can also be fun to publish and then delete posts that look like we have exposed our identity, so as to further confuse anyone who may try to unmask us. &lt;br /&gt;
&lt;br /&gt;
* Whatever social networking platform we decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
==== '''Alternative social networks''' ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if our aim is to publicise as widely as possible an event we are organizing or a project we are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close our accounts if they find that our contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If we add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to our data, the best solution is to limit the use of commercial social networking platforms to specific projects we want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
* Social networking platform '''Ello''' explicitly states in its manifesto that “You are not a product”. It also does not require &amp;quot;real names&amp;quot; - a rarity amongst commercial social networks. It's important to be aware, however, that Ello is still a commercial project&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)] and '''Crabgrass '''(https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so we way wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, we should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (eg related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, How is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can we choose to share our videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of our activity and information?&lt;br /&gt;
&lt;br /&gt;
==== '''Creating a blog or website''' ====&lt;br /&gt;
Writing from our social networking accounts - especially if we have found a more privacy-friendly option - may be all we need to voice our opinions and to interact with a given network of people (or with several networks, if we are using different identities online). On the other hand, we may want a more independent platform to spread our ideas, plans or creations. For this we can create a website or a blog.&lt;br /&gt;
&lt;br /&gt;
* Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com). &lt;br /&gt;
&lt;br /&gt;
* Based on Wordpress, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org/ http://noblogs.org) and Nadir’s '''BlackBlogs '''– (http://blackblogs.org/ http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see &amp;lt;nowiki/&amp;gt;https://www.autistici.org/en/links.html &amp;lt;nowiki/&amp;gt;and &amp;lt;nowiki/&amp;gt;https://blackblogs.org/policy &amp;lt;nowiki/&amp;gt;respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
* If we want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, we can create our own website. For this we need to get some space in a server through a webhosting service. There are many webhosting services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
* If we want to use our own '''domain''' name, bypassing payments and identifications may get difficult unless we use Bitcoin or another anonymous payment system. The personal data we will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, we can register our domain with the data of an association and use a prepaid credit card that is not connected to our own data (if available in our country). Alternatively, we can use a registrar like Gandi.net ([https://www.gandi.net/ https://www.gandi.net]) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
=== '''5. Managing collective online identities''' ===&lt;br /&gt;
&lt;br /&gt;
==== '''Collective virtual personas''' ====&lt;br /&gt;
&lt;br /&gt;
General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power.&lt;br /&gt;
&lt;br /&gt;
If we want to adopt a collective identity, we can adopt one that already exists, like Anonymous/Anonymiss, or create a new one that we can then share. &lt;br /&gt;
 &lt;br /&gt;
* A very interesting study on collective identity is anthropologist Gabriella Coleman’s book ''Hacker, Hoaxer, Whistleblower, Spy. The Many Faces of Anonymous ''(2014), based on an anthropological research on how Anonymous became a well-known and powerful collective identity with multiple faces and attitudes.&lt;br /&gt;
&lt;br /&gt;
* In her PhD dissertation ''Networked Disruption. Rethinking Oppositions in Art, Hacktivism and the Business of Social Networking ''(2011), Tatiana Bazzichelli describes how multiple identities have been used to disrupt the fundamental notions of power and hegemony on which Western culture is based, and how this works in the web today.&lt;br /&gt;
&lt;br /&gt;
==== '''Managing collective identities... or simple collective accounts''' ====&lt;br /&gt;
&lt;br /&gt;
While the collaboration of many individuals can help create a rich collective identity, managing a collective project may have some security and technological challenges we should keep in mind.&lt;br /&gt;
&lt;br /&gt;
Since a single weak link in a security chain can break the entire system, our security and anonymity depend on the precautions each member of our group takes. We may decide that we don’t want to be absolutely anonymous; that our close friends can know about our collective activities. The degree of security we may want to attain for our group depends on the possible threats we face and on our adversaries’ power and skills. &lt;br /&gt;
&lt;br /&gt;
Nonetheless, there are some important things we don't want want to lose, like the password to our collective mailbox or to our group’s social networking accounts. If we decide that we are going to share those passwords with the whole group, each member needs to be trained on how to store a password securely. &lt;br /&gt;
&lt;br /&gt;
To minimise this kind of risk, we should try to use services that provide for different accounts and passwords whenever possible. For example, instead of using a single mailbox, we may create a mailing list that all the group members subscribe to. If we allow non-subscribed people to write to it, each group member will be able to read that e-mail in their own mailbox rather than in a collective one with a dangerously shared password. &lt;br /&gt;
&lt;br /&gt;
Similarly, if coordination really needs to happen through Facebook, it is much better to share information in a dedicated group rather than do everything within a collective account.&lt;br /&gt;
&lt;br /&gt;
=== '''6. A different machine for each identity''' ===&lt;br /&gt;
&lt;br /&gt;
If we use the same operating system for our several identities, no matter how carefully we separate our profiles we can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile we have assigned to our true identity, or get infected by a malware that allows our attacker to monitor everything we do online, with all our identities.&lt;br /&gt;
&lt;br /&gt;
Both risks can be limited by using a virtual machine for each of our domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on our physical computer. We can think of a VM as a &amp;lt;em&amp;gt;computer within a computer&amp;lt;/em&amp;gt;. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For our purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== '''Whonix: compartmentalizing our identities through a secure virtual machine''' ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix '''(https://www.whonix.org) is an operating system that aims at protecting our anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. &lt;br /&gt;
&lt;br /&gt;
Whonix’s website offers a wide documentation, ranging from very clear installation and usage instructions to thorough recommendations on security and the risks we may run: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== '''Tails: a live system that leaves no traces''' ====&lt;br /&gt;
&lt;br /&gt;
Using virtual machines, Whonix in particular, is a good idea if we have our own computer where we are free to install whatever we want, especially if it is a powerful machine. But if we use an older box or just connect to the internet from cybercafes, installing a virtual machine becomes unsustainable. In this case, we may turn to a live Linux distribution, a USB-stick with a Linux operating system installed on it that runs in the computer we are using as soon as we switch it on.&lt;br /&gt;
&lt;br /&gt;
A particularly secure live distribution focused on security and anonymity is '''Tails''', or '''The Amnesic Incognito Live System''', a free and open-source Debian-based Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections.&lt;br /&gt;
&lt;br /&gt;
When we launch Tails, we have a complete operating system that, just as Whonix, comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, we can access the internet, communicate, and do all we need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless we ask it to do so.&lt;br /&gt;
&lt;br /&gt;
When using different identities, it is not advisable to use the same Tails session to perform two tasks or endorse two contextual identities that we really want to keep separate from another, for example hiding our location to check our personal email and publishing a document on our pseudonymous blog.&lt;br /&gt;
&lt;br /&gt;
The first reason is that Tor tends to reuse the same circuits, for example amongst a same browsing session, making it easier for a powerful adversary to correlate the several browsing requests as part of a same circuit and possibly made by a same user. Second, in case of a security hole or a misuse in using Tails or one of its applications, information about our session could be leaked. That could reveal that the same person was behind the various actions made during the session.&lt;br /&gt;
&lt;br /&gt;
T''he solution to both threats is to shut down and restart Tails every time we are using a new identity''.&lt;br /&gt;
&lt;br /&gt;
==== '''Security by isolation: Qubes OS''' ====&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting us; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, the most pessimistic, and realistic, approach is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that we want to secure.&lt;br /&gt;
&lt;br /&gt;
In order to implement security by isolation, for instance, '''Whonix''' is divided into two parts: Whonix-Workstation, which is the system we access for our work, and Whonix-Gateway, which routes all internet traffic through Tor and, by being isolated from the workstation, averts many threats posed by malware, misbehaving applications, and user error.&lt;br /&gt;
&lt;br /&gt;
But while Whonix needs a virtual machine to run on and its main focus is anonymization, there is an operating system that has security by isolation as its main purpose and that can make life a lot easier to someone who manages several social domains and/or identities in her digital life.&lt;br /&gt;
&lt;br /&gt;
Called '''Qubes OS''' – https://www.qubes-os.org – and developed by computer security researcher Joanna Rutkowska, Qubes is a free and open-source security-oriented operating system based on '''Fedora''', a Linux distribution, and '''Xen''', a virtual machine monitor (or hypervisor), that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things we do on our computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, we can do everything on a single physical computer without having to worry that one successful cyberattack harms our whole system, potentially revealing all the connections among our several identities.&lt;br /&gt;
&lt;br /&gt;
A plus of Qubes OS for the purposes of multiple identities management is its user-friendly window manager, that assigns a different colour to each domain. Thus, the colour of the frame makes each window clearly recognizable as belonging to the domain corresponding to that colour and prevents potential human mistakes in the management of our identities.&lt;br /&gt;
&lt;br /&gt;
==== '''Tails, Whonix, Qubes OS: how to choose''' ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described in the last few paragraphs – Whonix, Tails and Qubes OS – all allow us to use a completely separate operating system for managing our alternate identities, and can be quite useful to make sure that we don’t reveal our true identity while we use the anonymous one(s). Still better, if we can afford it, would be to have a different machine for each of our identities, as well as an air-gapped one to store our most sensitive data. Of course, the choice depends on the resources we can dedicate to securing our digital life and on our threat-model, especially on the adversaries we expect to face: if we are pretty sure that in our country harassers work together with the regime to slander (or worse) people like us, we may want to be absolutely sure that none of our data is leaked and – if we have enough funds or are connected to a network of hacktivists – we may decide to ask for an expert’s help to check that we have taken all the necessary measures to keep doing an efficient work and to stop any ill-intentioned actors from tampering with our data. On the other hand, if we feel sufficiently protected by our community and/or by our government, and we expect our adversaries not to be very skilled in technological matters, perhaps all we need is to separate our browser profiles and mailboxes, to use a secure HTTPS connection and some basic common sense and to keep developing a network of support for vocal women online.&lt;br /&gt;
&lt;br /&gt;
If we think that using a different operating system is really necessary, or that it can be helpful to keep things logically and graphically separated (or we just want to explore all the possibilities we have for the fun of it!), we should assess our resources and our needs in order to identify the best solution for us.&lt;br /&gt;
&lt;br /&gt;
''Comparison between Tails, Whonix and Qubes Os:''&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Tails'''&lt;br /&gt;
!'''Whonix'''&lt;br /&gt;
!'''Qubes OS'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Required hardware/software'''&lt;br /&gt;
|&amp;quot;x86 compatible and/or Virtual Machines; DVD, USB stick, or SD card for booting the system&amp;quot;&lt;br /&gt;
|&amp;quot;x86 compatible pc with VirtualBox&amp;quot;&lt;br /&gt;
|&amp;quot;a powerful pc capable of running Qubes OS&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''System requirements'''&lt;br /&gt;
|&amp;quot;lowest&amp;quot;&lt;br /&gt;
|&amp;quot;high&amp;quot;&lt;br /&gt;
|&amp;quot;highest&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Difficulty to install'''&lt;br /&gt;
|&amp;quot;medium&amp;quot;&lt;br /&gt;
|&amp;quot;medium&amp;quot;&lt;br /&gt;
|&amp;quot;easy&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Difficulty to configure'''&lt;br /&gt;
|&amp;quot;low&amp;quot;&lt;br /&gt;
|&amp;quot;medium&amp;quot;&lt;br /&gt;
|&amp;quot;high&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Learning curve'''&lt;br /&gt;
|&amp;quot;low&amp;quot;&lt;br /&gt;
|&amp;quot;low&amp;quot;&lt;br /&gt;
|&amp;quot;high&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Anonymization by default'''&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|&amp;quot;no&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Security by isolation'''&lt;br /&gt;
|&amp;quot;no&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Pre-installed applications'''&lt;br /&gt;
|&amp;quot;nice selection&amp;quot;&lt;br /&gt;
|&amp;quot;not many&amp;quot;&lt;br /&gt;
|&amp;quot;not many, and some, like Tor or Virtualbox cannot be installed at all&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Persistence'''&lt;br /&gt;
|&amp;quot;no (available option)&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
As we can see in the table above, '''Tails''' just needs a normal computer and a DVD or a bootable device to launch the system, but installing the system in this device, as well as having the DVD, USB stick or SD card actually boot in the computer we are using, can be tricky, and we may need some external help. After that, though, using Tails is pretty easy, and if what we need to do with our alternate persona needs a focus on ''anonymization'', then it may be worthwhile to overcome the initial obstacle. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. One particular advantage of Tails is that after we have switched the computer off, we leave no traces and everything we have done vanishes into thin air. But if on the other hand we need ''persistence'', i.e. we want to keep some files we have created or downloaded in our USB stick or we have changed some system settings and want to keep them also in the future, we need to enable this option when we start the system. Last but not least, Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what we need is both ''anonymity'' and ''security by isolation'' and we have a good machine – https://www.whonix.org/wiki/System_Requirements – where we can run Virtualbox, installing '''Whonix''' in one or more virtual machines, according to the number of our alternative identities, seems a good solution that caters to all our needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if we want to keep all our activities inside our own computer without having to install anything else and if what we are trying to do is to effectively ''separate'' our identities rather than anonymize our activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if we feel that we really need to protect ourselves against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protects us from every threat, and we shouldn’t look at them as a magic potion that will make us invulnerable. Nevertheless, by using any of them, according to our needs and resources, we will raise the level of effort that an attacker will need to harm us, thus making an attack less likely.&lt;br /&gt;
&lt;br /&gt;
For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Glossary&amp;diff=1886</id>
		<title>Glossary</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Glossary&amp;diff=1886"/>
				<updated>2015-06-04T14:43:33Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: added &amp;quot;online identity&amp;quot; and &amp;quot;social engineering&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;NOTEː THIS GLOSSARY STILL NEED SOME DEFINITIONS&lt;br /&gt;
&lt;br /&gt;
'''Anonymisation''' is the process that ensures users to remain anonymous as they access and use the internet by either encrypting or removing personally identifiable information from the traces they leave behind. &lt;br /&gt;
&lt;br /&gt;
'''Appropriated technologies''' are generally recognized as encompassing technological choice and application that is small-scale, decentralized, people-centred, energy-efficient, environmentally sound, and locally controlled. (most from wikipedia)&lt;br /&gt;
&lt;br /&gt;
'''Bitcoin''' is an anonymous online payment system based on the namesake cryptocurrency bitcoin. Bitcoins are created through &amp;quot;mining&amp;quot;, a process in which users offer their computing power to verify and record payments. Besides mining, bitcoins can be obtained in exchange for different currencies, products, and services.&lt;br /&gt;
&lt;br /&gt;
'''Cis-man''' is a man who is naturally-born as a man and self-identify as a man. &amp;quot;cis&amp;quot; is the opposite of &amp;quot;trans&amp;quot;. We can also see cis-women, cis-Gender, cis-men, etc. &lt;br /&gt;
&lt;br /&gt;
'''Cookies''' are tiny pieces of data that are stored in our browser when we visit a website. Some cookies are harmless, as they are just used to make browsing easier and quicker, but others, so-called “profiling cookies”, are used to profile users for commercial purposes.&lt;br /&gt;
&lt;br /&gt;
'''Domain''' (if you are looking for &amp;quot;Social domain&amp;quot;, see &amp;quot;Social networks&amp;quot;) The domain name is a component of a URL, the address we write in our browser to access a certain web site. URLs (https://www.wikipedia.org) are formed by a top-level domain name (in our case .org), by a host name (www), and by a second-level domain name (wikipedia), which is what identifies a certain website and is generally called a domain.&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' (also written as &amp;quot;doxxing&amp;quot;, or &amp;quot;D0xing&amp;quot;, a word derived from &amp;quot;Documents&amp;quot;, or &amp;quot;Docx&amp;quot;) describes tracing or gathering information about someone using sources that are freely available on the internet.&lt;br /&gt;
&lt;br /&gt;
'''Feminist hackerspaces''' are physical spaces created by women, queer and trans* a set of boundaries that they decide collectively (who can be a member, who can be a guest, what are the policies, etc.) and an explicit belief in feminist principles. Feminist hackerspaces provide a place to work on individual and collective projects in a supportive environment.   &lt;br /&gt;
&lt;br /&gt;
'''Free culture''' &lt;br /&gt;
&lt;br /&gt;
'''Free and Open Source Software (FOSS)''' is software that, unlike proprietary software, can be freely used, copied, studied and modified and whose source code is openly shared so as to encourage others to voluntarily improve its design.&lt;br /&gt;
&lt;br /&gt;
'''Gender roles ''' are sets of societal norms dictating what types of behaviors are generally considered acceptable, appropriate or desirable for a person based on their actual or perceived biological sex. These are usually centered around opposing conceptions of femininity and masculinity, although there are myriad exceptions and variations. &lt;br /&gt;
&lt;br /&gt;
'''Gender queer''' is a gender variant person whose gender identity is neither male nor female, is between or beyond genders, or is some combination of genders.Often includes a political agenda to challenge gender stereotypes and the gender binary system.&lt;br /&gt;
&lt;br /&gt;
'''HTTPS''' see TLS/SSL.&lt;br /&gt;
&lt;br /&gt;
'''Hack nights''' is a day or night that is dedicated to computer, body, software or hardware hacking. Often hack nights focus on special content, themes and/or demographics.  Many women, queer and trans* have tried to organise women-only nights in hackerspaces &lt;br /&gt;
&lt;br /&gt;
'''Hacklabs and Hackerspaces''' are spaces whose communities embrace the hacker ethics, based on the principles of hands-on approach to technologies, sharing, openness, decentralization, and free access to technologies. Both are places where people go to learn how to use technologies, especially computer and internet-related ones, and share their skill with others. Hacklabs, which  have basically existed since the advent of the personal computer and whose golden age was the decade around the turn of the millennium, are often located in squatted spaces and occupied social centres. Hackerspaces, the newer generation of such spaces, tend to interface more with the institutional grid through legal entities (associations or foundations), and rent spaces financed through a club-like membership model.&lt;br /&gt;
&lt;br /&gt;
'''Intersectionality''' or intersectional feminism argue that feminism cannot be studied, understood, or practiced from a single, immediate, standpoint; understanding requires engagement with culture, class, sexuality, ethnicity, gender and other power structures which engender inequality.  &lt;br /&gt;
&lt;br /&gt;
'''IP address''' - An IP address (meaning &amp;quot;Internet Protocol address&amp;quot;) is a number assigned to each device that connects to the internet. This number has the same function of a physical address: it is needed so that the servers that host the website we want to visit or the service we use can know where to send us the data we are asking for and how to get there.&lt;br /&gt;
&lt;br /&gt;
'''LGBTQI''' – A common abbreviation for lesbian, gay, bisexual, transgender, queer and intersexed community. For a long time, we have seen the acronym LGBTQ. Some started reversing letters to put the emphasis elsewhere such as with GLBTQ or LGTBQ. More and more we see the &amp;quot;I&amp;quot; being added to &amp;quot;LGBTQI&amp;quot; to add Intersex people.&lt;br /&gt;
&lt;br /&gt;
'''Liberating technologies''' can be defined as appropriated technologies that do not harm, are rooted in the free software and culture principles and are designed by default against gender based violence, surveillance, opacity and programmed obsolescence.&lt;br /&gt;
&lt;br /&gt;
'''Mansplaining or splaining''' refers to a form of condescension in which a member of a privileged group explains something to a member of a marginalised group as if the privileged person knows more about it. For instance, a man explaining sexism to a woman, or a white person explaining racism to a black person.  &lt;br /&gt;
&lt;br /&gt;
'''Moniker''' is also known as a pen name or an avatar. It is a name that you use that is not your legal name.&lt;br /&gt;
&lt;br /&gt;
'''Online identity''' is a set of data and features defining how every internet user presents themselves in online communities and web services. Sometimes it can be considered as an actively constructed presentation of oneself and compared to a digital version of a social mask.&lt;br /&gt;
&lt;br /&gt;
'''Online reputation''' Reputation is the opinion others have of a person or, in internet, of an identity, that typically results from an evaluation based on a set of criteria shared within a group of people. This evaluation is particularly important in online communities, where it influences the level of trust each of us can have in others.&lt;br /&gt;
&lt;br /&gt;
'''Passphrase''' is a sequence of words used to access a computer system, program or data. A passphrase is similar to a password in usage, but is generally longer for added security.&lt;br /&gt;
&lt;br /&gt;
'''Patriarchy''' is a social system in which men hold primary power. The ways in which patriarchy pans out often differs from countries to countries.  &lt;br /&gt;
&lt;br /&gt;
'''Peer-to-peer (P2P)''' computing or networking is a distributed application architecture that, unlike the centralized client-server model, partitions tasks or work loads between peers, thus creating a horizontal network of nodes.&lt;br /&gt;
&lt;br /&gt;
'''Permaculture''' is a systems approach that include but are not limited to ecological design, ecological engineering, environmental design, construction and integrated water resources management that develops sustainable architecture, regenerative and self-maintained habitat and agricultural systems modeled from natural ecosystems. (https://en.wikipedia.org/wiki/Permaculture)&lt;br /&gt;
&lt;br /&gt;
'''Privileges''' refer to &amp;quot;advantages&amp;quot; people have in society. Privileges refers to gender, race, ethnicity, sexual orientation, class, functional diversity etc. in which a society by default privileges people with certain traits and characteristics. If you are a white cis-men in a western country  for instance, changes are you will feel less street harassement than a women of color. People who have privileges in sociey are often not aware of those privileges and how they impact on our economic and social status in society. One cannot try to address issues of privileges without looking at sexism, patriarchy, ableism and racism. &lt;br /&gt;
&lt;br /&gt;
'''Queer''' is an umbrella term which embraces a matrix of sexual preferences, orientations, and habits of the not-exclusively-heterosexual-and-monogamous majority. Queer includes lesbians, gay men, bisexuals, trans*, intersex persons, the radical sex communities, and many other sexually transgressive (underworld) explorers. &lt;br /&gt;
&lt;br /&gt;
'''Right to privacy'''&lt;br /&gt;
&lt;br /&gt;
'''Safe space''' share common values, whether explicit, through a community agreement, or implicit through the sharing of values and enable members of a group to flourish, empower themselves and create community.&lt;br /&gt;
&lt;br /&gt;
'''Self identification''' is something everyone could do, not just woman or trans, regardless of the biological status. In practice includes trans women as well as people who are born biologically female.&lt;br /&gt;
&lt;br /&gt;
'''SD card''' or Secure Digital card is a solid-state storage card where we can save our files just as in other storage devices like USB sticks or hard disks.&lt;br /&gt;
&lt;br /&gt;
'''Social engineering''' is the study of human behaviour aimed at identifying and exploiting cognitive biases (or &amp;quot;bugs in the human hardware&amp;quot;) in order to attack or manipulate someone, as well as to obtain useful information from them.&lt;br /&gt;
&lt;br /&gt;
'''Social networking platforms''' or social media, are online tools that offer several functions to network among users by creating, sharing and exchanging contents (text, images, videos, etc.). They can be commercial (in which case they tend to profile their users for advertising purposes), or autonomous and community-driven.&lt;br /&gt;
&lt;br /&gt;
'''Social networks''' are social structures formed by relationships between individuals, groups, organizations, or even entire societies. Each of us belongs to several social networks that compose different social domains and may or may not be interconnected with one another (for instance social domains composed by your social networks with your family, friends, activists or friends colleagues, etc).&lt;br /&gt;
&lt;br /&gt;
'''Spyware''' is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge. (https://en.wikipedia.org/wiki/Spyware)&lt;br /&gt;
&lt;br /&gt;
'''STEM''' is an acronym that stands for Science, Technology, Engineering and Mathematics.&lt;br /&gt;
&lt;br /&gt;
'''Swarming''' consists in creating communities of support with your allies in social media spaces where you are likely to encounter harassment. When someone is being targeted, others can quickly be alerted and bombard the harasser with messages. Another option is to have the swarm filling the victim's content stream with lots of new content in order to quickly make the negative, violent content disappear into online history.&lt;br /&gt;
&lt;br /&gt;
'''TLS/SSL''' meaning &amp;quot;Transport Layer Security&amp;quot; and its predecessor SSL meaning &amp;quot;Secure Sockets Layer&amp;quot;, are cryptographic protocols ensuring that our data cannot be visible as they travel from our computer to the website we are visiting or to the service we are using and vice versa. When we access a website whose url is preceded by HTTPS rather than by HTTP, we are using the TLS/SSL protocol.&lt;br /&gt;
&lt;br /&gt;
'''Trans''' is an abbreviation that is sometimes used to refer to a gender variant person. This use allows a person to state a gender variant identity without having to disclose hormonal or surgical status/intentions. This term is sometimes used to refer to the gender variant community as a whole.&lt;br /&gt;
&lt;br /&gt;
'''Transgender''' is a person who lives as a member of a gender other than that expected based on anatomical sex. Sexual orientation varies and is not dependent on gender identity.&lt;br /&gt;
&lt;br /&gt;
'''Transwoman''' is an identity label sometimes adopted by male-to-female transsexuals to signify that they are women while still affirming their history as males.&lt;br /&gt;
&lt;br /&gt;
'''Trolls''' originally referred to a monster of folk stories and became in the early days of the internet a term to describe users who intentionally sowed discord on IRC and chat forums, often targeting and singling out new users. Today, the word is used more broadly to describe people who target and harass others online. &lt;br /&gt;
&lt;br /&gt;
'''Web of trust''' is a set of social norms, protocols and cryptography technologies that enable to build trust on the online world. The web of trust is based on authentication and validation mechanisms to ensure that people, software, online platforms and services are really who they claim to be.&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Glossary&amp;diff=1883</id>
		<title>Glossary</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Glossary&amp;diff=1883"/>
				<updated>2015-06-04T14:15:54Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: added FOSS and HTTPS&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;NOTEː THIS GLOSSARY STILL NEED SOME DEFINITIONS&lt;br /&gt;
&lt;br /&gt;
'''Anonymisation''' is the process that ensures users to remain anonymous as they access and use the internet by either encrypting or removing personally identifiable information from the traces they leave behind. &lt;br /&gt;
&lt;br /&gt;
'''Appropriated technologies''' are generally recognized as encompassing technological choice and application that is small-scale, decentralized, people-centred, energy-efficient, environmentally sound, and locally controlled. (most from wikipedia)&lt;br /&gt;
&lt;br /&gt;
'''Bitcoin''' is an anonymous online payment system based on the namesake cryptocurrency bitcoin. Bitcoins are created through &amp;quot;mining&amp;quot;, a process in which users offer their computing power to verify and record payments. Besides mining, bitcoins can be obtained in exchange for different currencies, products, and services.&lt;br /&gt;
&lt;br /&gt;
'''Cis-man''' is a man who is naturally-born as a man and self-identify as a man. &amp;quot;cis&amp;quot; is the opposite of &amp;quot;trans&amp;quot;. We can also see cis-women, cis-Gender, cis-men, etc. &lt;br /&gt;
&lt;br /&gt;
'''Cookies''' are tiny pieces of data that are stored in our browser when we visit a website. Some cookies are harmless, as they are just used to make browsing easier and quicker, but others, so-called “profiling cookies”, are used to profile users for commercial purposes.&lt;br /&gt;
&lt;br /&gt;
'''Domain''' (if you are looking for &amp;quot;Social domain&amp;quot;, see &amp;quot;Social networks&amp;quot;) The domain name is a component of a URL, the address we write in our browser to access a certain web site. URLs (https://www.wikipedia.org) are formed by a top-level domain name (in our case .org), by a host name (www), and by a second-level domain name (wikipedia), which is what identifies a certain website and is generally called a domain.&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' (also written as &amp;quot;doxxing&amp;quot;, or &amp;quot;D0xing&amp;quot;, a word derived from &amp;quot;Documents&amp;quot;, or &amp;quot;Docx&amp;quot;) describes tracing or gathering information about someone using sources that are freely available on the internet.&lt;br /&gt;
&lt;br /&gt;
'''Feminist hackerspaces''' are physical spaces created by women, queer and trans* a set of boundaries that they decide collectively (who can be a member, who can be a guest, what are the policies, etc.) and an explicit belief in feminist principles. Feminist hackerspaces provide a place to work on individual and collective projects in a supportive environment.   &lt;br /&gt;
&lt;br /&gt;
'''Free culture''' &lt;br /&gt;
&lt;br /&gt;
'''Free and Open Source Software (FOSS)''' is software that, unlike proprietary software, can be freely used, copied, studied and modified and whose source code is openly shared so as to encourage others to voluntarily improve its design.&lt;br /&gt;
&lt;br /&gt;
'''Gender roles ''' are sets of societal norms dictating what types of behaviors are generally considered acceptable, appropriate or desirable for a person based on their actual or perceived biological sex. These are usually centered around opposing conceptions of femininity and masculinity, although there are myriad exceptions and variations. &lt;br /&gt;
&lt;br /&gt;
'''Gender queer''' is a gender variant person whose gender identity is neither male nor female, is between or beyond genders, or is some combination of genders.Often includes a political agenda to challenge gender stereotypes and the gender binary system.&lt;br /&gt;
&lt;br /&gt;
'''HTTPS''' see TLS/SSL.&lt;br /&gt;
&lt;br /&gt;
'''Hack nights''' is a day or night that is dedicated to computer, body, software or hardware hacking. Often hack nights focus on special content, themes and/or demographics.  Many women, queer and trans* have tried to organise women-only nights in hackerspaces &lt;br /&gt;
&lt;br /&gt;
'''Hacklabs and Hackerspaces''' are spaces whose communities embrace the hacker ethics, based on the principles of hands-on approach to technologies, sharing, openness, decentralization, and free access to technologies. Both are places where people go to learn how to use technologies, especially computer and internet-related ones, and share their skill with others. Hacklabs, which  have basically existed since the advent of the personal computer and whose golden age was the decade around the turn of the millennium, are often located in squatted spaces and occupied social centres. Hackerspaces, the newer generation of such spaces, tend to interface more with the institutional grid through legal entities (associations or foundations), and rent spaces financed through a club-like membership model.&lt;br /&gt;
&lt;br /&gt;
'''Intersectionality''' or intersectional feminism argue that feminism cannot be studied, understood, or practiced from a single, immediate, standpoint; understanding requires engagement with culture, class, sexuality, ethnicity, gender and other power structures which engender inequality.  &lt;br /&gt;
&lt;br /&gt;
'''IP address''' - An IP address (meaning &amp;quot;Internet Protocol address&amp;quot;) is a number assigned to each device that connects to the internet. This number has the same function of a physical address: it is needed so that the servers that host the website we want to visit or the service we use can know where to send us the data we are asking for and how to get there.&lt;br /&gt;
&lt;br /&gt;
'''LGBTQI''' – A common abbreviation for lesbian, gay, bisexual, transgender, queer and intersexed community. For a long time, we have seen the acronym LGBTQ. Some started reversing letters to put the emphasis elsewhere such as with GLBTQ or LGTBQ. More and more we see the &amp;quot;I&amp;quot; being added to &amp;quot;LGBTQI&amp;quot; to add Intersex people.&lt;br /&gt;
&lt;br /&gt;
'''Liberating technologies''' can be defined as appropriated technologies that do not harm, are rooted in the free software and culture principles and are designed by default against gender based violence, surveillance, opacity and programmed obsolescence.&lt;br /&gt;
&lt;br /&gt;
'''Mansplaining or splaining''' refers to a form of condescension in which a member of a privileged group explains something to a member of a marginalised group as if the privileged person knows more about it. For instance, a man explaining sexism to a woman, or a white person explaining racism to a black person.  &lt;br /&gt;
&lt;br /&gt;
'''Moniker''' is also known as a pen name or an avatar. It is a name that you use that is not your legal name.&lt;br /&gt;
&lt;br /&gt;
'''Online identity''' is a set of data and features defining how every internet user presents themselves in online communities and web services. Sometimes it can be considered as an actively constructed presentation of oneself and compared to a digital version of a social mask.&lt;br /&gt;
&lt;br /&gt;
'''Online reputation'''&lt;br /&gt;
&lt;br /&gt;
'''Passphrase''' is a sequence of words used to access a computer system, program or data. A passphrase is similar to a password in usage, but is generally longer for added security.&lt;br /&gt;
&lt;br /&gt;
'''Patriarchy''' is a social system in which men hold primary power. The ways in which patriarchy pans out often differs from countries to countries.  &lt;br /&gt;
&lt;br /&gt;
'''Peer-to-peer (P2P)''' computing or networking is a distributed application architecture that, unlike the centralized client-server model, partitions tasks or work loads between peers, thus creating a horizontal network of nodes.&lt;br /&gt;
&lt;br /&gt;
'''Permaculture''' is a systems approach that include but are not limited to ecological design, ecological engineering, environmental design, construction and integrated water resources management that develops sustainable architecture, regenerative and self-maintained habitat and agricultural systems modeled from natural ecosystems. (https://en.wikipedia.org/wiki/Permaculture)&lt;br /&gt;
&lt;br /&gt;
'''Privileges''' refer to &amp;quot;advantages&amp;quot; people have in society. Privileges refers to gender, race, ethnicity, sexual orientation, class, functional diversity etc. in which a society by default privileges people with certain traits and characteristics. If you are a white cis-men in a western country  for instance, changes are you will feel less street harassement than a women of color. People who have privileges in sociey are often not aware of those privileges and how they impact on our economic and social status in society. One cannot try to address issues of privileges without looking at sexism, patriarchy, ableism and racism. &lt;br /&gt;
&lt;br /&gt;
'''Queer''' is an umbrella term which embraces a matrix of sexual preferences, orientations, and habits of the not-exclusively-heterosexual-and-monogamous majority. Queer includes lesbians, gay men, bisexuals, trans*, intersex persons, the radical sex communities, and many other sexually transgressive (underworld) explorers. &lt;br /&gt;
&lt;br /&gt;
'''Right to privacy'''&lt;br /&gt;
&lt;br /&gt;
'''Safe space''' share common values, whether explicit, through a community agreement, or implicit through the sharing of values and enable members of a group to flourish, empower themselves and create community.&lt;br /&gt;
&lt;br /&gt;
'''Self identification''' is something everyone could do, not just woman or trans, regardless of the biological status. In practice includes trans women as well as people who are born biologically female.&lt;br /&gt;
&lt;br /&gt;
'''SD card''' or Secure Digital card is a solid-state storage card where we can save our files just as in other storage devices like USB sticks or hard disks.&lt;br /&gt;
&lt;br /&gt;
'''Social engineering'''&lt;br /&gt;
&lt;br /&gt;
'''Social networking platforms''' or social media, are online tools that offer several functions to network among users by creating, sharing and exchanging contents (text, images, videos, etc.). They can be commercial (in which case they tend to profile their users for advertising purposes), or autonomous and community-driven.&lt;br /&gt;
&lt;br /&gt;
'''Social networks''' are social structures formed by relationships between individuals, groups, organizations, or even entire societies. Each of us belongs to several social networks that compose different social domains and may or may not be interconnected with one another (for instance social domains composed by your social networks with your family, friends, activists or friends colleagues, etc).&lt;br /&gt;
&lt;br /&gt;
'''Spyware''' is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge. (https://en.wikipedia.org/wiki/Spyware)&lt;br /&gt;
&lt;br /&gt;
'''STEM''' is an acronym that stands for Science, Technology, Engineering and Mathematics.&lt;br /&gt;
&lt;br /&gt;
'''Swarming''' consists in creating communities of support with your allies in social media spaces where you are likely to encounter harassment. When someone is being targeted, others can quickly be alerted and bombard the harasser with messages. Another option is to have the swarm filling the victim's content stream with lots of new content in order to quickly make the negative, violent content disappear into online history.&lt;br /&gt;
&lt;br /&gt;
'''TLS/SSL''' meaning &amp;quot;Transport Layer Security&amp;quot; and its predecessor SSL meaning &amp;quot;Secure Sockets Layer&amp;quot;, are cryptographic protocols ensuring that our data cannot be visible as they travel from our computer to the website we are visiting or to the service we are using and vice versa. When we access a website whose url is preceded by HTTPS rather than by HTTP, we are using the TLS/SSL protocol.&lt;br /&gt;
&lt;br /&gt;
'''Trans''' is an abbreviation that is sometimes used to refer to a gender variant person. This use allows a person to state a gender variant identity without having to disclose hormonal or surgical status/intentions. This term is sometimes used to refer to the gender variant community as a whole.&lt;br /&gt;
&lt;br /&gt;
'''Transgender''' is a person who lives as a member of a gender other than that expected based on anatomical sex. Sexual orientation varies and is not dependent on gender identity.&lt;br /&gt;
&lt;br /&gt;
'''Transwoman''' is an identity label sometimes adopted by male-to-female transsexuals to signify that they are women while still affirming their history as males.&lt;br /&gt;
&lt;br /&gt;
'''Trolls''' originally referred to a monster of folk stories and became in the early days of the internet a term to describe users who intentionally sowed discord on IRC and chat forums, often targeting and singling out new users. Today, the word is used more broadly to describe people who target and harass others online. &lt;br /&gt;
&lt;br /&gt;
'''Web of trust''' is a set of social norms, protocols and cryptography technologies that enable to build trust on the online world. The web of trust is based on authentication and validation mechanisms to ensure that people, software, online platforms and services are really who they claim to be.&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Glossary&amp;diff=1882</id>
		<title>Glossary</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Glossary&amp;diff=1882"/>
				<updated>2015-06-04T14:10:36Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: added &amp;quot;Cookies&amp;quot; and &amp;quot;Domain&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;NOTEː THIS GLOSSARY STILL NEED SOME DEFINITIONS&lt;br /&gt;
&lt;br /&gt;
'''Anonymisation''' is the process that ensures users to remain anonymous as they access and use the internet by either encrypting or removing personally identifiable information from the traces they leave behind. &lt;br /&gt;
&lt;br /&gt;
'''Appropriated technologies''' are generally recognized as encompassing technological choice and application that is small-scale, decentralized, people-centred, energy-efficient, environmentally sound, and locally controlled. (most from wikipedia)&lt;br /&gt;
&lt;br /&gt;
'''Bitcoin''' is an anonymous online payment system based on the namesake cryptocurrency bitcoin. Bitcoins are created through &amp;quot;mining&amp;quot;, a process in which users offer their computing power to verify and record payments. Besides mining, bitcoins can be obtained in exchange for different currencies, products, and services.&lt;br /&gt;
&lt;br /&gt;
'''Cis-man''' is a man who is naturally-born as a man and self-identify as a man. &amp;quot;cis&amp;quot; is the opposite of &amp;quot;trans&amp;quot;. We can also see cis-women, cis-Gender, cis-men, etc. &lt;br /&gt;
&lt;br /&gt;
'''Cookies''' are tiny pieces of data that are stored in our browser when we visit a website. Some cookies are harmless, as they are just used to make browsing easier and quicker, but others, so-called “profiling cookies”, are used to profile users for commercial purposes.&lt;br /&gt;
&lt;br /&gt;
'''Domain''' The domain name is a component of a URL, the address we write in our browser to access a certain web site. URLs (https://www.wikipedia.org) are formed by a top-level domain name (in our case .org), by a host name (www), and by a second-level domain name (wikipedia), which is what identifies a certain website and is generally called a domain.&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' (also written as &amp;quot;doxxing&amp;quot;, or &amp;quot;D0xing&amp;quot;, a word derived from &amp;quot;Documents&amp;quot;, or &amp;quot;Docx&amp;quot;) describes tracing or gathering information about someone using sources that are freely available on the internet.&lt;br /&gt;
&lt;br /&gt;
'''Feminist hackerspaces''' are physical spaces created by women, queer and trans* a set of boundaries that they decide collectively (who can be a member, who can be a guest, what are the policies, etc.) and an explicit belief in feminist principles. Feminist hackerspaces provide a place to work on individual and collective projects in a supportive environment.   &lt;br /&gt;
&lt;br /&gt;
'''Free culture''' &lt;br /&gt;
&lt;br /&gt;
'''Free and open-source software''' &lt;br /&gt;
&lt;br /&gt;
'''Gender roles ''' are sets of societal norms dictating what types of behaviors are generally considered acceptable, appropriate or desirable for a person based on their actual or perceived biological sex. These are usually centered around opposing conceptions of femininity and masculinity, although there are myriad exceptions and variations. &lt;br /&gt;
&lt;br /&gt;
'''Gender queer''' is a gender variant person whose gender identity is neither male nor female, is between or beyond genders, or is some combination of genders.Often includes a political agenda to challenge gender stereotypes and the gender binary system.&lt;br /&gt;
&lt;br /&gt;
'''HTTPS'''&lt;br /&gt;
&lt;br /&gt;
'''Hack nights''' is a day or night that is dedicated to computer, body, software or hardware hacking. Often hack nights focus on special content, themes and/or demographics.  Many women, queer and trans* have tried to organise women-only nights in hackerspaces &lt;br /&gt;
&lt;br /&gt;
'''Hacklabs and Hackerspaces''' are spaces whose communities embrace the hacker ethics, based on the principles of hands-on approach to technologies, sharing, openness, decentralization, and free access to technologies. Both are places where people go to learn how to use technologies, especially computer and internet-related ones, and share their skill with others. Hacklabs, which  have basically existed since the advent of the personal computer and whose golden age was the decade around the turn of the millennium, are often located in squatted spaces and occupied social centres. Hackerspaces, the newer generation of such spaces, tend to interface more with the institutional grid through legal entities (associations or foundations), and rent spaces financed through a club-like membership model.&lt;br /&gt;
&lt;br /&gt;
'''Intersectionality''' or intersectional feminism argue that feminism cannot be studied, understood, or practiced from a single, immediate, standpoint; understanding requires engagement with culture, class, sexuality, ethnicity, gender and other power structures which engender inequality.  &lt;br /&gt;
&lt;br /&gt;
'''IP address''' - An IP address (meaning &amp;quot;Internet Protocol address&amp;quot;) is a number assigned to each device that connects to the internet. This number has the same function of a physical address: it is needed so that the servers that host the website we want to visit or the service we use can know where to send us the data we are asking for and how to get there.&lt;br /&gt;
&lt;br /&gt;
'''LGBTQI''' – A common abbreviation for lesbian, gay, bisexual, transgender, queer and intersexed community. For a long time, we have seen the acronym LGBTQ. Some started reversing letters to put the emphasis elsewhere such as with GLBTQ or LGTBQ. More and more we see the &amp;quot;I&amp;quot; being added to &amp;quot;LGBTQI&amp;quot; to add Intersex people.&lt;br /&gt;
&lt;br /&gt;
'''Liberating technologies''' can be defined as appropriated technologies that do not harm, are rooted in the free software and culture principles and are designed by default against gender based violence, surveillance, opacity and programmed obsolescence.&lt;br /&gt;
&lt;br /&gt;
'''Mansplaining or splaining''' refers to a form of condescension in which a member of a privileged group explains something to a member of a marginalised group as if the privileged person knows more about it. For instance, a man explaining sexism to a woman, or a white person explaining racism to a black person.  &lt;br /&gt;
&lt;br /&gt;
'''Moniker''' is also known as a pen name or an avatar. It is a name that you use that is not your legal name.&lt;br /&gt;
&lt;br /&gt;
'''Online identity''' is a set of data and features defining how every internet user presents themselves in online communities and web services. Sometimes it can be considered as an actively constructed presentation of oneself and compared to a digital version of a social mask.&lt;br /&gt;
&lt;br /&gt;
'''Online reputation'''&lt;br /&gt;
&lt;br /&gt;
'''Passphrase''' is a sequence of words used to access a computer system, program or data. A passphrase is similar to a password in usage, but is generally longer for added security.&lt;br /&gt;
&lt;br /&gt;
'''Patriarchy''' is a social system in which men hold primary power. The ways in which patriarchy pans out often differs from countries to countries.  &lt;br /&gt;
&lt;br /&gt;
'''Peer-to-peer (P2P)''' computing or networking is a distributed application architecture that, unlike the centralized client-server model, partitions tasks or work loads between peers, thus creating a horizontal network of nodes.&lt;br /&gt;
&lt;br /&gt;
'''Permaculture''' is a systems approach that include but are not limited to ecological design, ecological engineering, environmental design, construction and integrated water resources management that develops sustainable architecture, regenerative and self-maintained habitat and agricultural systems modeled from natural ecosystems. (https://en.wikipedia.org/wiki/Permaculture)&lt;br /&gt;
&lt;br /&gt;
'''Privileges''' refer to &amp;quot;advantages&amp;quot; people have in society. Privileges refers to gender, race, ethnicity, sexual orientation, class, functional diversity etc. in which a society by default privileges people with certain traits and characteristics. If you are a white cis-men in a western country  for instance, changes are you will feel less street harassement than a women of color. People who have privileges in sociey are often not aware of those privileges and how they impact on our economic and social status in society. One cannot try to address issues of privileges without looking at sexism, patriarchy, ableism and racism. &lt;br /&gt;
&lt;br /&gt;
'''Queer''' is an umbrella term which embraces a matrix of sexual preferences, orientations, and habits of the not-exclusively-heterosexual-and-monogamous majority. Queer includes lesbians, gay men, bisexuals, trans*, intersex persons, the radical sex communities, and many other sexually transgressive (underworld) explorers. &lt;br /&gt;
&lt;br /&gt;
'''Right to privacy'''&lt;br /&gt;
&lt;br /&gt;
'''Safe space''' share common values, whether explicit, through a community agreement, or implicit through the sharing of values and enable members of a group to flourish, empower themselves and create community.&lt;br /&gt;
&lt;br /&gt;
'''Self identification''' is something everyone could do, not just woman or trans, regardless of the biological status. In practice includes trans women as well as people who are born biologically female.&lt;br /&gt;
&lt;br /&gt;
'''SD card''' or Secure Digital card is a solid-state storage card where we can save our files just as in other storage devices like USB sticks or hard disks.&lt;br /&gt;
&lt;br /&gt;
'''Social engineering'''&lt;br /&gt;
&lt;br /&gt;
'''Social networking platforms''' or social media, are online tools that offer several functions to network among users by creating, sharing and exchanging contents (text, images, videos, etc.). They can be commercial (in which case they tend to profile their users for advertising purposes), or autonomous and community-driven.&lt;br /&gt;
&lt;br /&gt;
'''Social networks''' are social structures formed by relationships between individuals, groups, organizations, or even entire societies. Each of us belongs to several social networks that compose different social domains and may or may not be interconnected with one another (for instance social domains composed by your social networks with your family, friends, activists or friends colleagues, etc).&lt;br /&gt;
&lt;br /&gt;
'''Spyware''' is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge. (https://en.wikipedia.org/wiki/Spyware)&lt;br /&gt;
&lt;br /&gt;
'''STEM''' is an acronym that stands for Science, Technology, Engineering and Mathematics.&lt;br /&gt;
&lt;br /&gt;
'''Swarming''' consists in creating communities of support with your allies in social media spaces where you are likely to encounter harassment. When someone is being targeted, others can quickly be alerted and bombard the harasser with messages. Another option is to have the swarm filling the victim's content stream with lots of new content in order to quickly make the negative, violent content disappear into online history.&lt;br /&gt;
&lt;br /&gt;
'''TLS/SSL''' meaning &amp;quot;Transport Layer Security&amp;quot; and its predecessor SSL meaning &amp;quot;Secure Sockets Layer&amp;quot;, are cryptographic protocols ensuring that our data cannot be visible as they travel from our computer to the website we are visiting or to the service we are using and vice versa. When we access a website whose url is preceded by HTTPS rather than by HTTP, we are using the TLS/SSL protocol.&lt;br /&gt;
&lt;br /&gt;
'''Trans''' is an abbreviation that is sometimes used to refer to a gender variant person. This use allows a person to state a gender variant identity without having to disclose hormonal or surgical status/intentions. This term is sometimes used to refer to the gender variant community as a whole.&lt;br /&gt;
&lt;br /&gt;
'''Transgender''' is a person who lives as a member of a gender other than that expected based on anatomical sex. Sexual orientation varies and is not dependent on gender identity.&lt;br /&gt;
&lt;br /&gt;
'''Transwoman''' is an identity label sometimes adopted by male-to-female transsexuals to signify that they are women while still affirming their history as males.&lt;br /&gt;
&lt;br /&gt;
'''Trolls''' originally referred to a monster of folk stories and became in the early days of the internet a term to describe users who intentionally sowed discord on IRC and chat forums, often targeting and singling out new users. Today, the word is used more broadly to describe people who target and harass others online. &lt;br /&gt;
&lt;br /&gt;
'''Web of trust''' is a set of social norms, protocols and cryptography technologies that enable to build trust on the online world. The web of trust is based on authentication and validation mechanisms to ensure that people, software, online platforms and services are really who they claim to be.&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Glossary&amp;diff=1881</id>
		<title>Glossary</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Glossary&amp;diff=1881"/>
				<updated>2015-06-04T14:01:53Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: added definition of &amp;quot;Anonymisation&amp;quot; and &amp;quot;Bitcoin&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;NOTEː THIS GLOSSARY STILL NEED SOME DEFINITIONS&lt;br /&gt;
&lt;br /&gt;
'''Anonymisation''' is the process that ensures users to remain anonymous as they access and use the internet by either encrypting or removing personally identifiable information from the traces they leave behind. &lt;br /&gt;
&lt;br /&gt;
'''Appropriated technologies''' are generally recognized as encompassing technological choice and application that is small-scale, decentralized, people-centred, energy-efficient, environmentally sound, and locally controlled. (most from wikipedia)&lt;br /&gt;
&lt;br /&gt;
'''Bitcoin''' is an anonymous online payment system based on the namesake cryptocurrency bitcoin. Bitcoins are created through &amp;quot;mining&amp;quot;, a process in which users offer their computing power to verify and record payments. Besides mining, bitcoins can be obtained in exchange for different currencies, products, and services.&lt;br /&gt;
&lt;br /&gt;
'''Cis-man''' is a man who is naturally-born as a man and self-identify as a man. &amp;quot;cis&amp;quot; is the opposite of &amp;quot;trans&amp;quot;. We can also see cis-women, cis-Gender, cis-men, etc. &lt;br /&gt;
&lt;br /&gt;
'''Cookies'''&lt;br /&gt;
&lt;br /&gt;
'''Domain'''&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' (also written as &amp;quot;doxxing&amp;quot;, or &amp;quot;D0xing&amp;quot;, a word derived from &amp;quot;Documents&amp;quot;, or &amp;quot;Docx&amp;quot;) describes tracing or gathering information about someone using sources that are freely available on the internet.&lt;br /&gt;
&lt;br /&gt;
'''Feminist hackerspaces''' are physical spaces created by women, queer and trans* a set of boundaries that they decide collectively (who can be a member, who can be a guest, what are the policies, etc.) and an explicit belief in feminist principles. Feminist hackerspaces provide a place to work on individual and collective projects in a supportive environment.   &lt;br /&gt;
&lt;br /&gt;
'''Free culture''' &lt;br /&gt;
&lt;br /&gt;
'''Free and open-source software''' &lt;br /&gt;
&lt;br /&gt;
'''Gender roles ''' are sets of societal norms dictating what types of behaviors are generally considered acceptable, appropriate or desirable for a person based on their actual or perceived biological sex. These are usually centered around opposing conceptions of femininity and masculinity, although there are myriad exceptions and variations. &lt;br /&gt;
&lt;br /&gt;
'''Gender queer''' is a gender variant person whose gender identity is neither male nor female, is between or beyond genders, or is some combination of genders.Often includes a political agenda to challenge gender stereotypes and the gender binary system.&lt;br /&gt;
&lt;br /&gt;
'''HTTPS'''&lt;br /&gt;
&lt;br /&gt;
'''Hack nights''' is a day or night that is dedicated to computer, body, software or hardware hacking. Often hack nights focus on special content, themes and/or demographics.  Many women, queer and trans* have tried to organise women-only nights in hackerspaces &lt;br /&gt;
&lt;br /&gt;
'''Hacklabs and Hackerspaces''' are spaces whose communities embrace the hacker ethics, based on the principles of hands-on approach to technologies, sharing, openness, decentralization, and free access to technologies. Both are places where people go to learn how to use technologies, especially computer and internet-related ones, and share their skill with others. Hacklabs, which  have basically existed since the advent of the personal computer and whose golden age was the decade around the turn of the millennium, are often located in squatted spaces and occupied social centres. Hackerspaces, the newer generation of such spaces, tend to interface more with the institutional grid through legal entities (associations or foundations), and rent spaces financed through a club-like membership model.&lt;br /&gt;
&lt;br /&gt;
'''Intersectionality''' or intersectional feminism argue that feminism cannot be studied, understood, or practiced from a single, immediate, standpoint; understanding requires engagement with culture, class, sexuality, ethnicity, gender and other power structures which engender inequality.  &lt;br /&gt;
&lt;br /&gt;
'''IP address''' - An IP address (meaning &amp;quot;Internet Protocol address&amp;quot;) is a number assigned to each device that connects to the internet. This number has the same function of a physical address: it is needed so that the servers that host the website we want to visit or the service we use can know where to send us the data we are asking for and how to get there.&lt;br /&gt;
&lt;br /&gt;
'''LGBTQI''' – A common abbreviation for lesbian, gay, bisexual, transgender, queer and intersexed community. For a long time, we have seen the acronym LGBTQ. Some started reversing letters to put the emphasis elsewhere such as with GLBTQ or LGTBQ. More and more we see the &amp;quot;I&amp;quot; being added to &amp;quot;LGBTQI&amp;quot; to add Intersex people.&lt;br /&gt;
&lt;br /&gt;
'''Liberating technologies''' can be defined as appropriated technologies that do not harm, are rooted in the free software and culture principles and are designed by default against gender based violence, surveillance, opacity and programmed obsolescence.&lt;br /&gt;
&lt;br /&gt;
'''Mansplaining or splaining''' refers to a form of condescension in which a member of a privileged group explains something to a member of a marginalised group as if the privileged person knows more about it. For instance, a man explaining sexism to a woman, or a white person explaining racism to a black person.  &lt;br /&gt;
&lt;br /&gt;
'''Moniker''' is also known as a pen name or an avatar. It is a name that you use that is not your legal name.&lt;br /&gt;
&lt;br /&gt;
'''Online identity''' is a set of data and features defining how every internet user presents themselves in online communities and web services. Sometimes it can be considered as an actively constructed presentation of oneself and compared to a digital version of a social mask.&lt;br /&gt;
&lt;br /&gt;
'''Online reputation'''&lt;br /&gt;
&lt;br /&gt;
'''Passphrase''' is a sequence of words used to access a computer system, program or data. A passphrase is similar to a password in usage, but is generally longer for added security.&lt;br /&gt;
&lt;br /&gt;
'''Patriarchy''' is a social system in which men hold primary power. The ways in which patriarchy pans out often differs from countries to countries.  &lt;br /&gt;
&lt;br /&gt;
'''Peer-to-peer (P2P)''' computing or networking is a distributed application architecture that, unlike the centralized client-server model, partitions tasks or work loads between peers, thus creating a horizontal network of nodes.&lt;br /&gt;
&lt;br /&gt;
'''Permaculture''' is a systems approach that include but are not limited to ecological design, ecological engineering, environmental design, construction and integrated water resources management that develops sustainable architecture, regenerative and self-maintained habitat and agricultural systems modeled from natural ecosystems. (https://en.wikipedia.org/wiki/Permaculture)&lt;br /&gt;
&lt;br /&gt;
'''Privileges''' refer to &amp;quot;advantages&amp;quot; people have in society. Privileges refers to gender, race, ethnicity, sexual orientation, class, functional diversity etc. in which a society by default privileges people with certain traits and characteristics. If you are a white cis-men in a western country  for instance, changes are you will feel less street harassement than a women of color. People who have privileges in sociey are often not aware of those privileges and how they impact on our economic and social status in society. One cannot try to address issues of privileges without looking at sexism, patriarchy, ableism and racism. &lt;br /&gt;
&lt;br /&gt;
'''Queer''' is an umbrella term which embraces a matrix of sexual preferences, orientations, and habits of the not-exclusively-heterosexual-and-monogamous majority. Queer includes lesbians, gay men, bisexuals, trans*, intersex persons, the radical sex communities, and many other sexually transgressive (underworld) explorers. &lt;br /&gt;
&lt;br /&gt;
'''Right to privacy'''&lt;br /&gt;
&lt;br /&gt;
'''Safe space''' share common values, whether explicit, through a community agreement, or implicit through the sharing of values and enable members of a group to flourish, empower themselves and create community.&lt;br /&gt;
&lt;br /&gt;
'''Self identification''' is something everyone could do, not just woman or trans, regardless of the biological status. In practice includes trans women as well as people who are born biologically female.&lt;br /&gt;
&lt;br /&gt;
'''SD card''' or Secure Digital card is a solid-state storage card where we can save our files just as in other storage devices like USB sticks or hard disks.&lt;br /&gt;
&lt;br /&gt;
'''Social engineering'''&lt;br /&gt;
&lt;br /&gt;
'''Social networking platforms''' or social media, are online tools that offer several functions to network among users by creating, sharing and exchanging contents (text, images, videos, etc.). They can be commercial (in which case they tend to profile their users for advertising purposes), or autonomous and community-driven.&lt;br /&gt;
&lt;br /&gt;
'''Social networks''' are social structures formed by relationships between individuals, groups, organizations, or even entire societies. Each of us belongs to several social networks that compose different social domains and may or may not be interconnected with one another (for instance social domains composed by your social networks with your family, friends, activists or friends colleagues, etc).&lt;br /&gt;
&lt;br /&gt;
'''Spyware''' is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge. (https://en.wikipedia.org/wiki/Spyware)&lt;br /&gt;
&lt;br /&gt;
'''STEM''' is an acronym that stands for Science, Technology, Engineering and Mathematics.&lt;br /&gt;
&lt;br /&gt;
'''Swarming''' consists in creating communities of support with your allies in social media spaces where you are likely to encounter harassment. When someone is being targeted, others can quickly be alerted and bombard the harasser with messages. Another option is to have the swarm filling the victim's content stream with lots of new content in order to quickly make the negative, violent content disappear into online history.&lt;br /&gt;
&lt;br /&gt;
'''TLS/SSL''' meaning &amp;quot;Transport Layer Security&amp;quot; and its predecessor SSL meaning &amp;quot;Secure Sockets Layer&amp;quot;, are cryptographic protocols ensuring that our data cannot be visible as they travel from our computer to the website we are visiting or to the service we are using and vice versa. When we access a website whose url is preceded by HTTPS rather than by HTTP, we are using the TLS/SSL protocol.&lt;br /&gt;
&lt;br /&gt;
'''Trans''' is an abbreviation that is sometimes used to refer to a gender variant person. This use allows a person to state a gender variant identity without having to disclose hormonal or surgical status/intentions. This term is sometimes used to refer to the gender variant community as a whole.&lt;br /&gt;
&lt;br /&gt;
'''Transgender''' is a person who lives as a member of a gender other than that expected based on anatomical sex. Sexual orientation varies and is not dependent on gender identity.&lt;br /&gt;
&lt;br /&gt;
'''Transwoman''' is an identity label sometimes adopted by male-to-female transsexuals to signify that they are women while still affirming their history as males.&lt;br /&gt;
&lt;br /&gt;
'''Trolls''' originally referred to a monster of folk stories and became in the early days of the internet a term to describe users who intentionally sowed discord on IRC and chat forums, often targeting and singling out new users. Today, the word is used more broadly to describe people who target and harass others online. &lt;br /&gt;
&lt;br /&gt;
'''Web of trust''' is a set of social norms, protocols and cryptography technologies that enable to build trust on the online world. The web of trust is based on authentication and validation mechanisms to ensure that people, software, online platforms and services are really who they claim to be.&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1869</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1869"/>
				<updated>2015-06-04T08:56:54Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: &amp;quot;live distribution&amp;quot; is a distribution that is not installed. &amp;quot;live operating system&amp;quot; cannot be a VM&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
'''Chapter 1: Digital traces and identities online'''&lt;br /&gt;
&lt;br /&gt;
== Digital shadows ==&lt;br /&gt;
&lt;br /&gt;
How much data exists about you? What kind of traces do you leave behind about your identity, your networks, and your habits when you use digital services? How does this connect to who you are online and who you are offline? What can someone who wants to harm you or investigate you, actually find out? &lt;br /&gt;
&lt;br /&gt;
Your digital shadow is the story that data tell about you. It is created by trillions of traces, or bits of data, left behind in the digital world every time you go online, or when your mobile phone or any other object around you sends information to the internet. These bits of data can include your name, location, contacts, photos, messages, tweets and likes, but also the brand of your computer, length of your phone calls and information about which websites you visit. &lt;br /&gt;
&lt;br /&gt;
These traces are created by you actively publishing and sharing information about yourself and people sharing information about you by tagging you in pictures, mentioning you in tweets or simply by communicating with you. There are also traces which are passively created, without you necessarily realising it, or consenting to it. For example, your browsing habits and IP address are shared amongst websites you visit and services you use in order to track your behaviour and try to sell you products through advertising. &lt;br /&gt;
&lt;br /&gt;
In order to understand the concept of digital shadows, it is useful to break it down into what the data is that is being collected and who is collecting it. &lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
&lt;br /&gt;
When we think about digital traces, we are talking about three types of data: content, metadata and noise. &lt;br /&gt;
&lt;br /&gt;
'''Content:''' is what you actively produce: your messages, blogs, tweets, phone calls and online purchases; the pictures and videos you take to remember. &lt;br /&gt;
&lt;br /&gt;
'''Metadata:''' is data about your data, information that is needed for the technological infrastructure to work. It enables your email to be delivered, files on your computer to be found and mobile communication to work. If you take the example of an email that you send, the metadata includes the sender's email, the recipient's email, the time the email was sent, the type of device the email was sent from, and the location it was sent from. &lt;br /&gt;
&lt;br /&gt;
'''Noise:''' is the data that is created by either the manufacturing process or by the workings of the technological infrastructure. For example, every camera with a SD card to record and store pictures has unique scratches. These make small changes to the data that are not visible to the eye but can be recognised by computers. &lt;br /&gt;
&lt;br /&gt;
''Who collects data?'' &lt;br /&gt;
&lt;br /&gt;
You might wonder about the importance of one picture, one message, or one call. You might think there is so much data out there that nobody knows what to do with it, or cares that much about it. &lt;br /&gt;
&lt;br /&gt;
However, there are in reality a number of parties interested in this data - including companies, governments and individuals - and data collection and data analysis is by now very sophisticated. The data traces you leave behind online are constantly being collected, analysed and sorted by various parties to create profiles on you; and every time a new piece of data is aggregated, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected for a variety of purposes. Profiles can be bought and sold; data can be used to control, suppress or silence; or it can be used to create harassment strategies by people who want to harm your reputation or attack you for your views or beliefs. All of the aforementioned actors can have access to your digital shadow. They might access it in different ways: through surveillance of your activities, through data-sharing between applications, or through researching publicly available pieces of data about you and patching these all together. &lt;br /&gt;
&lt;br /&gt;
Depending on who you are and what you do, you will probably have different concerns about who can access your digital shadows and how this makes you vulnerable. &lt;br /&gt;
&lt;br /&gt;
'''Relevant links:'''&lt;br /&gt;
&lt;br /&gt;
* '''Trackography''': (https://trackography.org/) an interactive map exploring how the global tracking industry is recording your online behaviour. &lt;br /&gt;
&lt;br /&gt;
'''Further Readingsː'''&lt;br /&gt;
&lt;br /&gt;
* Privacy international videoː (https://www.privacyinternational.org/?q=node/573) explaining what is metadata and what should we care about it.&lt;br /&gt;
* Ed Felten explains how you can tell someone had an abortion from studying the metadata of their phone calls: (http://www.washingtonpost.com/blogs/the-switch/wp/2013/08/27/heres-how-phone-metadata-can-reveal-your-affairs-abortions-and-other-secrets/)&lt;br /&gt;
* Hello Barbie points at the limits of eavesdropping, privacy and how devices are sending data to third actor partiesː (http://www.washingtonpost.com/blogs/the-switch/wp/2015/03/11/privacy-advocates-try-to-keep-creepy-eavesdropping-hello-barbie-from-hitting-shelves/)&lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
You can't know exactly what is happening to your digital shadow or who might have to access to it, and that itself is a problem. Although this situation might seem dire, the idea is not to get paralyzed by paranoia but to try to demystify it for yourself and try out different methods for controlling and minimising your shadows. Some examples include reducing the amount of data you give away;  consciously stripping valuable information from content and metadata; exercising the art of self-doxing; and thinking about ways to play with and break up your online identity.&lt;br /&gt;
&lt;br /&gt;
The strategies and tools detailed below can increase your privacy, and help you to be more secure, both online and offline - without being less vocal or reducing your activity online. To move towards getting some control over your digital shadow, a good place to start is to see what it looks like (as far as is possible) and explore the size, depth and characteristics of your digital shadow:&lt;br /&gt;
&lt;br /&gt;
* '''Trace My Shadowː''' (https://myshadow.org/trace-my-shadow) is a tool produced by Tactical Tech that allows you to see some of the traces you are leaving online, and it offers a lot of tips on how to protect your privacy.&lt;br /&gt;
* '''Digital Shadowː''' (https://digitalshadow.com) is a Facebook app developed by Ubisoft which illustrates what third parties can know about you through your Facebook profile. &lt;br /&gt;
* '''Panopticlickː''' (https://panopticlick.eff.org/) tests your browser to see how unique it is based on the information it will share with sites it visits. By using this application, your browser will be given a uniqueness score, letting you see how easily identifiable you might be as you surf the web.&lt;br /&gt;
* '''OpenPaths.ccː''' (https://openpaths.cc/) is a tool that allows you to track your location history over time with your smartphone. You can then visualise this data and see what kind of story it tells about you. &lt;br /&gt;
&lt;br /&gt;
'''Self-doxing:'''  Another strategy for exploring your visible traces and what is already out there about you on the internet is to dox yourself. '''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find their flaws. This technique is used sometimes by activists and investigative journalists to profile subjects of interest. It is also used as a strategy of harassment online. &amp;quot;Self-doxing&amp;quot;, or researching yourself, is a technique that can help you to make informed decisions about what you share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (through websites such as: http://www.whois-search.com/ or similar). &lt;br /&gt;
&lt;br /&gt;
Remember, even while you are exploring yourself, other people can be exploring you too. So  when you are using these web services and looking for your digital shadow, a good idea is to use anonymisation tools like Torbrowser(https://www.torproject.org/projects/torbrowser.html.en).&lt;br /&gt;
&lt;br /&gt;
'''Further Readings:'''&lt;br /&gt;
&lt;br /&gt;
* Advice on doxing your harassers as a way to assess your risk: (https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk)&lt;br /&gt;
* Tips no how self-dox yourself (or to dox someone else): (https://lilithlela.cyberguerrilla.org/?page_id=93870)&lt;br /&gt;
* Anonymous Activism/Tor for Feminists by Fembot collectiveː (http://fembotcollective.org/blog/2015/05/06/toolkit-anonymous/)&lt;br /&gt;
&lt;br /&gt;
==== Mapping ====&lt;br /&gt;
&lt;br /&gt;
While we have explained what steps you might take to explore your personal digital shadow and traces you leave online, you will also need to enlarge this exploration to the people you interact with online.  &lt;br /&gt;
&lt;br /&gt;
Everyone belongs to several social domains - your work or advocacy networks, your family networks, friends, sports teams, whatever. Some networks may feel safer than others. For example, you may be more vigilant about what you share and how you share it in your work or advocacy activities, but less so for interacting with friends on a social networking platform. &lt;br /&gt;
&lt;br /&gt;
If you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in a social networking platform that you like a particular kind of game, an attacker who wants to investigate your work or advocacy activities might trick you into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if your work identity and your gaming profile can be connected to the same person; and this is why separating your social domains can be useful. To separate your social domains, it's helpful to first map them out and identify which ones could expose you most. &lt;br /&gt;
&lt;br /&gt;
You can do this by thinking about your different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not. You can do this by considering the data that you handle in the different realms of your life and ask yourself: what would happen if this particular data suddenly disappeared or if it was seen, copied and distributed by a third actor party? &lt;br /&gt;
&lt;br /&gt;
'''Example:''' Polish computer security researcher Joanna Rutkowska developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain, including her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the encrypted communication with her partner.&lt;br /&gt;
* The '''red''' domain includes the totally untrusted areas which don’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
This might be a technical example, but it illustrates the concept of security by isolation very well as it recognises that security measures can always be vulnerable and that harm can be reduced by stopping possible attackers from accessing the whole system that needs to be secured. This example can be applied in other ways to your own social domains.&lt;br /&gt;
&lt;br /&gt;
Further readingsː &lt;br /&gt;
* You can find more details about Rutkowska's scheme here: (http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html). &lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
Finding out what data exists out there and can be accessed by others is an empowering first step. There are also measures you can take to control what content and metadata you give away. When you publish content on the internet, it is always a good idea to ask yourself if what you are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to your personal life, the names you mention or the images you upload may contribute to a picture about who you are, what you are doing, where you are doing it and so on. This could be used by people who wish to target you. &lt;br /&gt;
&lt;br /&gt;
This does not mean that you should silence yourself – by taking some basic steps, you can limit your risks. You can think of these as increasing the amount of effort someone who wants to surveil or attack you or your contacts would need to take. &lt;br /&gt;
&lt;br /&gt;
'''Controlling your content when connecting to the internet'''&lt;br /&gt;
 &lt;br /&gt;
* When '''giving personal information to a web service''', make sure the service provides an '''encrypted connection''' for you to access it from (the url should begin with https://). You can use the browser add-on '''Https Everywhere''' for Firefox, Chrome and Opera browsers, provided by the Electronic Frontier Foundation to help you force https connections with websites that have them (https://www.eff.org/https-everywhere). &lt;br /&gt;
&lt;br /&gt;
* Using '''Torbrowser''' will '''hide specific metadata like your IP address''', thereby increasing your anonymity online. (See https://securityinabox.org/en/guide/anonymity-and-circumvention)&lt;br /&gt;
&lt;br /&gt;
* You can install add-ons like '''Privacy Badger''' or '''Adblock Plus''' for the Firefox Browser, as well as by monitoring your privacy settings and deleting '''cookies''' on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* You should '''use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts. (See https://securityinabox.org/en/guide/passwords)&lt;br /&gt;
&lt;br /&gt;
'''Controlling your content when publishing online'''&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about your life''', you can use '''private profiles''' that can only be accessed by selected contacts. When using those on commercial social networking platforms, you should be aware of the '''regular changes to the privacy policies''' of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' online, you should ask yourself if the information you spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called '''ObscuraCam''', a free camera application for Android devices. (https://guardianproject.info/apps/obscuracam)&lt;br /&gt;
&lt;br /&gt;
'''Controlling your content by reducing your metadata:'''&lt;br /&gt;
&lt;br /&gt;
* You can '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, you don't need to use your real name. This prevents the metadata created when using this device or software from being connected to you. &lt;br /&gt;
&lt;br /&gt;
* When '''publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or you can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  You can use '''tools to remove metadata from certain files'''. For images there is '''Metanull''' for Windows (https://securityinabox.org/en/lgbti-africa/metanull/windows). For '''PDFs''', Windows or MAC OS users can use programs such as '''Adobe Acrobat XI Pro''' (for which a trial version is available). GNU/Linux users can use '''PDF MOD''', a free and open source tool. (Note: this tool  doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF.) For a full guide to'''removing metadata from different file formats''', see Tactical Tech's resource: https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
'''Controlling your content by deleting accountsː'''&lt;br /&gt;
&lt;br /&gt;
One method of controlling your shadow is reducing the number of platforms and services you can be found on. Some tools to help you delete existing accounts include: &lt;br /&gt;
 &lt;br /&gt;
* The '''Suicide Machineː''' (http://suicidemachine.org) is a tool that facilitates the process of deleting social media profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKillerː''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Meː''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once you have identified your different social domains and the digital activities and contacts that go with them, what you need to do is decide if you want to differentiate your identities accordingly, or if you'd rather stick to your official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
Once you have identified your different social domains and the digital activities and contacts that go with them, what you need to do is decide if you want to differentiate your identities accordingly, or if you'd rather stick to your official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
You may want to keep your work connected to your legal or &amp;quot;real&amp;quot; identity, or think that your activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social media, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific situation the following questions: &lt;br /&gt;
&lt;br /&gt;
* Would my safety, job or livelihood be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
These questions are part of a basic risk assessment which can you use at many different points when thinking about your digital security and privacy. Once you have assessed your risk, you can then consider different strategies for separating your identities online. These range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
'''Relevant links:'''&lt;br /&gt;
&lt;br /&gt;
* Tactical Tech's guide to risk assessment: (https://securityinabox.org/en/lgbti-mena/security-risk)&lt;br /&gt;
* Electronic Frontier Foundation's guide to threat modeling: (https://ssd.eff.org/en/module/introduction-threat-modeling)&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding talks about her decision to start writing under her real name, dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
For instance the project Geek Wiki Feminism reveals how certain groups of people are disadvantaged by policies which require individuals to use their real or legal names. These include women, queers, trans* persons, differently-abled persons, children and parents. The costs to these groups when having a public profile attached to their real name can range from discrimination in employment or provision of services to arrest,imprisonment or execution in some jurisdictions.  For a comprehensive list of which groups of people are affected and how they are affected see Geek Wiki Feminism (http://geekfeminism.wikia.com/wiki/Who_is_harmed_by_a_%22Real_Names%22_policy%3F)&lt;br /&gt;
&lt;br /&gt;
'''Further readings:'''&lt;br /&gt;
&lt;br /&gt;
* Kate Harding talks about her decision to start writing under her real nameː (http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name/)&lt;br /&gt;
* How Facebook's real name policy affects LGBTQ persons: (https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community)&lt;br /&gt;
* Geek Feminism Wiki - Who is harmed by a &amp;quot;Real Names&amp;quot; policy?ː (http://geekfeminism.wikia.com/wiki/Who_is_harmed_by_a_%22Real_Names%22_policy%3F)&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, Vani, a human rights activist, writes: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless” (http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously).&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where you don't need to gain other people's trust, when there are few or no people you can trust, or when you don't want to expose others in your life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance, you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you, as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When you adopt anonymity as a strategy you may use pseudonyms, but these should not be used across different networks or social domains, and some may only be used once and then discarded. Because of this, anonymity differs from persistent pseudonymity. &lt;br /&gt;
&lt;br /&gt;
'''Relevant links:''' &lt;br /&gt;
&lt;br /&gt;
* The anonymity decision for bloggers: (https://advocacy.globalvoicesonline.org/2015/05/01/to-be-or-not-to-be-anonymous-how-should-bloggers-decide/)&lt;br /&gt;
* How the real identity of the blogger behind the Gay Girl blog was revealed by online investigation: http://electronicintifada.net/blogs/ali-abunimah/new-evidence-about-amina-gay-girl-damascus-hoax&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name used consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;. There are myriad reasons why you might want to use a name other than the one you were born with such as to hide your gender or protect your privacy. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At the time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot;  which typically means using your legal name or the name by which you are commonly known. This policy has caused many users to lose their Facebook accounts among which we find feminists groups, trans* persons and drag kings and queens known for their pseudonymous rather than their legal name. If you choose to use a pseudonym on social networks, it is important to understand that you can be reported for using a &amp;quot;fake name&amp;quot; and possibly have your account deleted. A strategy for avoiding that is using a name-shaped pseudonym. &lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers '''visibility''', which allows to network with others, and by pinning your voice to a particular name you can develop an '''online reputation'''. This depends on others to decide whether you are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to your legal identity, or not. The choice to connect your online reputation to your &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
'''Relevant links:''' &lt;br /&gt;
&lt;br /&gt;
* The many reasons people use pseudonyms: (https://www.eff.org/deeplinks/2011/07/case-pseudonyms)&lt;br /&gt;
* Geek Wiki Feminism on Pseudonymousː(http://geekfeminism.wikia.com/wiki/Pseudonymity) and a bingo about it (http://geekfeminism.org/2011/07/08/anti-pseudonym-bingo/)&lt;br /&gt;
* A blogger explains how a human error exposed her pseudomynous online identity which put her work identity at risk: (http://disabledfeminists.com/2010/04/14/on-refusing-to-tell-you-my-name/)&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. For centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity. &lt;br /&gt;
&lt;br /&gt;
'''Some examples of collective identities:'''&lt;br /&gt;
&lt;br /&gt;
'''Captain Swing:''' the identity used by farm workers in their letters of protest during the English Swing Riots in 1830 (https://en.wikipedia.org/wiki/Captain_Swing)&lt;br /&gt;
&lt;br /&gt;
'''Luther Blisset:''' a name originally belonging to an Italian footballer which was adopted and used by many artists and activists for various actions and projects (https://en.wikipedia.org/wiki/Luther_Blissett_%28nom_de_plume%29)&lt;br /&gt;
&lt;br /&gt;
'''Guerrilla Girls:''' an anonymous group of feminist and female artists devoted to fighting sexism and racism within the art world (http://guerrillagirls.com/)  &lt;br /&gt;
&lt;br /&gt;
'''Netochka Nezvanovaː''' might be a collective name or it might be one women only. Netochka is the human face of a software tool kit used for digital video in real time. Netochka used to give the interviews to promote the software. However when she showed up in person, she was frequently embodied by different women (http://www.salon.com/2002/03/01/netochka/)&lt;br /&gt;
&lt;br /&gt;
'''Kolena lailaː''' was started by a group of young women bloggers in Egypt in 2006. the initiative devotes one day a year to mobilize all Arab woman bloggers to speak out on different forms of oppressions they face under one banner; Kolena Laila means we are all Laila, the protagonist of “The Open Door” (Latifa El Zayyat)(http://yfa.awid.org/2010/04/blogging-initiative-amplifies-voices-of-young-arab-women/)&lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice you make, what is important is that you keep your domains effectively separated. No matter how many domains you identify in your digital life, and how many corresponding identities you create, on the internet every identity - even the one bearing your real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example '''Tor''' or '''TAILS''')&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
Once something is on the internet it will stay on the internet, as the internet does not forget. You may think that deleting certain sensitive data from social networking platforms and web services may be enough to protect yourself, but remember that metadata cannot be deleted as easily. And using just one identity through your whole life - in all your work and personal domains - creates a bulk of information that makes it easier to profile you. &lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of your social domains. You might also choose to use your real identity in some areas, and your new alternative identities in others. Take into account the following recommendations when creating new online identities:&lt;br /&gt;
&lt;br /&gt;
* You should select the contacts for each one carefully, and avoid sharing contacts with other identities you use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and if possible, even devices.&lt;br /&gt;
&lt;br /&gt;
* Your various identities should not linked to each other, or to your real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number, or using a persistent pseudonymous when creating a one time use disposable email.&lt;br /&gt;
&lt;br /&gt;
* Creating disposable  extra identities can be useful, as they can be discarded easily if compromised. Those  can also can  be created for new acquaintances when appropriate as introductory profiles to get to know somebody before you include them in your more trusted network.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
Many platforms have &amp;quot;real name&amp;quot; policies so if you want to use commercial social networking platforms, it is better to use a credible name and surname rather than more imaginative ones. &lt;br /&gt;
&lt;br /&gt;
Once you have decided on a name, a surname, and a username for your virtual persona, you should do thorough research - perhaps also using doxing tools and techniques - to find out if someone else is already using that name. After all, if you wish to develop your own reputation, you don’t want to be confused with someone else, especially if they don’t share your views of the world or if your activities might put them at risk!&lt;br /&gt;
&lt;br /&gt;
Then you need to create a story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role. You can invent a new story if you feel particularly inspired or base your story on a “known” person’s story, a superhero, a fictional character from your favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when you create an identity you should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
'''Further reading:'''&lt;br /&gt;
&lt;br /&gt;
* Helpful tips for inventing a new identity: (http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed)&lt;br /&gt;
* Artist Curtis Wallen's experience of creating a new online identity: (http://www.theatlantic.com/technology/archive/2014/07/how-to-invent-a-person-online/374837/)&lt;br /&gt;
&lt;br /&gt;
==== Credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If you keep all your normal identifying traits - such as your gender, job, attitude or the way you write - it might be possible for someone to connect the dots and link your pseudonymous personas with your real identity. &lt;br /&gt;
&lt;br /&gt;
* '''Work:''' Your persona should have a job that is different from yours, but not so different that you don’t know anything about that field: for example, they shouldn’t be a surgeon if you don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*'''Skills and interests:''' Similar considerations should be made to select your persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
*'''Psychological attitude:''' A good way to give your persona depth is by creating some &amp;quot;weak spots&amp;quot; which are not the same as your own. So when the persona gets attacked, you can laugh about it and not experience harm. E.g if you have a good sense of humour, try impersonating a humourless person! &lt;br /&gt;
&lt;br /&gt;
* '''Linguistic fingerprint:''' This could be identified through a &amp;quot;stylometric analysis&amp;quot; that makes it possible to identify the author of a particular text. To change this, you can start by using a spell-checker in your word processor to check for consistent typos and you could also think about adopting a different writing attitude. You could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
In any case, you should always remember that on the internet, each one of your identities - even the one connected to your real name - is a “virtual” identity, and it is always better to decide what character traits you want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for your “real” online identity.&lt;br /&gt;
&lt;br /&gt;
'''Relevant links:'''&lt;br /&gt;
&lt;br /&gt;
* Tips for creating a rounded character for your identities: /https://lilithlela.cyberguerrilla.org/?page_id=94049)&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Maintaining multiple identities is some work, but like most of these practices, it just requires some curiosity, patience and attention. The main point is to keep your identities separated otherwise they will very quickly begin to mix with one another. As a start, you can keep notes on your identities to help you to avoid any awkward situations where you confuse one with the other (but do think carefully about where you host or keep those notes!) There are also technical things you can do:  &lt;br /&gt;
&lt;br /&gt;
* Create '''different browser profiles''' so that your browsing habits are captured under different identities, on Firefox (https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles) or Google Chrome (https://support.google.com/chrome/answer/2364824)&lt;br /&gt;
* When creating a new email account or social media account for your identity, it is a good idea to '''connect to the server’s website with Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
* If you have the resources and motivation you can separate your identities per device or operating system. This can include using virtual machines for instance, as explained below. &lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains you need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In other cases, though, all you need is a disposable email address that you only need to use for opening an account in an untrusted platform. This will reduce the number of traces connected to the email address you use for your work or personal life and minimise the amount of spam in your life. Below are some services which can help you set up these disposable accounts and addresses:&lt;br /&gt;
&lt;br /&gt;
* '''Anonbox:'''(https://anonbox.net) is a service provided by the Chaos Computer Club (CCC) gives you a mailbox for a day. &lt;br /&gt;
* '''Guerilla Mail:''' (https://www.guerrillamail.com) lets you choose your email id and holds any mail you receive to it in a mailbox for one hour. &lt;br /&gt;
* '''BugMeNot:''' (http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use. &lt;br /&gt;
* '''Fakena.me:''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that will give you all the fake info you need to set up an account (fake name, birth date, US only address, username and password) as well as a link to an associated guerillamail mailbox. &lt;br /&gt;
* '''Instant Internet Decoy:''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions. &lt;br /&gt;
&lt;br /&gt;
Another option is to set up a '''mail alias''' - a different email address that is connected to your main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised you can just dispose of it and create a new one. But beware that is very easy to check what the source email address, so don't use this method when you really need to disguise your identity.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup''' (https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org). &lt;br /&gt;
&lt;br /&gt;
'''Relevant links:''' &lt;br /&gt;
&lt;br /&gt;
* A list of autonomous email providers compiled by Riseup: (https://help.riseup.net/en/radical-servers)&lt;br /&gt;
&lt;br /&gt;
==== Commercial social networking platforms ====&lt;br /&gt;
&lt;br /&gt;
Before choosing to use any social networking platform there are some basic security and privacy questions you should ask, regardless of which identity you plan on using:&lt;br /&gt;
&lt;br /&gt;
* Does it provide an '''encrypted connection (https)''' for all uses of the site, rather than just during login? Are there any problems related to encryption (e.g. related to encryption certificates)? &lt;br /&gt;
&lt;br /&gt;
* According to the platform's '''End User Licence Agreement''', '''Privacy Policy and/or Data Use Policy''', how is your content and personal data treated? With whom are they shared? &lt;br /&gt;
&lt;br /&gt;
* What privacy options are provided for users? For example, can you choose to share your videos securely with a small number of individuals, or are they all public by default? &lt;br /&gt;
&lt;br /&gt;
* Is the '''geographical location of the servers known'''? Under which '''territorial jurisdiction''' do they fall? Where is the company registered? How does this information relate to the privacy and security of your activity and information?&lt;br /&gt;
&lt;br /&gt;
Now when you think about crafting a separate identity and letting it out on commercial social networking platforms, there are additional precautions to take: &lt;br /&gt;
&lt;br /&gt;
* When '''creating a social networking account for a new persona''', use the browser profile you have created for that persona. Make sure to '''check the privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
* Have fun with '''the profile information you provide''' but remember that this information is publicly available, so think about the message you want to convey with it. &lt;br /&gt;
&lt;br /&gt;
* Make sure your contacts do not overlap with your other identities, and your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
* To '''make your identities look like different people''', you can publish from your various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. &lt;br /&gt;
&lt;br /&gt;
* It can be a good idea to follow, from your pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance your real identity from your pseudonymous identities, you can also write (and hashtag on Twitter) posts under your pseudonymous profiles about events that you are not attending, especially if they are taking place far away from you. It can also be fun to publish and then delete posts that look like you have exposed your identity, so as to further confuse anyone who may try to unmask you.&lt;br /&gt;
&lt;br /&gt;
* If you are using a GPS-enabled phone, most '''social networking platforms will display your location where they can'''. This function is generally provided when you interact with the platform using a GPS-enabled phone, but the network your computer is connected to may also provide location data. It's always a good idea to '''double-check your settings''' - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
* If you '''access social networking platforms via mobile apps''', it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
'''Relevant links:'''&lt;br /&gt;
&lt;br /&gt;
* '''Terms of Service; Didn’t Read:''' (https://tosdr.org) provides a summary in &amp;quot;human language&amp;quot; of the Terms of Service of many popular social networking platforms and other websites.&lt;br /&gt;
* '''Women, action and the media:''' (http://www.womenactionmedia.org/facebookaction/)&lt;br /&gt;
* Help on scheduling Facebook posts: (https://www.facebook.com/help/389849807718635)&lt;br /&gt;
* Tools for scheduling posts on Twitter and other platforms: Buffer (https://buffer.com) and Postcron (https://postcron.com)&lt;br /&gt;
&lt;br /&gt;
==== Alternative social networking platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms can be extremely useful if your intention is to publicise as widely as possible an event you are organizing or a project you are launching. You can think of them as a megaphone - a great tool for getting attention and drawing a crowd but not ideal for communicating anything sensitive or private. There are numerous reasons why they are not considered security or privacy conscious. To begin they have very strict terms of service that could justify their decision to close your accounts if they find that your contents go against their rules. They also profile the users and send the information to advertisers. If you add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to your data. &lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms can be extremely useful if your intention is to publicise as widely as possible an event you are organizing or a project you are launching. But they definitely have their downsides. They have very strict terms of service that could justify their decision to close your accounts if they find that your contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html). They also profile the users and send the information to advertisers. If you add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to your data. &lt;br /&gt;
&lt;br /&gt;
So be strategic. Limit the use of commercial social networking platforms to specific projects you want to publicise to a wide audience. For other purposes, there are alternative social networking platforms that give much more freedom to their users and don't profile them. These are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Examples include: &lt;br /&gt;
&lt;br /&gt;
'''Diaspora:''' (https://joindiaspora.com) offers a community driven micro-tweeting platform&lt;br /&gt;
'''Friendica:''' (https://friendica.com) enables users to integrate their contacts from different social networking platforms (Facebook, Twitter, Diaspora, GNU social, App.net, Pump.io, etc), &lt;br /&gt;
'''N-1:''' (https://n-1.cc/) offers a wide range of tools such as wiki, pads, mailing lists and has a clear anti-sexist terms of service&lt;br /&gt;
'''Crabgrass:''' (https://we.riseup.net) has been around for more than ten years and constitute a solid and sustainable social networking alternative.  &lt;br /&gt;
&lt;br /&gt;
There may be similar sites popular in different regions, so you may wish to research them.  &lt;br /&gt;
&lt;br /&gt;
'''Relevant links:''' &lt;br /&gt;
* How social network policies are changing speech and privacy norms: (http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
* Helpful chart comparing various alternative social networking platforms: (https://en.wikipedia.org/wiki/Comparison_of_software_and_protocols_for_distributed_social_networking)&lt;br /&gt;
&lt;br /&gt;
==== Blogs and websites ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free:&lt;br /&gt;
&lt;br /&gt;
'''Wordpress:''' (https://wordpress.org) very popular and easy to use, open-source. &lt;br /&gt;
&lt;br /&gt;
'''Noblogs:''' (http://noblogs.org) security-oriented blogging platform based on Wordpress with some tweaks for additional user privacy, managed autonomous servers, Autistici/Inventati. &lt;br /&gt;
&lt;br /&gt;
'''BlackBlogs:''' (http://blackblogs.org) similar to Noblogs, managed by German tech collective, Nadir.&lt;br /&gt;
&lt;br /&gt;
If you want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, you can create your own website. For this you need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with Austistici/Inventati, which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If you want to use your own '''domain''' name, bypassing payments and identifications may get difficult unless you use '''Bitcoin''' or another anonymous payment system. The personal data you will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites (e.g: https://www.gandi.net/whois). To avoid this, you can register your domain with the data of an association and use a prepaid credit card that is not connected to your own data (if available in your country). Alternatively, you can use a registrar like '''Gandi''' (https://www.gandi.net) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting you; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic approaches is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that needs to be secured.&lt;br /&gt;
&lt;br /&gt;
If you use the same operating system for your several identities, no matter how carefully you separate your profiles you can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile you have assigned to your &amp;quot;real&amp;quot; identity, or get infected by a malware that allows your attacker to monitor everything you do online, with all your identities. &lt;br /&gt;
&lt;br /&gt;
To mitigate these risks, you could set up a different device for each of your domains but most of us don't have that kind of resources. A more feasible option is to set up a different operating system by using a GNU/Linux live distribution like Tails or by using virtual machines. A virtual machine (VM) can be described as a simulated computer with its own operating system, which runs as software on your physical computer. You can think of a VM as a computer within a computer. This strategy can be useful for anonymisation but also for sharing machines with others or for example for opening untrusted attachments in isolation in order to avoid a malware infection of your entire system. &lt;br /&gt;
&lt;br /&gt;
The three tools proposed here – Tails, Whonix and Qubes OS – provide you with separate operating systems for managing your alternate identities, and can be quite useful to make sure that you don’t reveal your true identity while you use the anonymous one(s).  Take into account that all the solutions detailed below are free and open-source Linux distributions and that they have been designed to maximise the privacy and security of its users. &lt;br /&gt;
&lt;br /&gt;
'''Tails, or The Amnesic Incognito Live System: ''' (https://tails.boum.org/) is a live operating system designed to help you use the internet anonymously and evade censorship. It can be run on almost any computer directly from a DVD, USB stick, or SD card and then shut down again without leaving a trace. It forces all the computers outgoing connections to go through Tor, blocking direct, non-anonymous connections. Using Tails is pretty easy, and if what you want to do with your virtual identity needs anonymisation, then it may be worthwhile to overcome the initial obstacle of installing it on a USB stick and launching it. Tails is a good option also if you have few resources, if you don’t have a computer of your own, or if you often use computers at internet cafes and want to be safer. If you want to keep the files you have created on the system or save your actions, you need to enable this option when you start it. Tails is an established, respected project that has been developed for many years and is used by a wide community of people. &lt;br /&gt;
&lt;br /&gt;
* System requirements: Tails should work on any computer manufactured after 2005 (https://tails.boum.org/doc/about/requirements/index.en.html)&lt;br /&gt;
&lt;br /&gt;
* Documentation: https://tails.boum.org/doc/index.en.html&lt;br /&gt;
&lt;br /&gt;
'''Whonix: (https://www.whonix.org)''' is an operating system created to run in a virtual machine that is designed to protect your anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a relatively recent project and the community using it is still rather small. &lt;br /&gt;
&lt;br /&gt;
* System requirements: You will need a good machine where you can run Virtualbox (https://www.virtualbox.org) in order to install Whonix (https://www.whonix.org/wiki/System_Requirements).&lt;br /&gt;
&lt;br /&gt;
* Documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
'''Qubes:''' (https://www.qubes-os.org) keeps the things you do on your computer securely isolated in different virtual machines so that if one VM gets compromised, nothing else will be affected. This way, you can do everything on a single physical computer without having to worry that one successful cyberattack harms your whole system, potentially revealing all the connections among your several identities. Qubes OS is a good choice if you want to keep all your activities inside your own computer without having to install anything else and if what you are trying to do is to effectively separate your identities rather than anonymise your activities online. &lt;br /&gt;
&lt;br /&gt;
*System requirements: Qubes requires a very powerful computer (http://qubes-os.org/trac/wiki/SystemRequirements) – this can be a hindrance, but if you feel that you really need to protect yourself against possible digital attacks, the investment may be worth its while. &lt;br /&gt;
&lt;br /&gt;
* Documentation: https://www.qubes-os.org/doc/&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protect you from every threat, and you shouldn’t look at them as a magic potion that will make you invulnerable. Nevertheless, by using any of them, according to your needs and resources, you will raise the level of effort that an attacker will need to harm you, thus making an attack less likely. &lt;br /&gt;
&lt;br /&gt;
'''Relevant links:''' &lt;br /&gt;
* A wider comparison of other such operating systems: https://www.whonix.org/wiki/Comparison_with_Others &lt;br /&gt;
* Qubes developer Johanna Rutowska describes how she partitioned her life into security domains: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
== Synthesis == &lt;br /&gt;
&lt;br /&gt;
This section of the manual has looked at how to include gender into individual security and privacy practices by focusing on the question of identity, exploring what digital shadows mean for each of us alone, and collectively as women and trans* persons. It also covered practical steps you can take to control and play with your identity/ies. However most of you will also want to communicate and organise with others. So, how do you create and maintain pockets of comfort and safety in digital space for discussion, support and presence between those who share common goals, views or mandates, whether it be within your organisation or more broadly in your communities. And what are the strategies for increasing visibility and resistance in inhospitable spaces, which exclude or harm us.  The second section of the manual looks beyond the choices and practices available to the individual, and delves into the management of space, looking at strategies for building safe spaces both online and offline.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Chapter 2: Safe spaces'''&lt;br /&gt;
&lt;br /&gt;
== Safe Spaces ==&lt;br /&gt;
&lt;br /&gt;
Safe spaces can be understood as spaces that are created though explicit community agreement, or through implicit sharing of values. They enable members of a group to flourish, empower themselves and create community. Safe environments for discussion and awareness-raising have played a key role in many women's liberation movements.&lt;br /&gt;
&lt;br /&gt;
As explained by integrated security trainer, Sandra Ljubinkovic, safe spaces are important for any integrated approach to security because they enable an environment that support people to express their emotions without fearing any judgment: “Creating a safe space is crucial for creating a sense of physical safety as well as a sense of confidence in a group. It is important for participants who usually have no time to relax to feel comfortable and enjoy simple things­. And if they live in a country where their lives are in danger it is even more crucial to make sure that they feel physically safe. Safe space in a group means a space to feel comfortable and speak openly and freely about feelings, challenges, and emotions as they may arise. In the workshops where issues personally affect people (whether those are physical, emotional, or spiritual threats and challenges), participants may have strong emotions as they do their own inner work facing their own oppression, privilege, anger, hurt, pain and suffering”.  &lt;br /&gt;
&lt;br /&gt;
Safe spaces can be temporary and take place during a one time event or training, they can also become permanent spaces when collectives or organisations embed the basic principles of safeness, support, respect and inclusiveness in their own space management. &lt;br /&gt;
&lt;br /&gt;
Whatever  format or style is used, a safe space should allow allow women and trans* persons to access and learn about technology and related fields without having to fear sexist language and attitudes, being challenged, mocked or mansplained. There are many possible event formats and styles which can support the creation of safe spaces, both online and offline, to allow women, trans* and other groups to communicate and exchange in a nurturing and welcoming environment.  &lt;br /&gt;
&lt;br /&gt;
You might assume that the online communities you create or take part in through social media, discussion lists  and chat  channels are inherently democratic, non-hierarchical, participatory and relatively safe. However online spaces often reproduce the same hierarchies, privileges and power relations that exist in society, in the offline world. &lt;br /&gt;
&lt;br /&gt;
It's important to be mindful of this and to think through ways to mitigate and limit these downsides in order to get the best out of our spaces. Using such strategies is about caring for ourselves and for the communities we are part of. Making these issues explicit and visible is also about agency, social justice and feminism, helping us to better shape the spaces we care about, we organise in and within which we grow. &lt;br /&gt;
&lt;br /&gt;
This section, will first look at building safe spaces online for enabling a better and safer collaboration among us through the use of mailing lists, chat, and other collaborative tools such as forums, wikis and pads. It will also look at how to use these tools tactically, in a way that supports the creation and maintenance of safe space. The tools that have been highlighted in this section have been included because they are free and open source, and are designed and administered with increased privacy and security in mind, minimising the amount of traces we leave online. &lt;br /&gt;
&lt;br /&gt;
Second, the section will focus on strategies of resistance in public spaces which are not inherently safe - for instance Twitter and Wikipedia. Those examples are designed to give us insight into how we can create safety online collectively by developing feminist counterspeech, storming and swarming together in order to protect and support each other. &lt;br /&gt;
&lt;br /&gt;
Finally it will loop back to the offline world and discuss ways to build safe spaces offline in the physical world, such as through women and trans* only or mixed spaces, to learn and Do-it-Together.&lt;br /&gt;
&lt;br /&gt;
== Collaboration ==&lt;br /&gt;
&lt;br /&gt;
===  Mailing lists ===&lt;br /&gt;
&lt;br /&gt;
Mailing lists are one of the oldest forms of social networks, allowing a group to discuss and organise, to exchange information, video, audio and images. A mailing list is a list of addresses to which the same information is sent simultaneously.  The most common types of mailing lists are announcement lists and discussion lists. &lt;br /&gt;
&lt;br /&gt;
If you have decided within your group that you need a secure communication channel and that you do not want to use corporate services, there are some good alternative services to choose from, often recommended for human rights defenders. Riseup, Aktivix and Autistici/Inventati (A/I Collective) are all free services that prioritise security and user privacy. Riseup in particular has many feminist- and queer-oriented lists and is therefore a great place to host your mailing list. On their website you can also have a look at the lists that already exist. &lt;br /&gt;
&lt;br /&gt;
'''Riseup lists:''' https://lists.riseup.net/www/&lt;br /&gt;
&lt;br /&gt;
'''Aktivix lists:''' https://lists.aktivix.org/mailman/listinfo&lt;br /&gt;
&lt;br /&gt;
'''Autistici lists:''' http://www.autistici.org/en/services/lists.html&lt;br /&gt;
&lt;br /&gt;
If you or your organisation has your own server you can also install your own software for managing mailing list and ensure that all your communications remains hosted and safe in your own machine and can not be intercepted by unintended third parties. More information at: https://en.wikipedia.org/wiki/Category:Free_mailing_list_software&lt;br /&gt;
&lt;br /&gt;
==== Open or closed? ====&lt;br /&gt;
&lt;br /&gt;
Once you are ready to create your mailing list you need to decide whether it will be open or closed. &lt;br /&gt;
&lt;br /&gt;
'''Open:''' An open list allows anyone to subscribe, and then once they have joined the list, to receive announcements or participate in the discussion. Subscription can either be automatic, or it can be approved by a moderator. This type of mailing list is good for reaching out to your potential allies, contributors and followers and keeping them update about your activities. &lt;br /&gt;
&lt;br /&gt;
'''Closed:''' Another option is to keep your mailing list closed. In a closed list, membership is limited, and all subscribers require approval before they can join the list.  It's possible to have a list that is publicised - ie that everyone knows about - but still closed. This type of list is useful when you want to discuss sensitive or personal topics and be sure that all members in the conversation are trustworthy.   &lt;br /&gt;
&lt;br /&gt;
Note that sometimes the archives of a list can be made public to anyone on the web, and will also therefore end up on search engines (like Google). Check if keeping a list open to new subscriptions automatically implies that the archives of the list will be made publicly available, or if they will only be accessible to those who have the subscription password. Sometimes you can choose whether you keep the archives public or not.&lt;br /&gt;
&lt;br /&gt;
If you intend to talk about sensitive issues (and talking about gender related topics is often a sensitive issue!) or if trust within the group is important for creating your safe space, you might want to set up a closed list and to keep your archives closed. If you do choose to leave your archives accessible, it is important to inform everyone subscribed to the list that any delicate topic or personal detail that pops up in your discussions will be potentially visible to anybody. &lt;br /&gt;
&lt;br /&gt;
'''Encrypted lists:''' If you want a high level of security, there is also the possibility of encrypting mailing lists. However, it is important to understand that this requires every participants to the list to already use encryption software like PGP or GPG. This type of list, based on software called Schleuder (http://schleuder2.nadir.org/) and developed by Nadir.org, is designed to serve as a tool for group communication, but this time with a strong emphasis on security.&lt;br /&gt;
&lt;br /&gt;
==== Policies ====&lt;br /&gt;
&lt;br /&gt;
Agreeing on a mailing list policy - a set of do's and don'ts for the list - from the start will save you a lot of time and possibly difficult conversations. Even on a closed list, publishing your policy - which should include the ways in which moderation takes place and how to report violations of the policy, - can be helpful in creating the online safe space you want everyone to feel comfortable in. Your policy can address tensions like the fact that being free to expressing emotion is an important feminist principle, but losing your temper and attacking someone you don't agree with on the list is not ok. In the end any good mailing list policy will set its own rules for achieving a correct balance between freedom of expression and opinion and impeding flames and racist, sexist, or homophobic attacks for instance to take place within the list.&lt;br /&gt;
&lt;br /&gt;
Having a visible and explicit policy sends a strong message about the value of maintaining the mailing list as a safe space. It can also help you to decide who can be added to your list and who not. To make sure that the policy does not get forgotten, you can regularly remind subscribers about it, with a link at the end of each mail you send out. &lt;br /&gt;
&lt;br /&gt;
'''Relevant links:'''&lt;br /&gt;
* Sample mailing list policies that can be adapted and used for your own purposes: for women-only communities (http://geekfeminism.wikia.com/wiki/Statement_of_purpose/Women-only_communities) and for communities including men (http://geekfeminism.wikia.com/wiki/Statement_of_purpose/Communities_including_men).&lt;br /&gt;
&lt;br /&gt;
==== Administration ==== &lt;br /&gt;
&lt;br /&gt;
'''Administrating a list:''' involves handling subscriptions and moderating content. You can choose how many administrators you want your list to have. Be aware that if your list suddenly becomes very chatty, this might be too demanding for just one person. Besides that, any communication tool including many members should not rely on only one person for administration duties. Take into account that this person could have problems, disapear or simply become abusive because of their power. Because of this, you should include more people helping with administration and moderation duties. A list can also be collectively managed and you can distribute those responsibilities among members of the list. &lt;br /&gt;
&lt;br /&gt;
'''Moderating a list:''' as a general rule, moderation has three main goals. First, a well-moderated community will be more productive and efficient in generating and distributing valuable information and knowledge to its members (subscribers). Second, good moderation will increase the accessibility and openness of online communities by enabling respectful dialogue among its members. Finally, it will lessen the demands on the infrastructure, as well as on the list members.&lt;br /&gt;
&lt;br /&gt;
Remember that any online safe space will apply the basic principles of ''net etiquette'' and that any good administrator, moderator and mailing list policy should review, adapt and include those principles in their core social norms and values and ask members of the list to discuss, understand and accept those. In a nutshell net etiquette requires users to: be nice, learn internet acronyms, keep messages brief, do not shout, protect personal information, help others, and to not send mails if feeling angry! (For more information see:  http://www.networketiquette.net/ and https://en.wikipedia.org/wiki/Etiquette_in_technology)&lt;br /&gt;
&lt;br /&gt;
==== Mailing list examples ====&lt;br /&gt;
&lt;br /&gt;
Before setting up your own mailing lists, you might want to engage with some of the established mailing lists focused on gender and technology. for example: &lt;br /&gt;
&lt;br /&gt;
Open Mailing lists:&lt;br /&gt;
&lt;br /&gt;
'''Take Back the Tech!:''' the mailing list associated with the collaborative campaign to reclaim information and communication technologies (ICT) to end violence against women (VAW). To register: https://lists.takebackthetech.net/mailman/listinfo/takebackthetech&lt;br /&gt;
&lt;br /&gt;
'''FemTechNet:''' is a network of scholars, students, and artists who work on, with, and at the borders of technology, science, and feminism in a variety of fields including Science and Technology Studies (STS), Media and Visual Studies, Art, Women’s, Queer, and Ethnic Studies. To register: http://femtechnet.newschool.edu/mailman/listinfo/femtechnet &lt;br /&gt;
&lt;br /&gt;
'''Queer Feminism Geek:''' is a network of feminist, queer and trans* hackers, makers, geeks and artists who organise activities and assemblies at the Computer Chaos Camp and Congress. To register: https://lists.riseup.net/www/subscribe/queerfeministgeeks &lt;br /&gt;
&lt;br /&gt;
'''Subscription after endorsement by others on the list:'''&lt;br /&gt;
&lt;br /&gt;
'''Fembot:''' is a network of scholars and students who focus on gender, media &amp;amp; technology. To register: https://lists.uoregon.edu/mailman/listinfo/fembot &lt;br /&gt;
&lt;br /&gt;
'''Femmehack:''' is a list created to organise a Global Feminist Hackathon that took place past 23th of May 2015 in loving memory of Sabeen Mahmud, a Woman Human Right Defender shot to death in  Pakistan: https://f3mhack.org&lt;br /&gt;
&lt;br /&gt;
'''TransHackFeminist:''' is a list that was created after the first THF convergence in 2014 where intersectional feminists, queer and trans* people of all genders met to better understand, use and ultimately develop free and liberating technologies for social dissent. It gathers members from all the over the world and uses Spanish and English to communicate: http://transhackfeminist.noblogs.org/files/2015/01/THF_report_Eng.pdf &lt;br /&gt;
&lt;br /&gt;
'''Closed mailing lists:'''&lt;br /&gt;
&lt;br /&gt;
'''Gender and Technology Institute Participants:''' The GTI list is a closed list of people who participated in the Gender and Technology Institute that took place past December 2014, inasmuch as it is opened to people trained by Tactical Technology Collective to privacy and digital security from a gender perspective. &lt;br /&gt;
&lt;br /&gt;
'''Ada camp:''' is a closed list that is dedicated to speaking about issues related to women in open source. It is composed of the people who participated in Ada Camp: https://adacamp.org/&lt;br /&gt;
&lt;br /&gt;
=== Chat with IRC ===&lt;br /&gt;
&lt;br /&gt;
Internet Relay Chat (IRC) is a chat service which can be hosted on different servers and accessed through different user clients. It provides the ability to set up channels or chatrooms which allow many people to contribute to a discussion in real time. IRC also gives you the option to encrypt your communication. You can’t embed video, audio or pictures, but you can link to them.&lt;br /&gt;
&lt;br /&gt;
While IRC can be a great tool for facilitating collaboration, there are things to bear in mind if you decide to use it. First, IRC can take a little time to get used to, depending on the skills in your group. Second, developing relationships across a purely text-based channel such as IRC can be challenging. Writing is not easy for everyone; and some in the group might not be using their mother tongue. &lt;br /&gt;
&lt;br /&gt;
'''Accessing IRC through your browser:''' There are several ways to chat through an IRC network. The easiest way to start out is to access an IRC network directly through your browser, such as one from Indymedia (https://irc.indymedia.nl/) or Freenode (https://webchat.freenode.net/). You can get set up immediately by creating a nickname and a channel, which you can then give to your colleagues to connect with you. &lt;br /&gt;
&lt;br /&gt;
'''Accessing IRC through a chat client:''' Connecting to an IRC network through your browser is, however, not the most secure option out there. If you are a more advanced user, or if you have already tested out IRC out and think it will work for your group, it can be better to access your chosen IRC network from a chat client. &lt;br /&gt;
&lt;br /&gt;
There are a few different chat clients which you can choose from, including Jitsi and Pidgin. You can read more about these clients and how to use them on Tactical Tech's Security in-a-Box: Jitsi (https://securityinabox.org/en/guide/jitsi/windows) ; Pidgin (https://securityinabox.org/en/guide/pidgin/windows).&lt;br /&gt;
&lt;br /&gt;
'''How to use a network:''' Advice and instructions on using an IRC network can be found on Freenode (https://freenode.net/using_the_network.shtml), Autistici (https://www.autistici.org/en/stuff/man_irc), and Indymedia (http://docs.indymedia.org/view/Sysadmin/IrcHowTo). The last two also allow us to anonymise our connections through Tor.&lt;br /&gt;
&lt;br /&gt;
'''Facilitating a meeting:''' Once you start an IRC meeting, it is useful to appoint a facilitator to keep track of time. This person might also be in charge of making sure the discussion sticks to the topics at hand. In order to create a welcoming environment and a safe space, acknowledging and valuing the voice of everyone is key on IRC. When you start a conversation, take time to greet people - in particular newcomers.  When facilitating a conversation:&lt;br /&gt;
 &lt;br /&gt;
* Set a time limit and stick to it because IRC meetings can be very tiring.&lt;br /&gt;
&lt;br /&gt;
* You might decide that people should be given turns to speak in order to ensure that everyone has space to express themselves. You can simply assign turns in alphabetical order of nicknames (or any order you want to give) for each of the points addressed. This can help structure the conversation and stop one person or a small group of people dominating the conversation. &lt;br /&gt;
&lt;br /&gt;
* IRC can go very fast, particularly if there are many people involved in the discussion. Getting everyone to slow down and read all the inputs can decrease frustration.&lt;br /&gt;
 &lt;br /&gt;
* It can be useful to end your input with “over” or &amp;quot;done&amp;quot;, so everyone knows when you have stopped speaking.&lt;br /&gt;
  &lt;br /&gt;
Whatever the facilitation methods you choose, communicate them explicitly to all the participants beforehand, for example in the email where you invite people to join the meeting.&lt;br /&gt;
&lt;br /&gt;
=== Forums, Wikis and Etherpads===&lt;br /&gt;
&lt;br /&gt;
Chat services and mailing lists can be extremely useful, but they will only take you so far. When it comes to managing collaboration between people living in different places, you will probably find yourself looking for something with more functionality.&lt;br /&gt;
&lt;br /&gt;
'''Internet forums:''' One of the oldest tools used for public discussions online are internet forums,  where discussions can be hosted over time and are at least temporarily archived. What really distinguishes a forum from a mailing list or IRC chat is that it has a tree-like structure and can contain a number of sub discussions, each with a different topic.&lt;br /&gt;
&lt;br /&gt;
'''Wikis:''' If you are looking for a tool to collaboratively write a text with many sections, or even to create the initial structure and content for a website, a wiki can be a useful tool. A wiki is a web application that allows for hierarchical structuring of content and tracks the edits and additions of the users, easily allowing you to revert changes, and move and delete content. &lt;br /&gt;
&lt;br /&gt;
Both forums and wikis need to be hosted on a server, so you'll need to know how to set one up and manage it. &lt;br /&gt;
&lt;br /&gt;
'''Etherpads''': For collaborating in real-time on documents, Etherpads are a great resource.  They are also a good alternative to corporate services like Google Docs, and are far more effective for co-editing text than, for example, sending mails back and forth.  The main thing you need to check for in an etherpad is that it is hosted with an encrypted connection (via SSL). A list of such etherpads can be found here: https://github.com/ether/etherpad-lite/wiki/Sites-that-run-Etherpad-Lite. &lt;br /&gt;
&lt;br /&gt;
* To '''create a new etherpad''' (ie, a new document that you are going to collaborate on), you need to decide on the name of the URL. Because each pad is open to anyone who has the URL,  you should give each pad a long and inventive name, so that it can't be easily guessed. For example: https://pad.riseup.net/p/feminists is not secure. A more complicated URL such as https://pad.riseup.net/p/FeministsRockAndTheyWillBeDoingGreatThingsToghether is much more secure. Once the etherpad has been created you can send the URL to your friends and colleagues to start collaborating on a document. &lt;br /&gt;
&lt;br /&gt;
* If you are worried about your etherpad being found by others, you can also consider a '''password-protected pad'''. For more on this, see: https://www.protectedtext.com/&lt;br /&gt;
&lt;br /&gt;
* Etherpads allow you be anonymous, use a pseudonym or use your real name. There is a colour-based system that differentiates the contributions of each participants on the Etherpad, so you can always see who is contributing what.&lt;br /&gt;
&lt;br /&gt;
== Safe spaces in the public sphere ==&lt;br /&gt;
There are many spaces which will feel inherently unsafe either because they explicitly or implicitly exclude women and trans* people, or because they harbour bigots. There are a number of ways to counter the vulnerability and intimidation we might feel online. One is through caring for our personal and collective safety, through using security -and privacy- enabling tools and techniques and managing safely our online identities. Another is shaping with others methods to reclaim and stay safe in the public sphere. Organising collective actions can be a powerful act of resistance, bringing attention and visibility to the situation and in turn helping to bring about transformation. &lt;br /&gt;
&lt;br /&gt;
'''Feminist counterspeech''' - creating counter-narratives online, or &amp;quot;talking back&amp;quot; -  is one strategy for making sexism visible and for responding to online attacks and harassment. It can be an effective tactic to create a sense of belonging and make visible the effectiveness of collective feminist actions online. There are many examples of feminist counterspeech in action - many of which you have probably seen and appreciated. The Everyday Sexism Project (https://twitter.com/everydaysexism), for example, catalogues instances of sexism experienced by women on a day-to-day basis; or Byefelipe (https://instagram.com/byefelipe/), the Instagram account which reposts abuse my men who turn hostile when rejected. Feminist counterspeech can also include tactics to enable the inclusion and visibility of women's contributions to knowledge platforms such as Wikipedia.&lt;br /&gt;
&lt;br /&gt;
=== Storming Wikipedia ===&lt;br /&gt;
&lt;br /&gt;
There have been many studies that have criticised the way in which knowledge is produced on Wikipedia. A 2010 survey (https://web.archive.org/web/20100414165445/http://wikipediasurvey.org/docs/Wikipedia_Overview_15March2010-FINAL.pdf)  conducted by the United Nations University found that only 13% of Wikipedia contributors identified as female. The fact that Wikipedia’s contributors are mostly men in their twenties and thirties, and disproportionately western, are important factors that influence content. &lt;br /&gt;
&lt;br /&gt;
Women who have played a significant role in history are also often missing from Wikipedia, and feminist, queer and trans* content is often challenged. &lt;br /&gt;
&lt;br /&gt;
The lack of gender and cultural diversity in the content on Wikipedia demands creative responses. Because of this partnerships, research, community organizing, socio-cultural and technical interventions should all be considered.  &lt;br /&gt;
&lt;br /&gt;
'''Storming Wikipedia''' or organising '''Edit-a-thons''' are two possible interventions. These enable participants to learn collectively how to edit and change content to better reflect their communities and histories. Learning how to edit Wikipedia can seem daunting, so collectively editing and creating pages is a great way to confront fears; to Do-It-With-Others (DIWO) in a safe space. Besides you will learn about the Wikipedia community values and principles and how such a large community-driven effort has, through the development of bottom-up social rules, become the most important encyclopedia in the world. All together, Wikipedia remains an important space worth investigating and reclaiming! &lt;br /&gt;
&lt;br /&gt;
Organising a wikistorming involves gathering a group of friends (and friends of friends) who want to learn or already know how to edit Wikipedia, and identify a safe space in which to hold the event. It can be held in someone’s home, in a community centre, at an art centre or at a community organisation. Wikistorming can (and should) of course be organised for any day, but Ada Lovelace Day in mid-October and International Women's Day on March 8 are two specific days on which such gatherings often happen. A wikistorming can last for half to a whole day.  Before the wikistorming or as part of it, decide which Wikipedia entries you want create or which existing page you want to edit. Be realistic in your goals and don't put too many edits on your agenda! To edit Wikipedia carefully takes time. &lt;br /&gt;
&lt;br /&gt;
'''Relevant links:''' &lt;br /&gt;
* Advice on organising a wikistorming: http://femtechnet.newschool.edu/wikistorming&lt;br /&gt;
* Great examples of wiki storming: https://blog.wikimedia.org/2015/03/05/wikipedia-edit-a-thons-international-womens-day/&lt;br /&gt;
* Lectures about the gender gap in wikipedia and how to overcome it: https://meta.wikimedia.org/wiki/Gender_gap&lt;br /&gt;
&lt;br /&gt;
[[File:We Can Edit.jpg|thumbnail|center]]&lt;br /&gt;
&lt;br /&gt;
=== Dealing with Trolls ===&lt;br /&gt;
Women and trans* persons who begin to grow a following and have influence online might experience what Kathy Siera describes as a “koolaid point” (http://seriouspony.com/trouble-at-the-koolaid-point/). This is a point at which a certain group of people decide that you have too much influence, and make it their mission to silence you or discredit you. This is commonly referred to as 'trolling' - although it is more often than not targeted, discriminatory in nature and hate-based. A troll's tactics can include anything from sending constant derogatory and belittling messages, to editing and distributing images, and even making threats. &lt;br /&gt;
&lt;br /&gt;
''Block or engage?'' &lt;br /&gt;
&lt;br /&gt;
There are two key ways you can deal with trolls. One is to '''block''' them and then '''report''' them to the platform you are using. The other is to engage with them. The decision on which way to go depends on what you want to achieve. &lt;br /&gt;
&lt;br /&gt;
'''Blocking''' trolls can sometimes be effective, and can allow you to continue with your work unimpeded. Projects like Block Together (https://blocktogether.org/) and Block Bot (http://www.theblockbot.com/sign_up) were developed to help people who are harassed share their blocklists with each other. &lt;br /&gt;
&lt;br /&gt;
When trolls are really committed to harassing you, however, blocking doesn't really help. A determined troll can create numerous different profiles (called “sock puppet accounts”) to continue the harassment, and this means your blocking has to keep up with their new account generation. This quickly becomes very tedious. &lt;br /&gt;
&lt;br /&gt;
Historically, platforms like Twitter and Facebook have not handled '''reports of intimidation and violence''' very well. However, this is beginning to change, as they recognise the severity of problem and see how it deters people with important voices from using their services.&lt;br /&gt;
&lt;br /&gt;
You might consider the alternative - '''engaging''' the trolls who are harassing you. One way to do this is to try and enter into rational arguments with them and interrogate their views. Another way is to try to shame them, or to use humour to deflate their egos. Effective engagement with trolls can actually help to generate debate and public interest around the act of harassment, and can involve others online in discussions about safe spaces, violence, sexism and online behaviour. It can also be a source of empowerment for the subjects of trolling: seeing others laugh at your harasser can be very uplifting.&lt;br /&gt;
&lt;br /&gt;
'''Swarming''' can be another way to drown out the voices of the harassers. This can be done in retro style by creating communities of support with your allies in social media spaces where you are likely to encounter harassment. When someone is being targeted, others can quickly be alerted and bombard the harasser with messages. The content of that message is up to you: it could be scolding, educational, or loving. Another option is: instead of directing messages towards the harasser, the swarm can fill the victim's content stream with lots of new content in order to quickly make the negative, violent content disappear into online history.&lt;br /&gt;
&lt;br /&gt;
If you want to engage with trolls, or try “swarming”, you might prefer to stay anonymous to avoid having your real identity trolled. Setting up a network of second accounts to do your troll-response work can be a good idea for your organisation or your community of friends. It might be easier too, psychologically, to say some of the things you want to trolls, than you would if the comments were linked to your main identity. And it is more performative: you can create any kind of identity you want and style it with an avatar, a funny name, a character etc. &lt;br /&gt;
&lt;br /&gt;
However, while battling the trolls in the old-fashioned human way can be fun and eye-opening, it can also be a time waster. Another option to consider is automation using '''bots'''. For this you need to do some coding, or you can work with freely available code that someone has already uploaded on a software repository such as Github.&lt;br /&gt;
&lt;br /&gt;
===== Bots against trolls =====&lt;br /&gt;
&lt;br /&gt;
A bot is a piece of software that runs an automated task over the internet, performing tasks much faster than we can.&lt;br /&gt;
&lt;br /&gt;
There are many different types of bots. There's the spambot, for example, which harvests email addresses and contact information; and there are also the 1800 approved bots on the English Wikipedia, which help to semi-automate the editing of Wikipedia pages. Bots can post content, gather information and click on things.  Twitter is also filled with bots which use algorithms to harvest information and tweet. Many of these are humorous and random - for example @twoheadlines, which grabs random news headlines and combines them to create funny combinations. &lt;br /&gt;
&lt;br /&gt;
A bot can be programmed to document trolls' activities, or talk to them, so that you don't have to. The possibilities outlined below apply mainly to Twitter; however some of these ideas can be used across other platforms as well.&lt;br /&gt;
&lt;br /&gt;
'''The data-gathering bot:''' quietly scans Twitter and gathers up tweets, usernames and any other available information you have programmed it to collect. It places this information in a file for you. This bot can be useful for understanding what kind of content is out there, and for doing a first-stage analysis of abuse. Foxxydoxing is such an example; it is intended to help you analyse who your harassers are (https://github.com/DeepLab/FoxyDoxxing).  &lt;br /&gt;
&lt;br /&gt;
'''The simple talking bot:''' if you follow the #gamergate hashtag on Twitter, you will see a bot called @everyethics which tweets different humorous reasons for the #gamergate trolling, ridiculing the claim that the major trolling which has been called &amp;quot;Gamergate&amp;quot; was not about attacking women in gaming but about “ethics in game journalism”. While this bot could be seen as spam, it was actually clearly a strategy to undermine and make fun of the trolls. &lt;br /&gt;
&lt;br /&gt;
'''The retweet bot:''' is programmed to scan Twitter for a list (created by you) of specific words, phrases or hashtags, and to retweet those. This would be a strategy for documenting and publicising Twitter abuse. Here's an example of such a bot you can download and install yourself (https://lilithlela.cyberguerrilla.org/?p=17418).   &lt;br /&gt;
&lt;br /&gt;
'''The autotweet bot:''' is similar to the retweet bot except that every time it finds a tweet with one of the words, phrases or hashtags you have programmed it to look for, it will tweet a pre-written tweet directed at that user. These bots get shut down much faster now, as was shown by @fembot, which was programmed to automatically respond to racist and sexist tweets. @fembot was blocked after only 75 tweets. &lt;br /&gt;
&lt;br /&gt;
'''The data-gathering bot in combination with the talking bot:''' in this example the data-gathering bot finds the users according to your search terms, and compiles them for you to read over, check for accuracy and remove any false positives. Alongside the data-gathering bot, you can have a talking bot or a team of talking bots which can tweet whatever you want to those users. The campaign Zero Trollerance (https://zerotrollerance.guru) used this method, employing 160 talking bots which enrolled 3000 identified trolls in a self-help program and then sent them humorous motivational messages and video clips over a period of one week. &lt;br /&gt;
&lt;br /&gt;
If you are considering creating bots to work for you to fight online bigotry and harassment, there are some things you need to watch out for. Twitter is not against bots and if you just want to create a bot that scans information from Twitter for you to analyse, or a bot that just tweets out to no one in particular, you will likely not encounter any problems. However if you want to tweet @ other Twitter users, you have to take into account Twitter's policy against spam. &lt;br /&gt;
&lt;br /&gt;
Also keep in mind that language is slippery and if you want to tackle violence against women and trans* persons online, you will have to be very careful about what kind of language you search for. For example, every time someone uses the word “bitch” on Twitter to intimidate or harass a someone, there are probably at least five other people using it to tell their friend how much they love them or talk about the latest celebrity affair. The best way to figure out which language is being used for harm is to crowdsource it from people who have been harassed and then do a number of tests, pulling tweets from Twitter and then analysing the results yourself.&lt;br /&gt;
&lt;br /&gt;
Read more of this section, including how to set up Twitter accounts to be bots for you: &lt;br /&gt;
&lt;br /&gt;
Relevant links:&lt;br /&gt;
* Simple bots you can download and test out yourself with a little patience, from Lilith Lela: https://lilithlela.cyberguerrilla.org/?p=9247&lt;br /&gt;
* How to evade Twitter's spam filters with your bot: https://gendersec.tacticaltech.org/wiki/index.php/Step_2#Evading_Twitter.27s_spam_filters&lt;br /&gt;
* Twitter's guide to Automation Rules and Best Practices (https://support.twitter.com/articles/76915-automation-rules-and-best-practices). &lt;br /&gt;
* Video global Voices &amp;quot;Do We Feed the Trolls?&amp;quot;ː https://www.youtube.com/watch?feature=player_detailpage&amp;amp;v=YRZTeea9ohM&lt;br /&gt;
* How the Zero Trollerance bot army worked: http://www.telegraph.co.uk/technology/social-media/11535405/How-do-you-stop-Twitter-trolls-Unleash-a-robot-swarm-to-troll-them-back.html&lt;br /&gt;
&lt;br /&gt;
=== Supporting others === &lt;br /&gt;
&lt;br /&gt;
It can feel daunting to know what to do when you see someone experiencing online violence, and sometimes in trying to help you can inadvertently worsen the situation. Knowing how to act in the best possible way is our individual and  collective responsibility in helping to create a safe space online for everyone.  If you are someone who wants to support a disadvantaged group but is not part of that group (men are allies when it comes to women's rights issues), it's important to speak out and say “NO”, in a public space, to online harassment and violence. Otherwise, the culture of impunity to online harassment will continue. Now when your friends or allies are being harassed and/or attacked online, there are some best practices you can follow:&lt;br /&gt;
&lt;br /&gt;
'''Offer quick support:''' When someone is being attacked or harassed, try to be quick in bringing in support. If you are close to the person under attack, offer immediate assistance. Bear in mind that this person might feel overwhelmed and might not have a clear set of instructions in mind about how to best supported. Remain quiet, attentive and patient and try to not create any extra pressure or stress.  In the event of doxing - where confidential info has been released on the internet about that person - you might want to offer a safe space (a home) if the person does not feel safe in their own home. You can also offer to moderate your friend's Twitter feed or blog comments to allow her/them to take a break from it. &lt;br /&gt;
&lt;br /&gt;
'''Speak out:''' If you do not know the person well, you can at least speak out against what is happening.  It's not enough to simply send a private email or a tweet to the person who is under attack telling them that you think this kind of behaviour is unacceptable (sometimes, if the person under attack is being flooded with tweets and mails, it's even better not to write at all). Instead, speak out about it in your networks and raise your voice against such behaviour. You can, for instance, commend publicly the work that the person under attack has been doing. Don't be silent, especially if you are a colleague or a team-mate. Make your voice resonate online - particularly if you are a man! Here is a great exemple of Jay Smooth calling On Men To Challenge Anti-Feminist Internet Trolls (https://vimeo.com/44117178)&lt;br /&gt;
&lt;br /&gt;
'''Organise collectively:''' If you want to have more impact, think about crafting a &amp;quot;collective action&amp;quot; as those are often more effective than individual actions. Gather a group of friends, and friends of friends, for a Twitter storming, for instance. This will show to the person under attack that you and others care and that such acts are not OK. &lt;br /&gt;
&lt;br /&gt;
'''Write a solidarity statement:''' If you are part of an organisation or network, you can write a solidarity statement that explicitly says you condemn online gender-based violence and harassment. Having feminists review the statement of solidarity is a best practice. If it's a person from your organisation who has been under attack, make sure she/they read the solidarity statement before it is released. You can also prepare an organisational policy in advance on what to do if someone is under attack. If you have a policy and specific steps to follow when such a situation occurs, chances are you will do less harm and be more effective in your response. see for instance Tor Solidarity against online harassment (https://blog.torproject.org/blog/solidarity-against-online-harassment).&lt;br /&gt;
&lt;br /&gt;
'''Talk to the media:''' Depending on the nature and context of the situation, you might want to speak out through the media and highlight the gendered and sexist nature of online attacks. It's always best practice to consult the persons targeted before speaking to the mainstream media. If you do not know the person personally, go through the web of trust - your trusted online network.  Thinking about the harm and added stress that the person can go through if they are made visible in the mainstream media is something that you should carefully assess.  Consider especially that this is not about you: this is about fighting sexism online and supporting others! &lt;br /&gt;
&lt;br /&gt;
'''Resources for support:'''&lt;br /&gt;
&lt;br /&gt;
*'''Block Bot:''' (http://www.theblockbot.com/sign_up) will block known harassers and trolls on Twitter for you.&lt;br /&gt;
&lt;br /&gt;
*'''Block Together:''' (https://blocktogether.org/) allows you to share your block lists with others on Twitter. &lt;br /&gt;
&lt;br /&gt;
*'''Foxxydoxing:''' (http://foxydoxxing.com/) scripts to help you analyze the connections between your attackers on Twitter and a wonderful graphic story to explain how it works.&lt;br /&gt;
&lt;br /&gt;
*'''Crash override network: ''' (http://www.crashoverridenetwork.com/) a support network and assistance group for victims and targets of unique forms of online harassment, composed entirely of experienced survivors. They work preventatively and reactively with survivors during episodes of harassment to keep them safe and provide them with the means to reduce harm and rebuild, as well as disempower their harassers. &lt;br /&gt;
&lt;br /&gt;
*'''The Online Abuse Prevention Initiative (OAPI): ''' is a nonprofit organization dedicated to reducing and mitigating online abuse through the study and analysis of abuse patterns, the creation of anti-harassment tools and resources and collaboration with key tech companies seeking to better support their communities. It works in collaboration with the Crash Overide network (http://onlineabuseprevention.org/)&lt;br /&gt;
&lt;br /&gt;
*'''Zero Trollerance:''' (https://zerotrollerance.guru) a humorous, video-based self-help program for sexist Twitter trolls. You can send your Twitter trolls links to individual videos or to the main website zerotrollerance.guru. You can also contact @ztrollerance on Twitter to do it for you.&lt;br /&gt;
&lt;br /&gt;
*'''HeartMobː''' is a platform for real-time support to individuals experiencing online harassment and empowers bystanders to act. Visit their Kickstarter project to know more about the initiative (https://www.kickstarter.com/projects/4096561/heartmob).&lt;br /&gt;
&lt;br /&gt;
*'''Trollbusters:''' (http://www.troll-busters.com/) still in development, this tool plans to counteract Twitter abuse by flooding your timelines with love messages.&lt;br /&gt;
&lt;br /&gt;
=== Documenting violence === &lt;br /&gt;
&lt;br /&gt;
Besides directly supporting and showing solidarity with people subjected to violence, you can also populate and contribute to the documentation of instances of online violence and harassment. Those initiatives are key in order to show the extent of the problem and to make visible some of the structural aspects of violence in societies. &lt;br /&gt;
&lt;br /&gt;
'''Resources for documentation:'''&lt;br /&gt;
&lt;br /&gt;
* APC's '''Take back the Tech:''' has collected more than 500 stories of women who have experienced violence online. These stories were gathered using the open source platform called Ushahidi. The data visualisation can be see here: https://www.takebackthetech.net/mapit/ . The overall results of those who have participated in this exercise show that women between 18 and 30 who are using Facebook are most likely to be under online threat (http://www.genderit.org/articles/mapping-strategy-disclose-online-violence-against-women).&lt;br /&gt;
&lt;br /&gt;
* '''GenderIT.org:''' emerged from APC's Women’s Rights Programme’s advocacy work in information and communications technologies. The need to have examples of national policy, gender-sensitive language, tools for lobbying, and an understanding of the impact of poor or positive policy all within easy access has been expressed by ICT advocates and policy makers alike (http://www.genderit.org/).&lt;br /&gt;
&lt;br /&gt;
* '''The Geek Feminism Wiki''' has been documenting sexist incidents in geek communities. To see the timeline of incidents: (http://geekfeminism.wikia.com/index.php?title=Timeline_of_incidents). You can also check out their resource pages for allies supporting support women in geek communitiesː (http://geekfeminism.wikia.com/wiki/Resources_for_men)&lt;br /&gt;
&lt;br /&gt;
* '''Women, Action, and the Media (WAM!)''' has written a report on online violence on Twitter (https://womenactionmedia.org/cms/assets/uploads/2015/05/wam-twitter-abuse-report.pdf/) and created a Twitter Harassment Reporting Tool (https://womenactionmedia.wufoo.com/forms/wam-twitter-harassment-reporting-tool/). &lt;br /&gt;
&lt;br /&gt;
* '''Breaking the circle''' is an international campaign to raise awareness on the fact that gender violence is a problem that concerns both men and women, which focus on the role of men and include them as agents of change. They have developed a series of tools and information that will help us spread the message and raise awareness (http://en.breakingthecircle.org/).&lt;br /&gt;
&lt;br /&gt;
* '''Crowdmaps in Indiaː''' After the Delhi Gang Rape there was a lot of interest in how tech could be used to address the issue of sexual violence against women in offline spaces. These initiatives emerged from spaces where  tech meets gender in order to see how tech can be used to tackle gender based violence gender problems. See for instance Harassmap in Bombay (www.akshara.crowdmap.com ) and the Safecity -Pin the creep (www.safecity.in) and the 'Safetipin' app for safely auditing public spaces. &lt;br /&gt;
&lt;br /&gt;
* '''Macholandː''' This french platform wants to voice actions, embedded in the public, media and political speech, driven by citizens who refuse to see sexism spread massively without reacting. Each user can participate and propose an action that pin with humor brands, organizations and public figures (http://macholand.fr/)&lt;br /&gt;
&lt;br /&gt;
* '''Feminist Frequencyː''' This project includes the video series Tropes vs. Women, created by Anita Sarkeesian with Bitch magazine to examine common tropes in depictions of women in film, television and video games, with a particular focus on science fiction. Videos produced in this series include “The Manic Pixie Dream Girl”, “Women in Refrigerators” and “The Smurfette Principle” (http://feministfrequency.com/)&lt;br /&gt;
&lt;br /&gt;
== Safe spaces offline == &lt;br /&gt;
&lt;br /&gt;
Many of the principles of creating and maintaining safe spaces online can also be applied offline. As noted in the introduction of this chapter, safe spaces can either be temporary and take place during a one time event or training or can also become permanent spaces where collectives or organisations embed the basic principles of safety, support, respect and inclusiveness in their own space management. &lt;br /&gt;
&lt;br /&gt;
In the case of security and privacy training, you also need to consider how participants can best learn skills to protect themselves when the topics themselves can be frightening or overwhelming. The environment also has to be suited to the participants share stories about threats they have been facing online and offline. Those stories can be very traumatic and personal and should be handled carefully, but at the same time they are a very important part of the process of developing security and privacy strategies. &lt;br /&gt;
&lt;br /&gt;
The difficulties in defining what a &amp;quot;safe space&amp;quot; should look like are inherent in the fact that you are bringing a diversity of people together, who might be considered to be part of the same community but who all have different histories, contexts and needs. What one person might find politically, socially or personally threatening might mean very little to another. And everyone will of course also come with different experiences and levels of knowledge and skills with regard to technology. &lt;br /&gt;
&lt;br /&gt;
It is important to be aware that, in struggling to perfect a safe space, one always runs the risk of creating instead yet another form of social control and pressure to conform to a particular image of what, for example, a woman or trans* person is or should be. &lt;br /&gt;
&lt;br /&gt;
=== Boundaries ===&lt;br /&gt;
&lt;br /&gt;
When trying to create a safe space, you might encounter the issue of who is included and who is excluded from it. It can very divisive, as it will often touch on people's strongly held sense of their political, personal, sexual and social identities. Issues of sexual orientation and gender identity will likely come up. Some will prefer a women and trans* only environment, some will feel that this opens up an opportunity for external attacks on the whole project by adversarial forces, while some will feel that cis-men friends and colleagues are being unfairly excluded, and feel resentful. If you are having a debate about this, some things to consider are: &lt;br /&gt;
&lt;br /&gt;
* Is there an agreed framework and rules of engagement? How do we define &amp;quot;woman&amp;quot; and &amp;quot;trans*&amp;quot;? How do we define &amp;quot;safe&amp;quot;? &lt;br /&gt;
* Who do we want to include, influence or support? Specifically women and trans* persons, or also potential allies?   &lt;br /&gt;
* How important versus how contentious? Is it worth alienating some people from the group? How can we frame the debate to avoid alienating people who don't agree with the decision? &lt;br /&gt;
* How will the decision affect the actual experience of people within the space?&lt;br /&gt;
* Do we have all the skills we need to deliver this project among our networks, or will we need specific additional skills? Where will we get them? &lt;br /&gt;
* How will the space be organised to promote equal participation, especially if cis-men are included?&lt;br /&gt;
&lt;br /&gt;
It's important to remember that building offline spaces is resource- and labour-intensive, and often many compromises have to be made. It may be a good idea to try to identify as early as possible which values are shared, important, and relevant to the event, so that you can constantly remember to prioritise those and de-prioritise less important or potentially divisive issues. &lt;br /&gt;
&lt;br /&gt;
Building offline spaces is easiest and most successful when you're clear about what you're trying to do and how you plan to go about it. The second thing which must be considered is exactly what the event is intended to achieve. For example:&lt;br /&gt;
&lt;br /&gt;
* '''Skills:''' How can we learn to do xyz? &lt;br /&gt;
* '''Advocacy:''' How do we change the culture of tech sectors to be more amenable for women and trans* persons, and/or let the world know that they are great at tech? &lt;br /&gt;
* '''Support, networking and boundary-crossing:''' What does it mean to be a woman or trans* person in tech? How can women from different places or sectors come together to spark off new ideas and practices? How can we support each other as women and trans* persons in tech? &lt;br /&gt;
&lt;br /&gt;
Different aims will inform different safe space policies. For instance, it's difficult advocating for change in the male-dominated tech sector if you haven't invited cis-men to hear what you want to say - but you might prefer to discuss *how* to do this in a women and trans*-only environment first. If, on the other hand, you are advocating for engagement with technology to women and trans* persons and mainly want free, honest and mutually supportive discussions or skills-sharing, then in this case, a women and trans* only environment suggests itself. &lt;br /&gt;
&lt;br /&gt;
With skills workshops, there is research to suggest that women and trans* persons learn tech skills best with each other, so these workshops have a very clear and communicable reason for being exclusive. Another possibility is to run an event twice, once for women and trans* participants and once for open participation. This can have the positive side-effect of enabling others to experience a safe space methodology and thereby change their own practices in the spaces they organise, but it will be clearly more time consuming.&lt;br /&gt;
&lt;br /&gt;
=== Choosing a format that fits ===&lt;br /&gt;
&lt;br /&gt;
Once you have settled the basic questions on what your event is for and who you want to invite, it's time to think about the format of your event. Deciding which format to use can be helped by your answers to some key questions:&lt;br /&gt;
&lt;br /&gt;
* What are you trying to do? Which format will support this activity best?&lt;br /&gt;
* What are the  participants' needs, existing skills, experience and preferences?&lt;br /&gt;
* What physical spaces are available, what will they allow you to do, and what resources do you have?&lt;br /&gt;
* What are your human and organisational resources - how much can you take on? &lt;br /&gt;
&lt;br /&gt;
There are many different ways of organising events. Some of the most popular in FLOSS and tech-related communities are:&lt;br /&gt;
&lt;br /&gt;
* '''Un-Conference''': helps people to make connections, share knowledge, collaborate and inspire each other. To take part, participants are encouraged to give a presentation, create a discussion, or even chair a debate (http://lanyrd.com/blog/2012/unconference-howto/ ; http://openspaceworld.org/wp2/what-is/). This format can be relatively egalitarian and relatively easy to organise (no messing about with programmes, scheduling and advanced prep) but you should watch out for the tyranny of structurelessness. Thy can also be extremely intimidating and therefore exclusionary towards less experienced or skilled participants; and can be stressful if you need to organise tech or other resources for specific activities in advance.   &lt;br /&gt;
&lt;br /&gt;
* '''Workshop''': transferring skills or knowledge in an interactive session. There are many possible workshop methodologies. Selecting a workshop format is very much about being clear about what you want to achieve. Workshops can be a good format for building skills or for maker and design activities. For instance in Pakistan Hamara Internet is a campaign by Digital Rights Foundation that seeks to raise awareness about violence against women online through various workshops. It literally means ‘Our Internet’ in English and works to impart digital security tips and training to women and bridge the gender digital divide in Pakistan (http://hamarainternet.org/). &lt;br /&gt;
&lt;br /&gt;
* '''Hackathon:''' With its general motto &amp;quot;programming till someone drops from exhaustion&amp;quot;, hack events can mix different groups - like NGOs with hackers - to come up with new approaches to building technology for that group. For instance IGNITE (Women Fueling Science and Technology from the Global Fund for Women International) organised a global Hackathon called #hackgirlsrights. This  24-hour, multi-country coding event, targeted girl coders which collaborate to develop a website or application that address specific challenge facing girls and young women (http://ignite.globalfundforwomen.org/gallery/ignite-international-girls-hackathon). On the past 23th of April 2015, another global feminist hackaton called femhack was organised around the world in loving memory of Woman Human Rights Defender Sabeen Mahmud (https://f3mhack.org). You can read more about how to run a hackathon here: (http://globalvoicesonline.org/2012/11/23/hackathons-in-droves-how-is-a-hackathon-organised/)&lt;br /&gt;
&lt;br /&gt;
* '''Sprint:''' A sprint is a gathering of people involved in a specific project to further the focused development of some aspect of the project, such as working on sections of code, writing manuals or books, etc. These are effective at getting a lot done quickly for code and manuals (less so for other forms of writing), but can be exhausting and emotionally demanding - make sure you keep food and drink coming! To read more about sprints, visit wikipedia: (https://en.wikipedia.org/wiki/Sprint_(software_development) and Flossmanuals: (http://www.flossmanuals.org/service/booksprints). To note for instance that this manual was edited during an editorial sprintǃ&lt;br /&gt;
&lt;br /&gt;
* '''Seminar:''' A seminar brings together a small group for recurring meetings which focus on a particular subject. In a seminar, everyone actively participates, or offers information or training on specific topics. On the one hand, this kind of structured activity supports people with less experience or confidence; planning for tech/resource support is fairly straightforward; and people know what to expect. On the other hand, the event can be experienced as overly structured and lacking spontaneity for more experienced participants; more 'top-down'; and requires more organisational effort in advance. Check out for instance The documentation of the Feminist Server Summit which consisted in a feminist review of mesh- cloud- autonomous- and D.I.Y. servers (http://vj14.constantvzw.org/r/about).&lt;br /&gt;
&lt;br /&gt;
More stable kinds of safe spaces for experimenting and learning technology include: &lt;br /&gt;
&lt;br /&gt;
* '''Hacklab, hackerspace or makerspaceː''' These are community spaces with hardware and/or tools - great for people to &amp;quot;get their hands dirty&amp;quot; and play around with anything -  from taking computers apart to installing Linux to making music with bananas or building a radio out of razorblades and wire. Read more about hacklabs and hackerspaces here: &amp;quot;Hacklabs and Hackerspaces: Shared Machine Workshops&amp;quot;:(http://www.coredem.info/IMG/pdf/pass11_an-2.pdf). You can also visit the following portalsː (http://makerspace.com/) (http://hackerspaces.org/)&lt;br /&gt;
&lt;br /&gt;
* '''Feminist hackerspace:''' Those vary in shape, form, and size. What often unites them is a set of boundaries that are decided on collectively (who can be a member, who can be a guest, what are the policies, etc.) and an explicit belief in feminist principles. Feminist hackerspaces provide a place to work on individual and collective projects in a supportive environment.  To know more about feminist hackerspaces you might want to visit the website Mz Baltazar’s Laboratory in Vienna (http://www.mzbaltazarslaboratory.org/), The Mothership Hackermoms in Berkeley (http://mothership.hackermoms.org/), Double Union in San Francisco (https://www.doubleunion.org/) and FemHack in Montreal (http://foufem.wiki.orangeseeds.org/).&lt;br /&gt;
&lt;br /&gt;
For sharing skills, setting up a feminist hackerspace, or choosing an unconference, workshop or seminar format makes a lot of sense. For advocacy and networking events, the choice is not so obvious. Advocacy events can be some of the most challenging as it's easy to spend the entire day &amp;quot;re-inventing the wheel&amp;quot; with people who are new to the questions. If you have participants from diverse backgrounds in your advocacy event, it could be best to go with a more structured format. Unconferences and hackathons work best with activists or experienced practitioners who are used to a high level of self-determination, and who have a shared understanding of the implicit rules and structures of the space. Having said that, it can work well to try more open formats anyway, but be prepared for some skilled facilitating to make it a safe and fun space for both experienced and less experienced participants. Sometimes a mixed approach is what's needed - and some experimentation!&lt;br /&gt;
&lt;br /&gt;
=== Fixing gender gap in tech ===&lt;br /&gt;
&lt;br /&gt;
In order to get some inspiration we list below a selection of initiatives specially oriented at getting more women in ICT and technological related fields.&lt;br /&gt;
&lt;br /&gt;
* '''Asikana Network (Zambia)ː''' is a group of females aiming to empower women in ICT related fields by changing mindsets and eliminating negative stereotypes attached to girls and women in ICT (http://asikananetwork.org/).&lt;br /&gt;
* '''Akirachix (Kenya)ː''' is an african wide network of women in technology to make tech and to inspire and mentor other women to be technologists (akirachix.com).&lt;br /&gt;
* '''Donestech (Spain)ː''' is a cyberfeminist and activist research group which develops also workshops and audiovisual productions in relation to gender and ICT access, uses of and desires. Lelacoders project is about studying and making visible the presence of women in the development of computer sciences, free software and hacker cultures (www.donestech.net) (https://n-1.cc/g/donestech+lelacoders). &lt;br /&gt;
* '''Feminist Approach to Technology (India)ː'''  mission is to empower women by enhancing women’s awareness, interest and participation in technology (http://fat-net.org/).&lt;br /&gt;
* '''Flossie (UK)ː''' runs a conference and also skills workshops and it is intended to combine advocacy, boundary-crossing, support and skills-sharing bringing together women involved in digital arts with coders, artists, and makers (http://www.flossie.org/). &lt;br /&gt;
* '''Speakerinnenn (Germany)ː''' aim is to increase the visibility of women in the field of public speaking. With the help of our list it will be easier for organisers to find female experts to speak at their events (http://speakerinnen.org/).&lt;br /&gt;
* '''The Ada initiative (Global)ː''' organises AdaCamp, a series of conferences dedicated to increasing women’s participation in open technology and culture: open source software, Wikipedia and other wiki-related projects, open knowledge and education, open government and open data, open hardware and appropriate technology (https://adacamp.org/).&lt;br /&gt;
&lt;br /&gt;
=== Codes of conduct ===&lt;br /&gt;
&lt;br /&gt;
It's important, especially in mixed environments, to think about what's acceptable conduct in the space and what isn't. In order for this to have any practical effect, it's also important to think about what you'll do if individuals breach this - or when things go wrong generally. You can find plenty of information and example policies on the Geek Feminism Conference anti-harassment/Adoption page (http://geekfeminism.wikia.com/wiki/Conference_anti-harassment/Adoption)&lt;br /&gt;
&lt;br /&gt;
Make sure your participants understand the policy and how it relates to their own conduct. It can be useful to make time in your schedule at the beginning of the event to share your policy, and reach consensus with the group on how to maintain a safe space over the days of the event. &lt;br /&gt;
&lt;br /&gt;
Your code of conduct should be about preventing aggressive behaviour and not about trying to police how people identify, communicate or present themselves. It's also worth remembering that people who are struggling in a culturally unfamiliar environment can become confrontational more easily than they usually would. There may be many reasons why a participant might be struggling to communicate positively at any given moment. It's key to remain calm and to provide a non-judgmental space for the expression of emotions like anger or frustration. Because of this, a code of conduct should also include some people that will be assigned to receive feedback if any problem takes place. They should be good facilitators or moderators and be calm and patient. We are different, let's celebrate it, even when it's difficult to do!&lt;br /&gt;
&lt;br /&gt;
Last not least, your code of conduct should include an agreement about how participants will respect other participants' '''right to privacy'''. Some general guidelines could include the following:&lt;br /&gt;
&lt;br /&gt;
* '''Don't take or circulate sound, video or photos without permission'''. If anyone present faces significant external risk then don't take photos at all unless participants have given express permission and an opportunity to cover their identity. &lt;br /&gt;
* If you wish to record the event, '''prepare formal consent forms''' telling people exactly what audio-visual records are being made and how they will be stored, used, licensed and ask for clear consent with a signature. &lt;br /&gt;
* '''Don't share details of anyone's participation''', speech or actions on social media without their express permission.&lt;br /&gt;
&lt;br /&gt;
=== How safe is the space? ===&lt;br /&gt;
&lt;br /&gt;
As a check-list, here are some questions that can help you assess whether a space is safe or not. &lt;br /&gt;
 &lt;br /&gt;
* '''Background:''' What is the history of the space? Who started it and why? How many women and trans* persons have been involved?  &lt;br /&gt;
* '''Participation:''' Who has stopped participating in the space since it was founded, and why? Is it mostly women who have left? &lt;br /&gt;
* '''Policies:''' Does the space have policies? If so, what kind? Are the policies regularly put in practice? Ask members in the space, particularly women. &lt;br /&gt;
* '''New people:''' How does the space welcome newcomers? The first time you went to the space, did you get a tour? Did people say hello? Were the people in the space friendly? &lt;br /&gt;
* '''Regular assemblies:''' Are there regular meetings (assemblies) that offer possibilities to raise concerns, to suggest collective projects, to suggest the organisation of workshops, to discuss the space (its cleanliness, etc.), to present yourself, etc.?  &lt;br /&gt;
* '''Language:''' Is the language and vocabulary used on the website and in the space explicitly feminist? Read the website carefully, or go and see for yourself what the space looks like. &lt;br /&gt;
* '''Trust:''' Do you know people who you trust in the space or do you know friends of friends? The web of trust can be very useful here. &lt;br /&gt;
* '''Access:''' Who can go into the space and under which conditions? This should be made explicit on the website, otherwise ask.&lt;br /&gt;
*  '''Accessibility:''' Is the space itself easily accessible? In which part of town is it located? Are there bathrooms? What are the opening hours? Who has access to the keys of the space? &lt;br /&gt;
* '''Cost:''' How much does it cost to become a member? Is there a sliding scale policy?&lt;br /&gt;
&lt;br /&gt;
No space is perfect; a safe space should always, however, at least provide an environment and a set of boundaries in which to meet up, talk, and address and raise difficult issues. If you feel the space has potential and you want to get involved, don't be shy!&lt;br /&gt;
&lt;br /&gt;
'''Relevant links:''' &lt;br /&gt;
&lt;br /&gt;
'''* Integrated Security Manual:''' (http://www.integratedsecuritymanual.org/) a resource for planning, convening, and hosting your workshop which prioritize your participants' emotional and physical well-being.&lt;br /&gt;
 &lt;br /&gt;
'''* Level Up:''' (https://www.level-up.cc/resources-for-trainers) resources for digital security trainers and organisers of these trainings too.&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1815</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1815"/>
				<updated>2015-06-03T19:18:03Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: fixed typo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
'''Chapter 1: Digital traces and identities online'''&lt;br /&gt;
&lt;br /&gt;
== Digital shadows ==&lt;br /&gt;
&lt;br /&gt;
How much data exists about you? What kind of traces do you leave behind about your identity, your networks, and your habits when you use digital services? How does this connect to who you are online and who you are offline? What can someone who wants to harm you or investigate you, actually find out? &lt;br /&gt;
&lt;br /&gt;
Your digital shadow is the story that data tell about you. It is created by trillions of traces, or bits of data, left behind in the digital world every time you go online, or when your mobile phone or any other object around you sends information to the internet. These bits of data can include your name, location, contacts, photos, messages, tweets and likes, but also the brand of your computer, length of your phone calls and information about which websites you visit. &lt;br /&gt;
&lt;br /&gt;
These traces are created by you actively publishing and sharing information about yourself and people sharing information about you by tagging you in pictures, mentioning you in tweets or simply by communicating with you. There are also traces which are passively created, without you necessarily realising it, or consenting to it. For example, your browsing habits and IP address are shared amongst websites you visit and services you use in order to track your behaviour and try to sell you products through advertising. &lt;br /&gt;
&lt;br /&gt;
In order to understand the concept of digital shadows, it is useful to break it down into what the data is that is being collected and who is collecting it. &lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
&lt;br /&gt;
When we think about digital traces, we are talking about three types of data: content, metadata and noise. &lt;br /&gt;
&lt;br /&gt;
'''Content:''' is what you actively produce: your messages, blogs, tweets, phone calls and online purchases; the pictures and videos you take to remember. &lt;br /&gt;
&lt;br /&gt;
'''Metadata:''' is data about your data, information that is needed for the technological infrastructure to work. It enables your email to be delivered, files on your computer to be found and mobile communication to work. If you take the example of an email that you send, the metadata includes the sender's email, the recipient's email, the time the email was sent, the type of device the email was sent from, and the location it was sent from. &lt;br /&gt;
&lt;br /&gt;
'''Noise:''' is the data that is created by either the manufacturing process or by the workings of the technological infrastructure. For example, every camera with a SD card to record and store pictures has unique scratches. These make small changes to the data that are not visible to the eye but can be recognised by computers. &lt;br /&gt;
&lt;br /&gt;
''Who collects data?'' &lt;br /&gt;
&lt;br /&gt;
You might wonder about the importance of one picture, one message, or one call. You might think there is so much data out there that nobody knows what to do with it, or cares that much about it. &lt;br /&gt;
&lt;br /&gt;
However, there are in reality a number of parties interested in this data - including companies, governments and individuals - and data collection and data analysis is by now very sophisticated. The data traces you leave behind online are constantly being collected, analysed and sorted by various parties to create profiles on you; and every time a new piece of data is aggregated, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected for a variety of purposes. Profiles can be bought and sold; data can be used to control, suppress or silence; or it can be used to create harassment strategies by people who want to harm your reputation or attack you for your views or beliefs. All of the aforementioned actors can have access to your digital shadow. They might access it in different ways: through surveillance of your activities, through data-sharing between applications, or through researching publicly available pieces of data about you and patching these all together. &lt;br /&gt;
&lt;br /&gt;
Depending on who you are and what you do, you will probably have different concerns about who can access your digital shadows and how this makes you vulnerable. &lt;br /&gt;
&lt;br /&gt;
'''Relevant links:'''&lt;br /&gt;
&lt;br /&gt;
* '''Trackography''': (https://trackography.org/) an interactive map exploring how the global tracking industry is recording your online behaviour. &lt;br /&gt;
&lt;br /&gt;
'''Further Readingsː'''&lt;br /&gt;
&lt;br /&gt;
* Privacy international videoː (https://www.privacyinternational.org/?q=node/573) explaining what is metadata and what should we care about it.&lt;br /&gt;
* Ed Felten explains how you can tell someone had an abortion from studying the metadata of their phone calls: (http://www.washingtonpost.com/blogs/the-switch/wp/2013/08/27/heres-how-phone-metadata-can-reveal-your-affairs-abortions-and-other-secrets/)&lt;br /&gt;
* Hello Barbie points at the limits of eavesdropping, privacy and how devices are sending data to third actor partiesː (http://www.washingtonpost.com/blogs/the-switch/wp/2015/03/11/privacy-advocates-try-to-keep-creepy-eavesdropping-hello-barbie-from-hitting-shelves/)&lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
You can't know exactly what is happening to your digital shadow or who might have to access to it, and that itself is a problem. Although this situation might seem dire, the idea is not to get paralyzed by paranoia but to try to demystify it for yourself and try out different methods for controlling and minimising your shadows. Some examples include reducing the amount of data you give away;  consciously stripping valuable information from content and metadata; exercising the art of self-doxing; and thinking about ways to play with and break up your online identity.&lt;br /&gt;
&lt;br /&gt;
The strategies and tools detailed below can increase your privacy, and help you to be more secure, both online and offline - without being less vocal or reducing your activity online. To move towards getting some control over your digital shadow, a good place to start is to see what it looks like (as far as is possible) and explore the size, depth and characteristics of your digital shadow:&lt;br /&gt;
&lt;br /&gt;
* '''Trace My Shadowː''' (https://myshadow.org/trace-my-shadow) is a tool produced by Tactical Tech that allows you to see some of the traces you are leaving online, and it offers a lot of tips on how to protect your privacy.&lt;br /&gt;
* '''Digital Shadowː''' (https://digitalshadow.com) is a Facebook app developed by Ubisoft which illustrates what third parties can know about you through your Facebook profile. &lt;br /&gt;
* '''Panopticlickː''' (https://panopticlick.eff.org/) tests your browser to see how unique it is based on the information it will share with sites it visits. By using this application, your browser will be given a uniqueness score, letting you see how easily identifiable you might be as you surf the web.&lt;br /&gt;
* '''OpenPaths.ccː''' (https://openpaths.cc/) is a tool that allows you to track your location history over time with your smartphone. You can then visualise this data and see what kind of story it tells about you. &lt;br /&gt;
&lt;br /&gt;
'''Self-doxing:'''  Another strategy for exploring your visible traces and what is already out there about you on the internet is to dox yourself. '''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find their flaws. This technique is used sometimes by activists and investigative journalists to profile subjects of interest. It is also used as a strategy of harassment online. &amp;quot;Self-doxing&amp;quot;, or researching yourself, is a technique that can help you to make informed decisions about what you share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (through websites such as: http://www.whois-search.com/ or similar). &lt;br /&gt;
&lt;br /&gt;
Remember, even while you are exploring yourself, other people can be exploring you too. So  when you are using these web services and looking for your digital shadow, a good idea is to use anonymisation tools like Torbrowser(https://www.torproject.org/projects/torbrowser.html.en).&lt;br /&gt;
&lt;br /&gt;
'''Further Readings:'''&lt;br /&gt;
&lt;br /&gt;
* Advice on doxing your harassers as a way to assess your risk: (https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk)&lt;br /&gt;
* Tips no how self-dox yourself (or to dox someone else): (https://lilithlela.cyberguerrilla.org/?page_id=93870)&lt;br /&gt;
* Anonymous Activism/Tor for Feminists by Fembot collectiveː (http://fembotcollective.org/blog/2015/05/06/toolkit-anonymous/)&lt;br /&gt;
&lt;br /&gt;
==== Mapping ====&lt;br /&gt;
&lt;br /&gt;
While we have explained what steps you might take to explore your personal digital shadow and traces you leave online, you will also need to enlarge this exploration to the people you interact with online.  &lt;br /&gt;
&lt;br /&gt;
Everyone belongs to several social domains - your work or advocacy networks, your family networks, friends, sports teams, whatever. Some networks may feel safer than others. For example, you may be more vigilant about what you share and how you share it in your work or advocacy activities, but less so for interacting with friends on a social networking platform. &lt;br /&gt;
&lt;br /&gt;
If you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in a social networking platform that you like a particular kind of game, an attacker who wants to investigate your work or advocacy activities might trick you into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if your work identity and your gaming profile can be connected to the same person; and this is why separating your social domains can be useful. To separate your social domains, it's helpful to first map them out and identify which ones could expose you most. &lt;br /&gt;
&lt;br /&gt;
You can do this by thinking about your different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not. You can do this by considering the data that you handle in the different realms of your life and ask yourself: what would happen if this particular data suddenly disappeared or if it was seen, copied and distributed by a third actor party? &lt;br /&gt;
&lt;br /&gt;
'''Example:''' Polish computer security researcher Joanna Rutkowska developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain, including her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the encrypted communication with her partner.&lt;br /&gt;
* The '''red''' domain includes the totally untrusted areas which don’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
This might be a technical example, but it illustrates the concept of security by isolation very well as it recognises that security measures can always be vulnerable and that harm can be reduced by stopping possible attackers from accessing the whole system that needs to be secured. This example can be applied in other ways to your own social domains.&lt;br /&gt;
&lt;br /&gt;
Further readingsː &lt;br /&gt;
* You can find more details about Rutkowska's scheme here: (http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html). &lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
Finding out what data exists out there and can be accessed by others is an empowering first step. There are also measures you can take to control what content and metadata you give away. When you publish content on the internet, it is always a good idea to ask yourself if what you are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to your personal life, the names you mention or the images you upload may contribute to a picture about who you are, what you are doing, where you are doing it and so on. This could be used by people who wish to target you. &lt;br /&gt;
&lt;br /&gt;
This does not mean that you should silence yourself – by taking some basic steps, you can limit your risks. You can think of these as increasing the amount of effort someone who wants to surveil or attack you or your contacts would need to take. &lt;br /&gt;
&lt;br /&gt;
'''Controlling your content when connecting to the internet'''&lt;br /&gt;
 &lt;br /&gt;
* When '''giving personal information to a web service''', make sure the service provides an '''encrypted connection''' for you to access it from (the url should begin with https://). You can use the browser add-on '''Https Everywhere''' for Firefox, Chrome and Opera browsers, provided by the Electronic Frontier Foundation to help you force https connections with websites that have them (https://www.eff.org/https-everywhere). &lt;br /&gt;
&lt;br /&gt;
* Using '''Torbrowser''' will '''hide specific metadata like your IP address''', thereby increasing your anonymity online. (See https://securityinabox.org/en/guide/anonymity-and-circumvention)&lt;br /&gt;
&lt;br /&gt;
* You can install add-ons like '''Privacy Badger''' or '''Adblock Plus''' for the Firefox Browser, as well as by monitoring your privacy settings and deleting '''cookies''' on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* You should '''use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts. (See https://securityinabox.org/en/guide/passwords)&lt;br /&gt;
&lt;br /&gt;
'''Controlling your content when publishing online'''&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about your life''', you can use '''private profiles''' that can only be accessed by selected contacts. When using those on commercial social networking platforms, you should be aware of the '''regular changes to the privacy policies''' of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' online, you should ask yourself if the information you spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called '''ObscuraCam''', a free camera application for Android devices. (https://guardianproject.info/apps/obscuracam)&lt;br /&gt;
&lt;br /&gt;
'''Controlling your content by reducing your metadata:'''&lt;br /&gt;
&lt;br /&gt;
* You can '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, you don't need to use your real name. This prevents the metadata created when using this device or software from being connected to you. &lt;br /&gt;
&lt;br /&gt;
* When '''publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or you can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  You can use '''tools to remove metadata from certain files'''. For images there is '''Metanull''' for Windows (https://securityinabox.org/en/lgbti-africa/metanull/windows). For '''PDFs''', Windows or MAC OS users can use programs such as '''Adobe Acrobat XI Pro''' (for which a trial version is available). GNU/Linux users can use '''PDF MOD''', a free and open source tool. (Note: this tool  doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF.) For a full guide to'''removing metadata from different file formats''', see Tactical Tech's resource: https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
'''Controlling your content by deleting accountsː'''&lt;br /&gt;
&lt;br /&gt;
One method of controlling your shadow is reducing the number of platforms and services you can be found on. Some tools to help you delete existing accounts include: &lt;br /&gt;
 &lt;br /&gt;
* The '''Suicide Machineː''' (http://suicidemachine.org) is a tool that facilitates the process of deleting social media profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKillerː''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Meː''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once you have identified your different social domains and the digital activities and contacts that go with them, what you need to do is decide if you want to differentiate your identities accordingly, or if you'd rather stick to your official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
Once you have identified your different social domains and the digital activities and contacts that go with them, what you need to do is decide if you want to differentiate your identities accordingly, or if you'd rather stick to your official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
You may want to keep your work connected to your legal or &amp;quot;real&amp;quot; identity, or think that your activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social media, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific situation the following questions: &lt;br /&gt;
&lt;br /&gt;
* Would my safety, job or livelihood be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
These questions are part of a basic risk assessment which can you use at many different points when thinking about your digital security and privacy. Once you have assessed your risk, you can then consider different strategies for separating your identities online. These range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
'''Relevant links:'''&lt;br /&gt;
&lt;br /&gt;
* Tactical Tech's guide to risk assessment: (https://securityinabox.org/en/lgbti-mena/security-risk)&lt;br /&gt;
* Electronic Frontier Foundation's guide to threat modeling: (https://ssd.eff.org/en/module/introduction-threat-modeling)&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding talks about her decision to start writing under her real name, dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
For instance the project Geek Wiki Feminism reveals how certain groups of people are disadvantaged by policies which require individuals to use their real or legal names. These include women, queers, trans* persons, differently-abled persons, children and parents. The costs to these groups when having a public profile attached to their real name can range from discrimination in employment or provision of services to arrest,imprisonment or execution in some jurisdictions.  For a comprehensive list of which groups of people are affected and how they are affected see Geek Wiki Feminism (http://geekfeminism.wikia.com/wiki/Who_is_harmed_by_a_%22Real_Names%22_policy%3F)&lt;br /&gt;
&lt;br /&gt;
'''Further readings:'''&lt;br /&gt;
&lt;br /&gt;
* Kate Harding talks about her decision to start writing under her real nameː (http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name/)&lt;br /&gt;
* How Facebook's real name policy affects LGBTQ persons: (https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community)&lt;br /&gt;
* Geek Feminism Wiki - Who is harmed by a &amp;quot;Real Names&amp;quot; policy?ː (http://geekfeminism.wikia.com/wiki/Who_is_harmed_by_a_%22Real_Names%22_policy%3F)&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, Vani, a human rights activist, writes: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless” (http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously).&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where you don't need to gain other people's trust, when there are few or no people you can trust, or when you don't want to expose others in your life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance, you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you, as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When you adopt anonymity as a strategy you may use pseudonyms, but these should not be used across different networks or social domains, and some may only be used once and then discarded. Because of this, anonymity differs from persistent pseudonymity. &lt;br /&gt;
&lt;br /&gt;
'''Relevant links:''' &lt;br /&gt;
&lt;br /&gt;
* The anonymity decision for bloggers: (https://advocacy.globalvoicesonline.org/2015/05/01/to-be-or-not-to-be-anonymous-how-should-bloggers-decide/)&lt;br /&gt;
* How the real identity of the blogger behind the Gay Girl blog was revealed by online investigation: http://electronicintifada.net/blogs/ali-abunimah/new-evidence-about-amina-gay-girl-damascus-hoax&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name used consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;. There are myriad reasons why you might want to use a name other than the one you were born with such as to hide your gender or protect your privacy. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At the time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot;  which typically means using your legal name or the name by which you are commonly known. This policy has caused many users to lose their Facebook accounts among which we find feminists groups, trans* persons and drag kings and queens known for their pseudonymous rather than their legal name. If you choose to use a pseudonym on social networks, it is important to understand that you can be reported for using a &amp;quot;fake name&amp;quot; and possibly have your account deleted. A strategy for avoiding that is using a name-shaped pseudonym. &lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers '''visibility''', which allows to network with others, and by pinning your voice to a particular name you can develop an '''online reputation'''. This depends on others to decide whether you are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to your legal identity, or not. The choice to connect your online reputation to your &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
'''Relevant links:''' &lt;br /&gt;
&lt;br /&gt;
* The many reasons people use pseudonyms: (https://www.eff.org/deeplinks/2011/07/case-pseudonyms)&lt;br /&gt;
* Geek Wiki Feminism on Pseudonymousː(http://geekfeminism.wikia.com/wiki/Pseudonymity) and a bingo about it (http://geekfeminism.org/2011/07/08/anti-pseudonym-bingo/)&lt;br /&gt;
* A blogger explains how a human error exposed her pseudomynous online identity which put her work identity at risk: (http://disabledfeminists.com/2010/04/14/on-refusing-to-tell-you-my-name/)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. For centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity. &lt;br /&gt;
&lt;br /&gt;
'''Some examples of collective identities:'''&lt;br /&gt;
&lt;br /&gt;
'''Captain Swing:''' the identity used by farm workers in their letters of protest during the English Swing Riots in 1830 (https://en.wikipedia.org/wiki/Captain_Swing)&lt;br /&gt;
&lt;br /&gt;
'''Luther Blisset:''' a name originally belonging to an Italian footballer which was adopted and used by many artists and activists for various actions and projects (https://en.wikipedia.org/wiki/Luther_Blissett_%28nom_de_plume%29)&lt;br /&gt;
&lt;br /&gt;
'''Guerrilla Girls:''' an anonymous group of feminist and female artists devoted to fighting sexism and racism within the art world (http://guerrillagirls.com/)  &lt;br /&gt;
&lt;br /&gt;
'''Netochka Nezvanovaː''' might be a collective name or it might be one women only. Netochka is the human face of a software tool kit used for digital video in real time. Netochka gives the interviews to promote the software. Except that when she shows up in person, she’s frequently embodied by different women (http://www.salon.com/2002/03/01/netochka/)&lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice you make, what is important is that you keep your domains effectively separated. No matter how many domains you identify in your digital life, and how many corresponding identities you create, on the internet every identity - even the one bearing your real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example '''Tor''' or '''TAILS''')&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
Once something is on the internet it will stay on the internet, as the internet does not forget. You may think that deleting certain sensitive data from social networking platforms and web services may be enough to protect yourself, but remember that metadata cannot be deleted as easily. And using just one identity through your whole life - in all your work and personal domains - creates a bulk of information that makes it easier to profile you. &lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of your social domains. You might also choose to use your real identity in some areas, and your new alternative identities in others. Take into account the following recommendations when creating new online identities:&lt;br /&gt;
&lt;br /&gt;
* You should select the contacts for each one carefully, and avoid sharing contacts with other identities you use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and if possible, even devices.&lt;br /&gt;
&lt;br /&gt;
* Your various identities should not linked to each other, or to your real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number, or using a persistent pseudonymous when creating a one time use disposable email.&lt;br /&gt;
&lt;br /&gt;
* Creating disposable  extra identities can be useful, as they can be discarded easily if compromised. Those  can also can  be created for new acquaintances when appropriate as introductory profiles to get to know somebody before you include them in your more trusted network.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
Many platforms have &amp;quot;real name&amp;quot; policies so if you want to use commercial social networking platforms, it is better to use a credible name and surname rather than more imaginative ones. &lt;br /&gt;
&lt;br /&gt;
Once you have decided on a name, a surname, and a username for your virtual persona, you should do thorough research - perhaps also using doxing tools and techniques - to find out if someone else is already using that name. After all, if you wish to develop your own reputation, you don’t want to be confused with someone else, especially if they don’t share your views of the world or if your activities might put them at risk!&lt;br /&gt;
&lt;br /&gt;
Then you need to create a story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role. You can invent a new story if you feel particularly inspired or base your story on a “known” person’s story, a superhero, a fictional character from your favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when you create an identity you should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
'''Further reading:'''&lt;br /&gt;
&lt;br /&gt;
* Helpful tips for inventing a new identity: (http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed)&lt;br /&gt;
* Artist Curtis Wallen's experience of creating a new online identity: (http://www.theatlantic.com/technology/archive/2014/07/how-to-invent-a-person-online/374837/)&lt;br /&gt;
&lt;br /&gt;
==== Credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If you keep all your normal identifying traits - such as your gender, job, attitude or the way you write - it might be possible for someone to connect the dots and link your pseudonymous personas with your real identity. &lt;br /&gt;
&lt;br /&gt;
* '''Work:''' Your persona should have a job that is different from yours, but not so different that you don’t know anything about that field: for example, they shouldn’t be a surgeon if you don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*'''Skills and interests:''' Similar considerations should be made to select your persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
*'''Psychological attitude:''' A good way to give your persona depth is by creating some &amp;quot;weak spots&amp;quot; which are not the same as your own. So when the persona gets attacked, you can laugh about it and not experience harm. E.g if you have a good sense of humour, try impersonating a humourless person! &lt;br /&gt;
&lt;br /&gt;
* '''Linguistic fingerprint:''' This could be identified through a &amp;quot;stylometric analysis&amp;quot; that makes it possible to identify the author of a particular text. To change this, you can start by using a spell-checker in your word processor to check for consistent typos and you could also think about adopting a different writing attitude. You could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
In any case, you should always remember that on the internet, each one of your identities - even the one connected to your real name - is a “virtual” identity, and it is always better to decide what character traits you want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for your “real” online identity.&lt;br /&gt;
&lt;br /&gt;
'''Relevant links:'''&lt;br /&gt;
&lt;br /&gt;
* Tips for creating a rounded character for your identities: /https://lilithlela.cyberguerrilla.org/?page_id=94049)&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Maintaining multiple identities is some work, but like most of these practices, it just requires some curiosity, patience and attention. The main point is to keep your identities separated otherwise they will very quickly begin to mix with one another. As a start, you can keep notes on your identities to help you to avoid any awkward situations where you confuse one with the other (but do think carefully about where you host or keep those notes!) There are also technical things you can do:  &lt;br /&gt;
&lt;br /&gt;
* Create '''different browser profiles''' so that your browsing habits are captured under different identities, on Firefox (https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles) or Google Chrome (https://support.google.com/chrome/answer/2364824)&lt;br /&gt;
* When creating a new email account or social media account for your identity, it is a good idea to '''connect to the server’s website with Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
* If you have the resources and motivation you can separate your identities per device or operating system. This can include using virtual machines for instance, as explained below. &lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains you need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In other cases, though, all you need is a disposable email address that you only need to use for opening an account in an untrusted platform. This will reduce the number of traces connected to the email address you use for your work or personal life and minimise the amount of spam in your life. Below are some services which can help you set up these disposable accounts and addresses:&lt;br /&gt;
&lt;br /&gt;
* '''Anonbox:'''(https://anonbox.net) is a service provided by the Chaos Computer Club (CCC) gives you a mailbox for a day. &lt;br /&gt;
* '''Guerilla Mail:''' (https://www.guerrillamail.com) lets you choose your email id and holds any mail you receive to it in a mailbox for one hour. &lt;br /&gt;
* '''BugMeNot:''' (http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use. &lt;br /&gt;
* '''Fakena.me:''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that will give you all the fake info you need to set up an account (fake name, birth date, US only address, username and password) as well as a link to an associated guerillamail mailbox. &lt;br /&gt;
* '''Instant Internet Decoy:''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions. &lt;br /&gt;
&lt;br /&gt;
Another option is to set up a '''mail alias''' - a different email address that is connected to your main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised you can just dispose of it and create a new one. But beware that is very easy to check what the source email address, so don't use this method when you really need to disguise your identity.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup''' (https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org). &lt;br /&gt;
&lt;br /&gt;
'''Relevant links:''' &lt;br /&gt;
&lt;br /&gt;
* A list of autonomous email providers compiled by Riseup: (https://help.riseup.net/en/radical-servers)&lt;br /&gt;
&lt;br /&gt;
==== Commercial social networking platforms ====&lt;br /&gt;
&lt;br /&gt;
Before choosing to use any social networking platform there are some basic security and privacy questions you should ask, regardless of which identity you plan on using:&lt;br /&gt;
&lt;br /&gt;
* Does it provide an '''encrypted connection (https)''' for all uses of the site, rather than just during login? Are there any problems related to encryption (e.g. related to encryption certificates)? &lt;br /&gt;
&lt;br /&gt;
* According to the platform's '''End User Licence Agreement''', '''Privacy Policy and/or Data Use Policy''', how is your content and personal data treated? With whom are they shared? &lt;br /&gt;
&lt;br /&gt;
* What privacy options are provided for users? For example, can you choose to share your videos securely with a small number of individuals, or are they all public by default? &lt;br /&gt;
&lt;br /&gt;
* Is the '''geographical location of the servers known'''? Under which '''territorial jurisdiction''' do they fall? Where is the company registered? How does this information relate to the privacy and security of your activity and information?&lt;br /&gt;
&lt;br /&gt;
Now when you think about crafting a separate identity and letting it out on commercial social networking platforms, there are additional precautions to take: &lt;br /&gt;
&lt;br /&gt;
* When '''creating a social networking account for a new persona''', use the browser profile you have created for that persona. Make sure to '''check the privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
* Have fun with '''the profile information you provide''' but remember that this information is publicly available, so think about the message you want to convey with it. &lt;br /&gt;
&lt;br /&gt;
* Make sure your contacts do not overlap with your other identities, and your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
* To '''make your identities look like different people''', you can publish from your various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. &lt;br /&gt;
&lt;br /&gt;
* It can be a good idea to follow, from your pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance your real identity from your pseudonymous identities, you can also write (and hashtag on Twitter) posts under your pseudonymous profiles about events that you are not attending, especially if they are taking place far away from you. It can also be fun to publish and then delete posts that look like you have exposed your identity, so as to further confuse anyone who may try to unmask you.&lt;br /&gt;
&lt;br /&gt;
* If you are using a GPS-enabled phone, most '''social networking platforms will display your location where they can'''. This function is generally provided when you interact with the platform using a GPS-enabled phone, but the network your computer is connected to may also provide location data. It's always a good idea to '''double-check your settings''' - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
* If you '''access social networking platforms via mobile apps''', it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
'''Relevant links:'''&lt;br /&gt;
&lt;br /&gt;
* '''Terms of Service; Didn’t Read:''' (https://tosdr.org) provides a summary in &amp;quot;human language&amp;quot; of the Terms of Service of many popular social networking platforms and other websites.&lt;br /&gt;
* '''Women, action and the media:''' (http://www.womenactionmedia.org/facebookaction/)&lt;br /&gt;
* Help on scheduling Facebook posts: (https://www.facebook.com/help/389849807718635)&lt;br /&gt;
* Tools for scheduling posts on Twitter and other platforms: Buffer (https://buffer.com) and Postcron (https://postcron.com)&lt;br /&gt;
&lt;br /&gt;
==== Alternative social networking platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms can be extremely useful if your intention is to publicise as widely as possible an event you are organizing or a project you are launching. You can think of them as a megaphone - a great tool for getting attention and drawing a crowd but not ideal for communicating anything sensitive or private. There are numerous reasons why they are not considered security or privacy conscious. To begin they have very strict terms of service that could justify their decision to close your accounts if they find that your contents go against their rules. They also profile the users and send the information to advertisers. If you add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to your data. &lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms can be extremely useful if your intention is to publicise as widely as possible an event you are organizing or a project you are launching. But they definitely have their downsides. They have very strict terms of service that could justify their decision to close your accounts if they find that your contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html). They also profile the users and send the information to advertisers. If you add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to your data. &lt;br /&gt;
&lt;br /&gt;
So be strategic. Limit the use of commercial social networking platforms to specific projects you want to publicise to a wide audience. For other purposes, there are alternative social networking platforms that give much more freedom to their users and don't profile them. These are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Examples include: &lt;br /&gt;
&lt;br /&gt;
'''Diaspora:''' (https://joindiaspora.com) offers a community driven micro-tweeting platform&lt;br /&gt;
'''Friendica:''' (https://friendica.com) enables users to integrate their contacts from different social networking platforms (Facebook, Twitter, Diaspora, GNU social, App.net, Pump.io, etc), &lt;br /&gt;
'''N-1:''' (https://n-1.cc/) offers a wide range of tools such as wiki, pads, mailing lists and has a clear anti-sexist terms of service&lt;br /&gt;
'''Crabgrass:''' (https://we.riseup.net) has been around for more than ten years and constitute a solid and sustainable social networking alternative.  &lt;br /&gt;
&lt;br /&gt;
There may be similar sites popular in different regions, so you may wish to research them.  &lt;br /&gt;
&lt;br /&gt;
'''Relevant links:''' &lt;br /&gt;
* How social network policies are changing speech and privacy norms: (http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
* Helpful chart comparing various alternative social networking platforms: (https://en.wikipedia.org/wiki/Comparison_of_software_and_protocols_for_distributed_social_networking)&lt;br /&gt;
&lt;br /&gt;
==== Blogs and websites ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free:&lt;br /&gt;
&lt;br /&gt;
'''Wordpress:''' (https://wordpress.org) very popular and easy to use, open-source. &lt;br /&gt;
&lt;br /&gt;
'''Noblogs:''' (http://noblogs.org) security-oriented blogging platform based on Wordpress with some tweaks for additional user privacy, managed autonomous servers, Autistici/Inventati. &lt;br /&gt;
&lt;br /&gt;
'''BlackBlogs:''' (http://blackblogs.org) similar to Noblogs, managed by German tech collective, Nadir.&lt;br /&gt;
&lt;br /&gt;
If you want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, you can create your own website. For this you need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with Austistici/Inventati, which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If you want to use your own '''domain''' name, bypassing payments and identifications may get difficult unless you use '''Bitcoin''' or another anonymous payment system. The personal data you will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites (e.g: https://www.gandi.net/whois). To avoid this, you can register your domain with the data of an association and use a prepaid credit card that is not connected to your own data (if available in your country). Alternatively, you can use a registrar like '''Gandi''' (https://www.gandi.net) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting you; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic approaches is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that needs to be secured.&lt;br /&gt;
&lt;br /&gt;
If you use the same operating system for your several identities, no matter how carefully you separate your profiles you can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile you have assigned to your &amp;quot;real&amp;quot; identity, or get infected by a malware that allows your attacker to monitor everything you do online, with all your identities. &lt;br /&gt;
&lt;br /&gt;
To mitigate these risks, you could set up a different device for each of your domains but most of us don't have that kind of resources. A more feasible option is to set up a different operating system by using a live GNU/Linux distribution like Tails or by using virtual machines. A virtual machine (VM) can be described as a simulated computer with its own operating system, which runs as software on your physical computer. You can think of a VM as a computer within a computer. This strategy can be useful for anonymisation but also for sharing machines with others or for example for opening untrusted attachments in isolation in order to avoid a malware infection of your entire system. &lt;br /&gt;
&lt;br /&gt;
The three tools proposed here – Tails, Whonix and Qubes OS – provide you with separate operating systems for managing your alternate identities, and can be quite useful to make sure that you don’t reveal your true identity while you use the anonymous one(s).  Take into account that all the solutions detailed below are free and open-source Linux distributions and that they have been designed to maximise the privacy and security of its users. &lt;br /&gt;
&lt;br /&gt;
'''Tails, or The Amnesic Incognito Live System: ''' (https://tails.boum.org/) is a live operating system designed to help you use the internet anonymously and evade censorship. It can be run on almost any computer directly from a DVD, USB stick, or SD card and then shut down again without leaving a trace. It forces all the computers outgoing connections to go through Tor, blocking direct, non-anonymous connections. Using Tails is pretty easy, and if what you want to do with your virtual identity needs anonymisation, then it may be worthwhile to overcome the initial obstacle of installing it on a USB stick and launching it. Tails is a good option also if you have few resources, if you don’t have a computer of your own, or if you often use computers at internet cafes and want to be safer. If you want to keep the files you have created on the system or save your actions, you need to enable this option when you start it. Tails is an established, respected project that has been developed for many years and is used by a wide community of people. &lt;br /&gt;
&lt;br /&gt;
* System requirements: Tails should work on any computer manufactured after 2005 (https://tails.boum.org/doc/about/requirements/index.en.html)&lt;br /&gt;
&lt;br /&gt;
* Documentation: https://tails.boum.org/doc/index.en.html&lt;br /&gt;
&lt;br /&gt;
'''Whonix: (https://www.whonix.org)''' is an operating system created to run in a virtual machine that is designed to protect your anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a relatively recent project and the community using it is still rather small. &lt;br /&gt;
&lt;br /&gt;
* System requirements: You will need a good machine where you can run Virtualbox (https://www.virtualbox.org) in order to install Whonix (https://www.whonix.org/wiki/System_Requirements).&lt;br /&gt;
&lt;br /&gt;
* Documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
'''Qubes:''' (https://www.qubes-os.org) keeps the things you do on your computer securely isolated in different virtual machines so that if one VM gets compromised, nothing else will be affected. This way, you can do everything on a single physical computer without having to worry that one successful cyberattack harms your whole system, potentially revealing all the connections among your several identities. Qubes OS is a good choice if you want to keep all your activities inside your own computer without having to install anything else and if what you are trying to do is to effectively separate your identities rather than anonymise your activities online. &lt;br /&gt;
&lt;br /&gt;
*System requirements: Qubes requires a very powerful computer (http://qubes-os.org/trac/wiki/SystemRequirements) – this can be a hindrance, but if you feel that you really need to protect yourself against possible digital attacks, the investment may be worth its while. &lt;br /&gt;
&lt;br /&gt;
* Documentation: https://www.qubes-os.org/doc/&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protect you from every threat, and you shouldn’t look at them as a magic potion that will make you invulnerable. Nevertheless, by using any of them, according to your needs and resources, you will raise the level of effort that an attacker will need to harm you, thus making an attack less likely. &lt;br /&gt;
&lt;br /&gt;
'''Relevant links:''' &lt;br /&gt;
* A wider comparison of other such operating systems: https://www.whonix.org/wiki/Comparison_with_Others &lt;br /&gt;
* Qubes developer Johanna Rutowska describes how she partitioned her life into security domains: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
== Synthesis == &lt;br /&gt;
&lt;br /&gt;
This section of the manual has looked at how to include gender into individual security and privacy practices by focusing on the question of identity, exploring what digital shadows mean for each of us alone, and collectively as women and trans* persons. It also covered practical steps you can take to control and play with your identity/ies. However most of you will also want to communicate and organise with others. So, how do you create and maintain pockets of comfort and safety in digital space for discussion, support and presence between those who share common goals, views or mandates, whether it be within your organisation or more broadly in your communities. And what are the strategies for increasing visibility and resistance in inhospitable spaces, which exclude or harm us.  The second section of the manual looks beyond the choices and practices available to the individual, and delves into the management of space, looking at strategies for building safe spaces both online and offline.&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1807</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1807"/>
				<updated>2015-06-03T18:41:24Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: edited part on different OSs&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
'''Chapter 1: Digital traces and identities online'''&lt;br /&gt;
&lt;br /&gt;
== Digital shadows ==&lt;br /&gt;
&lt;br /&gt;
How much data exists about you? What kind of traces do you leave behind about your identity, your networks, and your habits when you use digital services? How does this connect to who you are online and who you are offline? What can someone who wants to harm you or investigate you, actually find out? &lt;br /&gt;
&lt;br /&gt;
Your digital shadow is the story that data tell about you. It is created by trillions of traces, or bits of data, left behind in the digital world every time you go online, or when your mobile phone or any other object around you sends information to the internet. These bits of data can include your name, location, contacts, photos, messages, tweets and likes, but also the brand of your computer, length of your phone calls and information about which websites you visit. &lt;br /&gt;
&lt;br /&gt;
These traces are created by you actively publishing and sharing information about yourself and people sharing information about you by tagging you in pictures, mentioning you in tweets or simply by communicating with you. There are also traces which are passively created, without you necessarily realising it, or consenting to it. For example, your browsing habits and IP address are shared amongst websites you visit and services you use in order to track your behaviour and try to sell you products through advertising. &lt;br /&gt;
&lt;br /&gt;
In order to understand the concept of digital shadows, it is useful to break it down into what the data is that is being collected and who is collecting it. &lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
&lt;br /&gt;
When we think about digital traces, we are talking about three types of data: content, metadata and noise. &lt;br /&gt;
&lt;br /&gt;
'''Content:''' is what you actively produce: your messages, blogs, tweets, phone calls and online purchases; the pictures and videos you take to remember. &lt;br /&gt;
&lt;br /&gt;
'''Metadata:''' is data about your data, information that is needed for the technological infrastructure to work. It enables your email to be delivered, files on your computer to be found and mobile communication to work. If you take the example of an email that you send, the metadata includes the sender's email, the recipient's email, the time the email was sent, the type of device the email was sent from, and the location it was sent from. &lt;br /&gt;
&lt;br /&gt;
'''Noise:''' is the data that is created by either the manufacturing process or by the workings of the technological infrastructure. For example, every camera with a SD card to record and store pictures has unique scratches. These make small changes to the data that are not visible to the eye but can be recognised by computers. &lt;br /&gt;
&lt;br /&gt;
''Who collects data?'' &lt;br /&gt;
&lt;br /&gt;
You might wonder about the importance of one picture, one message, or one call. You might think there is so much data out there that nobody knows what to do with it, or cares that much about it. &lt;br /&gt;
&lt;br /&gt;
However, there are in reality a number of parties interested in this data - including companies, governments and individuals - and data collection and data analysis is by now very sophisticated. The data traces you leave behind online are constantly being collected, analysed and sorted by various parties to create profiles on you; and every time a new piece of data is aggregated, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected for a variety of purposes. Profiles can be bought and sold; data can be used to control, suppress or silence; or it can be used to create harassment strategies by people who want to harm your reputation or attack you for your views or beliefs. All of the aforementioned actors can have access to your digital shadow. They might access it in different ways: through surveillance of your activities, through data-sharing between applications, or through researching publicly available pieces of data about you and patching these all together. &lt;br /&gt;
&lt;br /&gt;
Depending on who you are and what you do, you will probably have different concerns about who can access your digital shadows and how this makes you vulnerable. &lt;br /&gt;
&lt;br /&gt;
'''Relevant links:'''&lt;br /&gt;
&lt;br /&gt;
* '''Trackography''': (https://trackography.org/) an interactive map exploring how the global tracking industry is recording your online behaviour. &lt;br /&gt;
&lt;br /&gt;
'''Further Readingsː'''&lt;br /&gt;
&lt;br /&gt;
* Privacy international videoː (https://www.privacyinternational.org/?q=node/573) explaining what is metadata and what should we care about it.&lt;br /&gt;
* Ed Felten explains how you can tell someone had an abortion from studying the metadata of their phone calls: (http://www.washingtonpost.com/blogs/the-switch/wp/2013/08/27/heres-how-phone-metadata-can-reveal-your-affairs-abortions-and-other-secrets/)&lt;br /&gt;
* Hello Barbie points at the limits of eavesdropping, privacy and how devices are sending data to third actor partiesː (http://www.washingtonpost.com/blogs/the-switch/wp/2015/03/11/privacy-advocates-try-to-keep-creepy-eavesdropping-hello-barbie-from-hitting-shelves/)&lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
You can't know exactly what is happening to your digital shadow or who might have to access to it, and that itself is a problem. Although this situation might seem dire, the idea is not to get paralyzed by paranoia but to try to demystify it for yourself and try out different methods for controlling and minimising your shadows. Some examples include reducing the amount of data you give away;  consciously stripping valuable information from content and metadata; exercising the art of self-doxing; and thinking about ways to play with and break up your online identity.&lt;br /&gt;
&lt;br /&gt;
The strategies and tools detailed below can increase your privacy, and help you to be more secure, both online and offline - without being less vocal or reducing your activity online. To move towards getting some control over your digital shadow, a good place to start is to see what it looks like (as far as is possible) and explore the size, depth and characteristics of your digital shadow:&lt;br /&gt;
&lt;br /&gt;
* '''Trace My Shadowː''' (https://myshadow.org/trace-my-shadow) is a tool produced by Tactical Tech that allows you to see some of the traces you are leaving online, and it offers a lot of tips on how to protect your privacy.&lt;br /&gt;
* '''Digital Shadowː''' (https://digitalshadow.com) is a Facebook app developed by Ubisoft which illustrates what third parties can know about you through your Facebook profile. &lt;br /&gt;
* '''Panopticlickː''' (https://panopticlick.eff.org/) tests your browser to see how unique it is based on the information it will share with sites it visits. By using this application, your browser will be given a uniqueness score, letting you see how easily identifiable you might be as you surf the web.&lt;br /&gt;
* '''OpenPaths.ccː''' (https://openpaths.cc/) is a tool that allows you to track your location history over time with your smartphone. You can then visualise this data and see what kind of story it tells about you. &lt;br /&gt;
&lt;br /&gt;
'''Self-doxing:'''  Another strategy for exploring your visible traces and what is already out there about you on the internet is to dox yourself. '''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find their flaws. This technique is used sometimes by activists and investigative journalists to profile subjects of interest. It is also used as a strategy of harassment online. &amp;quot;Self-doxing&amp;quot;, or researching yourself, is a technique that can help you to make informed decisions about what you share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (through websites such as: http://www.whois-search.com/ or similar). &lt;br /&gt;
&lt;br /&gt;
Remember, even while you are exploring yourself, other people can be exploring you too. So  when you are using these web services and looking for your digital shadow, a good idea is to use anonymisation tools like Torbrowser(https://www.torproject.org/projects/torbrowser.html.en).&lt;br /&gt;
&lt;br /&gt;
'''Further Readings:'''&lt;br /&gt;
&lt;br /&gt;
* Advice on doxing your harassers as a way to assess your risk: (https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk)&lt;br /&gt;
* Tips no how self-dox yourself (or to dox someone else): (https://lilithlela.cyberguerrilla.org/?page_id=93870)&lt;br /&gt;
* Anonymous Activism/Tor for Feminists by Fembot collectiveː (http://fembotcollective.org/blog/2015/05/06/toolkit-anonymous/)&lt;br /&gt;
&lt;br /&gt;
==== Mapping ====&lt;br /&gt;
&lt;br /&gt;
While we have explained what steps you might take to explore your personal digital shadow and traces you leave online, you will also need to enlarge this exploration to the people you interact with online.  &lt;br /&gt;
&lt;br /&gt;
Everyone belongs to several social domains - your work or advocacy networks, your family networks, friends, sports teams, whatever. Some networks may feel safer than others. For example, you may be more vigilant about what you share and how you share it in your work or advocacy activities, but less so for interacting with friends on a social networking platform. &lt;br /&gt;
&lt;br /&gt;
If you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in a social networking platform that you like a particular kind of game, an attacker who wants to investigate your work or advocacy activities might trick you into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if your work identity and your gaming profile can be connected to the same person; and this is why separating your social domains can be useful. To separate your social domains, it's helpful to first map them out and identify which ones could expose you most. &lt;br /&gt;
&lt;br /&gt;
You can do this by thinking about your different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not. You can do this by considering the data that you handle in the different realms of your life and ask yourself: what would happen if this particular data suddenly disappeared or if it was seen, copied and distributed by a third actor party? &lt;br /&gt;
&lt;br /&gt;
'''Example:''' Polish computer security researcher Joanna Rutkowska developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain, including her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the encrypted communication with her partner.&lt;br /&gt;
* The '''red''' domain includes the totally untrusted areas which don’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
This might be a technical example, but it illustrates the concept of security by isolation very well as it recognises that security measures can always be vulnerable and that harm can be reduced by stopping possible attackers from accessing the whole system that needs to be secured. This example can be applied in other ways to your own social domains.&lt;br /&gt;
&lt;br /&gt;
Further readingsː &lt;br /&gt;
* You can find more details about Rutkowska's scheme here: (http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html). &lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
Finding out what data exists out there and can be accessed by others is an empowering first step. There are also measures you can take to control what content and metadata you give away. When you publish content on the internet, it is always a good idea to ask yourself if what you are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to your personal life, the names you mention or the images you upload may contribute to a picture about who you are, what you are doing, where you are doing it and so on. This could be used by people who wish to target you. &lt;br /&gt;
&lt;br /&gt;
This does not mean that you should silence yourself – by taking some basic steps, you can limit your risks. You can think of these as increasing the amount of effort someone who wants to surveil or attack you or your contacts would need to take. &lt;br /&gt;
&lt;br /&gt;
'''Controlling your content when connecting to the internet'''&lt;br /&gt;
 &lt;br /&gt;
* When '''giving personal information to a web service''', make sure the service provides an '''encrypted connection''' for you to access it from (the url should begin with https://). You can use the browser add-on '''Https Everywhere''' for Firefox, Chrome and Opera browsers, provided by the Electronic Frontier Foundation to help you force https connections with websites that have them (https://www.eff.org/https-everywhere). &lt;br /&gt;
&lt;br /&gt;
* Using '''Torbrowser''' will '''hide specific metadata like your IP address''', thereby increasing your anonymity online. (See https://securityinabox.org/en/guide/anonymity-and-circumvention)&lt;br /&gt;
&lt;br /&gt;
* You can install add-ons like '''Privacy Badger''' or '''Adblock Plus''' for the Firefox Browser, as well as by monitoring your privacy settings and deleting '''cookies''' on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* You should '''use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts. (See https://securityinabox.org/en/guide/passwords)&lt;br /&gt;
&lt;br /&gt;
'''Controlling your content when publishing online'''&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about your life''', you can use '''private profiles''' that can only be accessed by selected contacts. When using those on commercial social networking platforms, you should be aware of the '''regular changes to the privacy policies''' of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' online, you should ask yourself if the information you spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called '''ObscuraCam''', a free camera application for Android devices. (https://guardianproject.info/apps/obscuracam)&lt;br /&gt;
&lt;br /&gt;
'''Controlling your content by reducing your metadata:'''&lt;br /&gt;
&lt;br /&gt;
* You can '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, you don't need to use your real name. This prevents the metadata created when using this device or software from being connected to you. &lt;br /&gt;
&lt;br /&gt;
* When '''publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or you can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  You can use '''tools to remove metadata from certain files'''. For images there is '''Metanull''' for Windows (https://securityinabox.org/en/lgbti-africa/metanull/windows). For '''PDFs''', Windows or MAC OS users can use programs such as '''Adobe Acrobat XI Pro''' (for which a trial version is available). GNU/Linux users can use '''PDF MOD''', a free and open source tool. (Note: this tool  doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF.) For a full guide to'''removing metadata from different file formats''', see Tactical Tech's resource: https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
'''Controlling your content by deleting accountsː'''&lt;br /&gt;
&lt;br /&gt;
One method of controlling your shadow is reducing the number of platforms and services you can be found on. Some tools to help you delete existing accounts include: &lt;br /&gt;
 &lt;br /&gt;
* The '''Suicide Machineː''' (http://suicidemachine.org) is a tool that facilitates the process of deleting social media profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKillerː''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Meː''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once you have identified your different social domains and the digital activities and contacts that go with them, what you need to do is decide if you want to differentiate your identities accordingly, or if you'd rather stick to your official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
Once you have identified your different social domains and the digital activities and contacts that go with them, what you need to do is decide if you want to differentiate your identities accordingly, or if you'd rather stick to your official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
You may want to keep your work connected to your legal or &amp;quot;real&amp;quot; identity, or think that your activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social media, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific situation the following questions: &lt;br /&gt;
&lt;br /&gt;
* Would my safety, job or livelihood be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
These questions are part of a basic risk assessment which can you use at many different points when thinking about your digital security and privacy. Once you have assessed your risk, you can then consider different strategies for separating your identities online. These range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
'''Relevant links:'''&lt;br /&gt;
&lt;br /&gt;
* Tactical Tech's guide to risk assessment: (https://securityinabox.org/en/lgbti-mena/security-risk)&lt;br /&gt;
* Electronic Frontier Foundation's guide to threat modeling: (https://ssd.eff.org/en/module/introduction-threat-modeling)&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding talks about her decision to start writing under her real name, dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
For instance the project Geek Wiki Feminism reveals how certain groups of people are disadvantaged by policies which require individuals to use their real or legal names. These include women, queers, trans* persons, differently-abled persons, children and parents. The costs to these groups when having a public profile attached to their real name can range from discrimination in employment or provision of services to arrest,imprisonment or execution in some jurisdictions.  For a comprehensive list of which groups of people are affected and how they are affected see Geek Wiki Feminism (http://geekfeminism.wikia.com/wiki/Who_is_harmed_by_a_%22Real_Names%22_policy%3F)&lt;br /&gt;
&lt;br /&gt;
'''Further readings:'''&lt;br /&gt;
&lt;br /&gt;
* Kate Harding talks about her decision to start writing under her real nameː (http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name/)&lt;br /&gt;
* How Facebook's real name policy affects LGBTQ persons: (https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community)&lt;br /&gt;
* Geek Feminism Wiki - Who is harmed by a &amp;quot;Real Names&amp;quot; policy?ː (http://geekfeminism.wikia.com/wiki/Who_is_harmed_by_a_%22Real_Names%22_policy%3F)&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, Vani, a human rights activist, writes: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless” (http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously).&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where you don't need to gain other people's trust, when there are few or no people you can trust, or when you don't want to expose others in your life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance, you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you, as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When you adopt anonymity as a strategy you may use pseudonyms, but these should not be used across different networks or social domains, and some may only be used once and then discarded. Because of this, anonymity differs from persistent pseudonymity. &lt;br /&gt;
&lt;br /&gt;
'''Relevant links:''' &lt;br /&gt;
&lt;br /&gt;
* The anonymity decision for bloggers: (https://advocacy.globalvoicesonline.org/2015/05/01/to-be-or-not-to-be-anonymous-how-should-bloggers-decide/)&lt;br /&gt;
* How the real identity of the blogger behind the Gay Girl blog was revealed by online investigation: http://electronicintifada.net/blogs/ali-abunimah/new-evidence-about-amina-gay-girl-damascus-hoax&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name used consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;. There are myriad reasons why you might want to use a name other than the one you were born with such as to hide your gender or protect your privacy. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At the time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot;  which typically means using your legal name or the name by which you are commonly known. This policy has caused many users to lose their Facebook accounts among which we find feminists groups, trans* persons and drag kings and queens known for their pseudonymous rather than their legal name. If you choose to use a pseudonym on social networks, it is important to understand that you can be reported for using a &amp;quot;fake name&amp;quot; and possibly have your account deleted. A strategy for avoiding that is using a name-shaped pseudonym. &lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers '''visibility''', which allows to network with others, and by pinning your voice to a particular name you can develop an '''online reputation'''. This depends on others to decide whether you are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to your legal identity, or not. The choice to connect your online reputation to your &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
'''Relevant links:''' &lt;br /&gt;
&lt;br /&gt;
* The many reasons people use pseudonyms: (https://www.eff.org/deeplinks/2011/07/case-pseudonyms)&lt;br /&gt;
* Geek Wiki Feminism on Pseudonymousː(http://geekfeminism.wikia.com/wiki/Pseudonymity) and a bingo about it (http://geekfeminism.org/2011/07/08/anti-pseudonym-bingo/)&lt;br /&gt;
* A blogger explains how a human error exposed her pseudomynous online identity which put her work identity at risk: (http://disabledfeminists.com/2010/04/14/on-refusing-to-tell-you-my-name/)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. For centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity. &lt;br /&gt;
&lt;br /&gt;
'''Some examples of collective identities:'''&lt;br /&gt;
&lt;br /&gt;
'''Captain Swing:''' the identity used by farm workers in their letters of protest during the English Swing Riots in 1830 (https://en.wikipedia.org/wiki/Captain_Swing)&lt;br /&gt;
&lt;br /&gt;
'''Luther Blisset:''' a name originally belonging to an Italian footballer which was adopted and used by many artists and activists for various actions and projects (https://en.wikipedia.org/wiki/Luther_Blissett_%28nom_de_plume%29)&lt;br /&gt;
&lt;br /&gt;
'''Guerrilla Girls:''' an anonymous group of feminist and female artists devoted to fighting sexism and racism within the art world (http://guerrillagirls.com/)  &lt;br /&gt;
&lt;br /&gt;
'''Netochka Nezvanovaː''' might be a collective name or it might be one women only. Netochka is the human face of a software tool kit used for digital video in real time. Netochka gives the interviews to promote the software. Except that when she shows up in person, she’s frequently embodied by different women (http://www.salon.com/2002/03/01/netochka/)&lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice you make, what is important is that you keep your domains effectively separated. No matter how many domains you identify in your digital life, and how many corresponding identities you create, on the internet every identity - even the one bearing your real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example '''Tor''' or '''TAILS''')&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
Once something is on the internet it will stay on the internet, as the internet does not forget. You may think that deleting certain sensitive data from social networking platforms and web services may be enough to protect yourself, but remember that metadata cannot be deleted as easily. And using just one identity through your whole life - in all your work and personal domains - creates a bulk of information that makes it easier to profile you. &lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of your social domains. You might also choose to use your real identity in some areas, and your new alternative identities in others. Take into account the following recommendations when creating new online identities:&lt;br /&gt;
&lt;br /&gt;
* You should select the contacts for each one carefully, and avoid sharing contacts with other identities you use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and if possible, even devices.&lt;br /&gt;
&lt;br /&gt;
* Your various identities should not linked to each other, or to your real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number, or using a persistent pseudonymous when creating a one time use disposable email.&lt;br /&gt;
&lt;br /&gt;
* Creating disposable  extra identities can be useful, as they can be discarded easily if compromised. Those  can also can  be created for new acquaintances when appropriate as introductory profiles to get to know somebody before you include them in your more trusted network.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
Many platforms have &amp;quot;real name&amp;quot; policies so if you want to use commercial social networking platforms, it is better to use a credible name and surname rather than more imaginative ones. &lt;br /&gt;
&lt;br /&gt;
Once you have decided on a name, a surname, and a username for your virtual persona, you should do thorough research - perhaps also using doxing tools and techniques - to find out if someone else is already using that name. After all, if you wish to develop your own reputation, you don’t want to be confused with someone else, especially if they don’t share your views of the world or if your activities might put them at risk!&lt;br /&gt;
&lt;br /&gt;
Then you need to create a story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role. You can invent a new story if you feel particularly inspired or base your story on a “known” person’s story, a superhero, a fictional character from your favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when you create an identity you should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
'''Further reading:'''&lt;br /&gt;
&lt;br /&gt;
* Helpful tips for inventing a new identity: (http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed)&lt;br /&gt;
* Artist Curtis Wallen's experience of creating a new online identity: (http://www.theatlantic.com/technology/archive/2014/07/how-to-invent-a-person-online/374837/)&lt;br /&gt;
&lt;br /&gt;
==== Credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If you keep all your normal identifying traits - such as your gender, job, attitude or the way you write - it might be possible for someone to connect the dots and link your pseudonymous personas with your real identity. &lt;br /&gt;
&lt;br /&gt;
* '''Work:''' Your persona should have a job that is different from yours, but not so different that you don’t know anything about that field: for example, they shouldn’t be a surgeon if you don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*'''Skills and interests:''' Similar considerations should be made to select your persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
*'''Psychological attitude:''' A good way to give your persona depth is by creating some &amp;quot;weak spots&amp;quot; which are not the same as your own. So when the persona gets attacked, you can laugh about it and not experience harm. E.g if you have a good sense of humour, try impersonating a humourless person! &lt;br /&gt;
&lt;br /&gt;
* '''Linguistic fingerprint:''' This could be identified through a &amp;quot;stylometric analysis&amp;quot; that makes it possible to identify the author of a particular text. To change this, you can start by using a spell-checker in your word processor to check for consistent typos and you could also think about adopting a different writing attitude. You could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
In any case, you should always remember that on the internet, each one of your identities - even the one connected to your real name - is a “virtual” identity, and it is always better to decide what character traits you want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for your “real” online identity.&lt;br /&gt;
&lt;br /&gt;
'''Relevant links:'''&lt;br /&gt;
&lt;br /&gt;
* Tips for creating a rounded character for your identities: /https://lilithlela.cyberguerrilla.org/?page_id=94049)&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Maintaining multiple identities is some work, but like most of these practices, it just requires some curiosity, patience and attention. The main point is to keep your identities separated otherwise they will very quickly begin to mix with one another. As a start, you can keep notes on your identities to help you to avoid any awkward situations where you confuse one with the other (but do think carefully about where you host or keep those notes!) There are also technical things you can do:  &lt;br /&gt;
&lt;br /&gt;
* Create '''different browser profiles''' so that your browsing habits are captured under different identities, on Firefox (https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles) or Google Chrome (https://support.google.com/chrome/answer/2364824)&lt;br /&gt;
* When creating a new email account or social media account for your identity, it is a good idea to '''connect to the server’s website with Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
* If you have the resources and motivation you can separate your identities per device or operating system. This can include using virtual machines for instance, as explained below. &lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains you need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In other cases, though, all you need is a disposable email address that you only need to use for opening an account in an untrusted platform. This will reduce the number of traces connected to the email address you use for your work or personal life and minimise the amount of spam in your life. Below are some services which can help you set up these disposable accounts and addresses:&lt;br /&gt;
&lt;br /&gt;
* '''Anonbox:'''(https://anonbox.net) is a service provided by the Chaos Computer Club (CCC) gives you a mailbox for a day. &lt;br /&gt;
* '''Guerilla Mail:''' (https://www.guerrillamail.com) lets you choose your email id and holds any mail you receive to it in a mailbox for one hour. &lt;br /&gt;
* '''BugMeNot:''' (http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use. &lt;br /&gt;
* '''Fakena.me:''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that will give you all the fake info you need to set up an account (fake name, birth date, US only address, username and password) as well as a link to an associated guerillamail mailbox. &lt;br /&gt;
* '''Instant Internet Decoy:''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions. &lt;br /&gt;
&lt;br /&gt;
Another option is to set up a '''mail alias''' - a different email address that is connected to your main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised you can just dispose of it and create a new one. But beware that is very easy to check what the source email address, so don't use this method when you really need to disguise your identity.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup''' (https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org). &lt;br /&gt;
&lt;br /&gt;
'''Relevant links:''' &lt;br /&gt;
&lt;br /&gt;
* A list of autonomous email providers compiled by Riseup: (https://help.riseup.net/en/radical-servers)&lt;br /&gt;
&lt;br /&gt;
==== Commercial social networking platforms ====&lt;br /&gt;
&lt;br /&gt;
Before choosing to use any social networking platform there are some basic security and privacy questions you should ask, regardless of which identity you plan on using:&lt;br /&gt;
&lt;br /&gt;
* Does it provide an '''encrypted connection (https)''' for all uses of the site, rather than just during login? Are there any problems related to encryption (e.g. related to encryption certificates)? &lt;br /&gt;
&lt;br /&gt;
* According to the platform's '''End User Licence Agreement''', '''Privacy Policy and/or Data Use Policy''', how is your content and personal data treated? With whom are they shared? &lt;br /&gt;
&lt;br /&gt;
* What privacy options are provided for users? For example, can you choose to share your videos securely with a small number of individuals, or are they all public by default? &lt;br /&gt;
&lt;br /&gt;
* Is the '''geographical location of the servers known'''? Under which '''territorial jurisdiction''' do they fall? Where is the company registered? How does this information relate to the privacy and security of your activity and information?&lt;br /&gt;
&lt;br /&gt;
Now when you think about crafting a separate identity and letting it out on commercial social networking platforms, there are additional precautions to take: &lt;br /&gt;
&lt;br /&gt;
* When '''creating a social networking account for a new persona''', use the browser profile you have created for that persona. Make sure to '''check the privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
* Have fun with '''the profile information you provide''' but remember that this information is publicly available, so think about the message you want to convey with it. &lt;br /&gt;
&lt;br /&gt;
* Make sure your contacts do not overlap with your other identities, and your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
* To '''make your identities look like different people''', you can publish from your various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. &lt;br /&gt;
&lt;br /&gt;
* It can be a good idea to follow, from your pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance your real identity from your pseudonymous identities, you can also write (and hashtag on Twitter) posts under your pseudonymous profiles about events that you are not attending, especially if they are taking place far away from you. It can also be fun to publish and then delete posts that look like you have exposed your identity, so as to further confuse anyone who may try to unmask you.&lt;br /&gt;
&lt;br /&gt;
* If you are using a GPS-enabled phone, most '''social networking platforms will display your location where they can'''. This function is generally provided when you interact with the platform using a GPS-enabled phone, but the network your computer is connected to may also provide location data. It's always a good idea to '''double-check your settings''' - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
* If you '''access social networking platforms via mobile apps''', it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
'''Relevant links:'''&lt;br /&gt;
&lt;br /&gt;
* '''Terms of Service; Didn’t Read:''' (https://tosdr.org) provides a summary in &amp;quot;human language&amp;quot; of the Terms of Service of many popular social networking platforms and other websites.&lt;br /&gt;
* '''Women, action and the media:''' (http://www.womenactionmedia.org/facebookaction/)&lt;br /&gt;
* Help on scheduling Facebook posts: (https://www.facebook.com/help/389849807718635)&lt;br /&gt;
* Tools for scheduling posts on Twitter and other platforms: Buffer (https://buffer.com) and Postcron (https://postcron.com)&lt;br /&gt;
&lt;br /&gt;
==== Alternative social networking platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms can be extremely useful if your intention is to publicise as widely as possible an event you are organizing or a project you are launching. You can think of them as a megaphone - a great tool for getting attention and drawing a crowd but not ideal for communicating anything sensitive or private. There are numerous reasons why they are not considered security or privacy conscious. To begin they have very strict terms of service that could justify their decision to close your accounts if they find that your contents go against their rules. They also profile the users and send the information to advertisers. If you add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to your data. &lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms can be extremely useful if your intention is to publicise as widely as possible an event you are organizing or a project you are launching. But they definitely have their downsides. They have very strict terms of service that could justify their decision to close your accounts if they find that your contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html). They also profile the users and send the information to advertisers. If you add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to your data. &lt;br /&gt;
&lt;br /&gt;
So be strategic. Limit the use of commercial social networking platforms to specific projects you want to publicise to a wide audience. For other purposes, there are alternative social networking platforms that give much more freedom to their users and don't profile them. These are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Examples include: &lt;br /&gt;
&lt;br /&gt;
'''Diaspora:''' (https://joindiaspora.com) offers a community driven micro-tweeting platform&lt;br /&gt;
'''Friendica:''' (https://friendica.com) enables users to integrate their contacts from different social networking platforms (Facebook, Twitter, Diaspora, GNU social, App.net, Pump.io, etc), &lt;br /&gt;
'''N-1:''' (https://n-1.cc/) offers a wide range of tools such as wiki, pads, mailing lists and has a clear anti-sexist terms of service&lt;br /&gt;
'''Crabgrass:''' (https://we.riseup.net) has been around for more than ten years and constitute a solid and sustainable social networking alternative.  &lt;br /&gt;
&lt;br /&gt;
There may be similar sites popular in different regions, so you may wish to research them.  &lt;br /&gt;
&lt;br /&gt;
'''Relevant links:''' &lt;br /&gt;
* How social network policies are changing speech and privacy norms: (http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
* Helpful chart comparing various alternative social networking platforms: (https://en.wikipedia.org/wiki/Comparison_of_software_and_protocols_for_distributed_social_networking)&lt;br /&gt;
&lt;br /&gt;
==== Blogs and websites ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free:&lt;br /&gt;
&lt;br /&gt;
'''Wordpress:''' (https://wordpress.org) very popular and easy to use, open-source. &lt;br /&gt;
&lt;br /&gt;
'''Noblogs:''' (http://noblogs.org) security-oriented blogging platform based on Wordpress with some tweaks for additional user privacy, managed autonomous servers, Austistici/Inventati. &lt;br /&gt;
&lt;br /&gt;
'''BlackBlogs:''' (http://blackblogs.org) similar to Noblogs, managed by German tech collective, Nadir.&lt;br /&gt;
&lt;br /&gt;
If you want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, you can create your own website. For this you need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with Austistici/Inventati, which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If you want to use your own '''domain''' name, bypassing payments and identifications may get difficult unless you use '''Bitcoin''' or another anonymous payment system. The personal data you will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites (e.g: https://www.gandi.net/whois). To avoid this, you can register your domain with the data of an association and use a prepaid credit card that is not connected to your own data (if available in your country). Alternatively, you can use a registrar like '''Gandi''' (https://www.gandi.net) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting you; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic approaches is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that needs to be secured.&lt;br /&gt;
&lt;br /&gt;
If you use the same operating system for your several identities, no matter how carefully you separate your profiles you can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile you have assigned to your &amp;quot;real&amp;quot; identity, or get infected by a malware that allows your attacker to monitor everything you do online, with all your identities. &lt;br /&gt;
&lt;br /&gt;
To mitigate these risks, you could set up a different device for each of your domains but most of us don't have that kind of resources. A more feasible option is to set up a different operating system by using a live GNU/Linux distribution like Tails or by using virtual machines. A virtual machine (VM) can be described as a simulated computer with its own operating system, which runs as software on your physical computer. You can think of a VM as a computer within a computer. This strategy can be useful for anonymisation but also for sharing machines with others or for example for opening untrusted attachments in isolation in order to avoid a malware infection of your entire system. &lt;br /&gt;
&lt;br /&gt;
The three tools proposed here – Tails, Whonix and Qubes OS – provide you with separate operating systems for managing your alternate identities, and can be quite useful to make sure that you don’t reveal your true identity while you use the anonymous one(s).  Take into account that all the solutions detailed below are free and open-source Linux distributions and that they have been designed to maximise the privacy and security of its users. &lt;br /&gt;
&lt;br /&gt;
'''Tails, or The Amnesic Incognito Live System: ''' (https://tails.boum.org/) is a live operating system designed to help you use the internet anonymously and evade censorship. It can be run on almost any computer directly from a DVD, USB stick, or SD card and then shut down again without leaving a trace. It forces all the computers outgoing connections to go through Tor, blocking direct, non-anonymous connections. Using Tails is pretty easy, and if what you want to do with your virtual identity needs anonymisation, then it may be worthwhile to overcome the initial obstacle of installing it on a USB stick and launching it. Tails is a good option also if you have few resources, if you don’t have a computer of your own, or if you often use computers at internet cafes and want to be safer. If you want to keep the files you have created on the system or save your actions, you need to enable this option when you start it. Tails is an established, respected project that has been developed for many years and is used by a wide community of people. &lt;br /&gt;
&lt;br /&gt;
* System requirements: Tails should work on any computer manufactured after 2005 (https://tails.boum.org/doc/about/requirements/index.en.html)&lt;br /&gt;
&lt;br /&gt;
* Documentation: https://tails.boum.org/doc/index.en.html&lt;br /&gt;
&lt;br /&gt;
'''Whonix: (https://www.whonix.org)''' is an operating system created to run in a virtual machine that is designed to protect your anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a relatively recent project and the community using it is still rather small. &lt;br /&gt;
&lt;br /&gt;
* System requirements: You will need a good machine where you can run Virtualbox (https://www.virtualbox.org) in order to install Whonix (https://www.whonix.org/wiki/System_Requirements).&lt;br /&gt;
&lt;br /&gt;
* Documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
'''Qubes:''' (https://www.qubes-os.org) keeps the things you do on your computer securely isolated in different virtual machines so that if one VM gets compromised, nothing else will be affected. This way, you can do everything on a single physical computer without having to worry that one successful cyberattack harms your whole system, potentially revealing all the connections among your several identities. Qubes OS is a good choice if you want to keep all your activities inside your own computer without having to install anything else and if what you are trying to do is to effectively separate your identities rather than anonymise your activities online. &lt;br /&gt;
&lt;br /&gt;
*System requirements: Qubes requires a very powerful computer (http://qubes-os.org/trac/wiki/SystemRequirements) – this can be a hindrance, but if you feel that you really need to protect yourself against possible digital attacks, the investment may be worth its while. &lt;br /&gt;
&lt;br /&gt;
* Documentation: https://www.qubes-os.org/doc/&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protect you from every threat, and you shouldn’t look at them as a magic potion that will make you invulnerable. Nevertheless, by using any of them, according to your needs and resources, you will raise the level of effort that an attacker will need to harm you, thus making an attack less likely. &lt;br /&gt;
&lt;br /&gt;
'''Relevant links:''' &lt;br /&gt;
* A wider comparison of other such operating systems: https://www.whonix.org/wiki/Comparison_with_Others &lt;br /&gt;
* Qubes developer Johanna Rutowska describes how she partitioned her life into security domains: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
== Synthesis == &lt;br /&gt;
&lt;br /&gt;
This section of the manual has looked at how to include gender into individual security and privacy practices by focusing on the question of identity, exploring what digital shadows mean for each of us alone, and collectively as women and trans* persons. It also covered practical steps you can take to control and play with your identity/ies. However most of you will also want to communicate and organise with others. So, how do you create and maintain pockets of comfort and safety in digital space for discussion, support and presence between those who share common goals, views or mandates, whether it be within your organisation or more broadly in your communities. And what are the strategies for increasing visibility and resistance in inhospitable spaces, which exclude or harm us.  The second section of the manual looks beyond the choices and practices available to the individual, and delves into the management of space, looking at strategies for building safe spaces both online and offline.&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1367</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1367"/>
				<updated>2015-05-28T11:26:05Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
'''Chapter 1: Digital traces and identities online'''&lt;br /&gt;
&lt;br /&gt;
== Digital traces ==&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, it has also become a space where people who question or challenge dominant discourses - especially where those deal with gender and sexual orientation - are silenced, harassed and threatened. &lt;br /&gt;
&lt;br /&gt;
If you are active on the internet as women, human rights defenders, trans* or queer persons, and/or feminists, you'll probably want to make sure your privacy and security are protected as much as possible. &lt;br /&gt;
&lt;br /&gt;
A good place to start is by assessing the traces you are leaving behind on the internet, by getting to know your digital shadow and understanding how you organise your social domains and networks across your online and physical activities. &lt;br /&gt;
&lt;br /&gt;
The traces you leave online can tell very accurate stories about you; who you are, were you live and hang out; what you are interested in and who your friends and collaborators are. This information can expose you to several threats, including online harassment - particularly where the traces you leave behind are publicly available. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' you can use to take more control over your digital shadows - to increase your privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing your activity online.  &lt;br /&gt;
Some examples of these strategies and tools include controlling the amount of data you give away by consciously stripping valuable information from content and metadata; trying the art of self-doxing; and thinking about ways to play with and break up your online identity.&lt;br /&gt;
&lt;br /&gt;
Your digital shadow is the story data tells about you. This digital shadow is created by trillions of bits of data, left behind in the digital world when you connect to the internet, your mobile phones and your other online services. These digital shadows ultimately have a life of their own. They can be affected by others and can change in unpredictable ways. They grow continuously, and can be permanent, encompassing both your past and present activities. &lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' &lt;br /&gt;
The devices and the software you use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data. These bits of data can include your name, location, contacts, pictures, messages, tweets and likes, but also the brand of your computer, length of your phone calls and information about which websites you visit. These data traces can be put out there by yourself as well as by other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' &lt;br /&gt;
In some cases you '''actively '''share data – for example when you share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about you, by tagging you in pictures, mentioning you in tweets or simply by communicating with you. In other cases, you give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
&lt;br /&gt;
Your browsing habits and IP address are shared when you visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites you visit, and the information shared is collected for a wide range of purposes, from website analytics to advertising. Your mobile phone apps also collect data on you without your active knowledge or consent – for example, the photos you take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow you as you move from one service to another - from your internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in your readers to publishing pictures from the latest protest you covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of your messages, blogs, tweets and phone calls; it is your pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables your email to be delivered, files on your computer to be found and mobile communication to work. Metadata can include your email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the technological infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognised by computers.&lt;br /&gt;
&lt;br /&gt;
==== Who collects data? ====   &lt;br /&gt;
&lt;br /&gt;
You might wonder about the importance of one picture, one message, or one call. You might think there is so much data out there that nobody knows what to do with it, or cares that much about it. &lt;br /&gt;
&lt;br /&gt;
However, there are in reality a number of parties interested in this data - including companies, governments and individuals - and data collection and data analysis is by now very sophisticated. The data traces you leave behind online are constantly being collected, analysed and sorted by various parties to create profiles on you; and every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by these companies, governments and individuals for a variety of purposes. Profiles can be bought and sold;  data can be used to control, suppress or silence; it can be used to create harassment strategies. &lt;br /&gt;
&lt;br /&gt;
Data can be used to gain insight into who you are, what you do, where you have been and with whom you have been interacting. This information can then be used to make predictions on what you might do or where you might be in future. For example, if someone knows that you are an outspoken blogger on gender issues in country x, they know that you will probably be present at a conference on blogging and women held in that country. &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to your digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. &lt;br /&gt;
&lt;br /&gt;
You can't know exactly what is happening to our digital shadow, and that itself is a problem. Fortunately, there are many tools and tactics you can use to manage your digital shadows and to limit their ramifications in terms of profiling, control and surveillance. This will be discussed in the rest of this section. &lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
To move towards getting some control over your digital shadow, a good place to start is to see what it looks like (as far as is possible)&lt;br /&gt;
&lt;br /&gt;
* '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – is a tool launched by Tactical Tech that allows you to see what traces you are leaving online, and it offers a lot of tips on how to protect your privacy. &lt;br /&gt;
* Identifying and materialising social networks across your online and physical activities: John Fass, researcher and designer at the Royal College of Art, offers some activities for visualising your social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* A tool called '''OpenPaths.cc''' allows you to see through the eyes of your mobile phone. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone you can change the permissions for each app under its privacy setting. LINK?? &lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
The good news is that you can partly control what content and metadata you give away. When you publish content on the web, it is always a good idea to ask yourself if what you are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to your personal life, the names you mention or the images you upload may contribute to a picture about who you are, what you are doing, where you are doing it and so on. This could be used by people who wish to target you. &lt;br /&gt;
&lt;br /&gt;
This does not mean that you should silence yourself – by taking some basic measures, you can limit your risks by increasing the level of the effort that would be required to attack you or your contacts.&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like your IP address''', thereby increasing your anonymity online.&lt;br /&gt;
&lt;br /&gt;
* '''Use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about your life''', you can use private profiles that can only be accessed by selected contacts. When using those on commercial social media, you should be aware of the regular changes to the privacy policies of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web, you should ask yourself if the information you spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices. https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or '''Adblock Plus''', as well as by monitoring your privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not using your real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or you can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing metada from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
==== Self-Doxing ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet and constitute a type of social engineering technique. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find their flaws.&lt;br /&gt;
&amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;). Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser. Useful tips on self-doxing tools and techniques can be found here: &lt;br /&gt;
* https://lilithlela.cyberguerrilla.org/?page_id=93870  &lt;br /&gt;
* https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* Ubisoft’s '''Digital Shadow''' is a Facebook app which illustrates what third parties can know about you through your Facebook profile: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== Mapping our social domains ====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”. Everyone belongs to several '''social domains''' - your work or advocacy networks, your family networks, friends, and sports teams. Some networks may feel more secure than others. For example, you may tend to have a more secure communication practices for your work or advocacy activities, but less secure practices for interacting with friends on a social networking platform. &lt;br /&gt;
&lt;br /&gt;
If you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in a social networking platform that you like a particular kind of game, an attacker who wants to investigate your work or advocacy activities might trick you into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if your work identity and your gaming profile can be connected to the same person; and this is why separating your social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
To separate your social domains, it's helpful to first map them out and identify which ones could expose you most. You can do this by thinking about your different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
For instance, Polish computer security researcher Joanna Rutkowska has developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain, including her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the encrypted communication with her partner.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain includes the totally untrusted areas which don’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
You can find more details about her scheme here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
==== Deleting identities ====&lt;br /&gt;
&lt;br /&gt;
If you decide to separate your social domains by creating multiple identities, you should decide whether to delete or keep the identity or identities that you already have.  To do this, you can start by investigating the traces of your existing identity or identities. (For methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;). If you opt for deleting existing accounts, you can visit the following places:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org) is a tool that facilitates the process of deleting social media profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once you have identified your different social domains and the digital activities and contacts that go with them, what you need to do is decide if you want to differentiate your identities accordingly, or if you'd rather stick to your official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
You may want to keep your work connected to your legal or &amp;quot;real&amp;quot; identity, or think that your activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social media, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific context the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once you have '''assessed our risk''', you can then consider different strategies for separating your identities online.  For more on assessing risk visit: https://ssd.eff.org/en/module/introduction-threat-modeling&lt;br /&gt;
&lt;br /&gt;
'''Strategies''' for maintaining separate identities can range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding (http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name) talks about her decision to start writing under her real name, dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, Vani, a human rights activist, writes: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless” (http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously).&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where you don't need to gain other people's trust, when there are few or no people you can trust, or when you don't want to expose others in your life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance, you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you, as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When you adopt anonymity as a strategy you may use pseudonyms, but these should not be used across different networks or social domains, and some may only be used once and then discarded. Because of this, anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. For more information on how to be anonymous online, see the security recommendations at the beginning of this manual and '''Anonymizing tools''' in Step0 in the wiki.&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. There are myriad reasons why individuals may wish to use a name other than the one they were born with (https://www.eff.org/deeplinks/2011/07/case-pseudonyms). They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent harassment and discrimination or they may use a name that’s easier to pronounce or spell in a given culture. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot; applying a real name policy which typically means using your legal name or the name by which you are commonly known. This policy has caused many users to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that we can be reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is using a name-shaped pseudonym (https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community).&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers '''visibility''', which allows to network with others, and by pinning your voice to a particular name you can develop an '''online reputation'''. This depends on others to decide whether you are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to your legal identity, or not. The choice to connect your online reputation to your &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity.  &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice you make, what is important is that you keep your domains effectively separated. No matter how many domains you identify in your digital life, and how many corresponding identities you create, on the internet every identity - even the one bearing your real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example Tor or TAILS)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' You may think that deleting certain sensitive data from social networks and web services may be enough to protect yourself, but metadata cannot be deleted as easily. And using just one identity through your whole life - in all your work and personal domains - creates a bulk of information that makes it easier to profile you.&lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of your social domains. You might also choose to use your real identity in some areas, and your new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When you create a new identity, you should select the contacts for each one carefully, and avoid sharing contacts with other identities you use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* Your various identities should not linked to each other, or to your real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number.&lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be useful, as they can be discarded easily if compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be created for new acquaintances when appropriate as introductory profiles to get to know somebody before you include them in your more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgment on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If you want to use commercial social networking platforms, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that you use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once you have decided on a name, a surname, and a username for your virtual persona, you should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if you wish to develop your own reputation, you don’t want to be confused with someone else, especially if they don’t share your views of the world!&lt;br /&gt;
&lt;br /&gt;
Then you need to create a story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role. You can invent a new story if you feel particularly inspired or base your story on a “known” person’s story, a superhero, a fictional character from your favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when you create an identity you should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== Credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If you keep all your normal identifying traits - such as your gender, job, attitude or the way you write - it might be possible for someone to connect the dots and connect your pseudonymous personas with your real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': Your persona should have a job that is different from yours, but not so different that you don’t know anything about that field: for example, they shouldn’t be a surgeon if you don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select your persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': This could be identified through a &amp;quot;stylometric analysis&amp;quot; that makes it possible to identify the author of a particular text. To change this, you can start by using a spell-checker in your word processor to check for consistent typos and you could also think about adopting a different writing attitude. You could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': A good rule of thumb is to give your persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, you are able to weather the strikes and even have some fun in the process. &lt;br /&gt;
&lt;br /&gt;
In any case, you should always remember that on the internet, each one of your identities - even the one connected to your real name - is a “virtual” identity, and it is always better to decide what character traits you want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for your “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for your identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Once you have created several personas, it's important to keep them separate in both your physical and digital lives. While keeping notes on your identities might help ensure that you remember your story, there are technical measures you can take to make sure that your profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social media accounts''' for each of your identities. A good method is to always use different apps for each account/identity and, if possible, to separate your identities per device or operating system (see '''6. A different machine for each identity'''). &lt;br /&gt;
To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles. For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains you need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all you need is a '''disposable email address''' that you only need to use for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if you decide to have just one identity online, using disposable email addresses prevents sites from building up a history of your activities and ensures that if that account gets compromised you can simply delete it and create a new one, keeping your digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are: '''https://anonbox.net''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''.&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': ''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to your main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised you can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill your main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org).&lt;br /&gt;
&lt;br /&gt;
==== Commercial social platforms ====&lt;br /&gt;
&lt;br /&gt;
Whatever social networking platform you decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
Also be very careful about the '''profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for you in that social network, regardless of your privacy settings.&lt;br /&gt;
&lt;br /&gt;
Make sure your contacts do not overlap with your other identities, and your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when you interact with the platform using a GPS-enabled phone, but the network your computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
If you access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide your trails is to publish from your various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read: https://www.facebook.com/help/389849807718635 &lt;br /&gt;
* Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
It can be a good idea to follow, from your pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance your real identity from your pseudonymous identities, you can also write (and hashtag on Twitter) posts under your pseudonymous profiles about events that you are not attending, especially if they are taking place far away from you. It can also be fun to publish and then delete posts that look like you have exposed your identity, so as to further confuse anyone who may try to unmask you.&lt;br /&gt;
&lt;br /&gt;
==== Alternative social platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if your aim is to publicise as widely as possible an event you are organizing or a project you are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close your accounts if they find that your contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html).&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If you add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to your data, the best solution is to limit the use of commercial social networking platforms to specific projects you want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''(https://friendica.com), '''N-1''' (https://n-1.cc/) and '''Crabgrass''' (https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so you may wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, you should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (e.g. related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, how is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can you choose to share your videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of your activity and information?&lt;br /&gt;
&lt;br /&gt;
==== Creating a blog or website ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com). Based on the same software, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org) and Nadir’s '''BlackBlogs ''' – (http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see https://www.autistici.org/en/links.html and https://blackblogs.org/policy respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
If you want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, you can create your own website. For this you need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If you want to use your own '''domain''' name, bypassing payments and identifications may get difficult unless you use Bitcoin or another anonymous payment system. The personal data you will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, you can register your domain with the data of an association and use a prepaid credit card that is not connected to your own data (if available in your country). Alternatively, you can use a registrar like Gandi.net (https://www.gandi.net) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting you; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic approaches is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that needs to be secured.&lt;br /&gt;
&lt;br /&gt;
If you use the same operating system for your several identities, no matter how carefully you separate your profiles you can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile you have assigned to your &amp;quot;real&amp;quot; identity, or get infected by a malware that allows your attacker to monitor everything you do online, with all your identities. Both risks can be limited by using a virtual machine for each of your domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on your physical computer. You can think of a VM as a ''computer within a computer''. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For your purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== Whonix ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix''' (https://www.whonix.org) is an operating system that aims at protecting your anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. Whonix’s website offers a wide documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== Tails ====&lt;br /&gt;
&lt;br /&gt;
'''Tails''', or '''The Amnesic Incognito Live System''', is a free and open-source Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections. When you launch Tails, you have a complete operating system that comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, you can access the internet, communicate, and do all you need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless you ask it to do so.&lt;br /&gt;
&lt;br /&gt;
==== Qubes OS ====&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' (https://www.qubes-os.org) is a free and open-source security-oriented operating system based on '''Fedora''', a GNU/Linux distribution, and '''Xen''', a virtual machine monitor that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things you do on your computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, you can do everything on a single physical computer without having to worry that one successful cyberattack harms your whole system, potentially revealing all the connections among your several identities.&lt;br /&gt;
&lt;br /&gt;
==== What to choose ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described – Tails, Whonix and Qubes OS – allow you to use a completely separate operating system for managing your alternate identities, and can be quite useful to make sure that you don’t reveal your true identity while you use the anonymous one(s).&lt;br /&gt;
&lt;br /&gt;
Using '''Tails''' is pretty easy, and if what you need to do with your alternate persona needs a focus on ''anonymisation'', then it may be worthwhile to overcome the initial obstacle of installing it in a USB stick and launching it. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. But if on the other hand we need ''persistence'' and we want to keep some files or actions we have created, we need to enable this option when we start the system. Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what you need is both ''anonymity'' and ''security by isolation'' and you have a good machine where you can run Virtualbox (https://www.whonix.org/wiki/System_Requirements), installing '''Whonix''' seems a good solution that caters to all your needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if you want to keep all your activities inside your own computer without having to install anything else and if what you are trying to do is to effectively ''separate'' your identities rather than anonymise your activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if you feel that you really need to protect yourself against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protect you from every threat, and you shouldn’t look at them as a magic potion that will make you invulnerable. Nevertheless, by using any of them, according to your needs and resources, you will raise the level of effort that an attacker will need to harm you, thus making an attack less likely. For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1366</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1366"/>
				<updated>2015-05-28T11:22:20Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: suggestion for a title for chapter 1&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
'''Chapter 1: Digital traces and identities online'''&lt;br /&gt;
&lt;br /&gt;
== Digital traces ==&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, it has also become a space where people who question or challenge dominant discourses - especially where those deal with gender and sexual orientation - are silenced, harassed and threatened. &lt;br /&gt;
&lt;br /&gt;
If you are active on the internet as women, human rights defenders, trans* or queer persons, and/or feminists, you'll probably want to make sure your privacy and security are protected as much as possible. &lt;br /&gt;
&lt;br /&gt;
A good place to start is by assessing the traces you are leaving behind on the internet, by getting to know your digital shadow and understanding how you organise your social domains and networks across your online and physical activities. &lt;br /&gt;
&lt;br /&gt;
The traces you leave online can tell very accurate stories about you; who you are, were you live and hang out; what you are interested in and who your friends and collaborators are. This information can expose you to several threats, including online harassment - particularly where the traces you leave behind are publicly available. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' you can use to take more control over your digital shadows - to increase your privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing your activity online.  &lt;br /&gt;
Some examples of these strategies and tools include controlling the amount of data you give away by consciously stripping valuable information from content and metadata; trying the art of self-doxing; and thinking about ways to play with and break up your online identity.&lt;br /&gt;
&lt;br /&gt;
Your digital shadow is the story data tells about you. This digital shadow is created by trillions of bits of data, left behind in the digital world when you connect to the internet, your mobile phones and your other online services. These digital shadows ultimately have a life of their own. They can be affected by others and can change in unpredictable ways. They grow continuously, and can be permanent, encompassing both your past and present activities. &lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' &lt;br /&gt;
The devices and the software you use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data. These bits of data can include your name, location, contacts, pictures, messages, tweets and likes, but also the brand of your computer, length of your phone calls and information about which websites you visit. These data traces can be put out there by yourself as well as by other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' &lt;br /&gt;
In some cases you '''actively '''share data – for example when you share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about you, by tagging you in pictures, mentioning you in tweets or simply by communicating with you. In other cases, you give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
&lt;br /&gt;
Your browsing habits and IP address are shared when you visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites you visit, and the information shared is collected for a wide range of purposes, from website analytics to advertising. Your mobile phone apps also collect data on you without your active knowledge or consent – for example, the photos you take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow you as you move from one service to another - from your internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in your readers to publishing pictures from the latest protest you covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of your messages, blogs, tweets and phone calls; it is your pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables your email to be delivered, files on your computer to be found and mobile communication to work. Metadata can include your email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the technological infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognised by computers.&lt;br /&gt;
&lt;br /&gt;
==== Who collects data? ====   &lt;br /&gt;
&lt;br /&gt;
You might wonder about the importance of one picture, one message, or one call. You might think there is so much data out there that nobody knows what to do with it, or cares that much about it. &lt;br /&gt;
&lt;br /&gt;
However, there are in reality a number of parties interested in this data - including companies, governments and individuals - and data collection and data analysis is by now very sophisticated. The data traces you leave behind online are constantly being collected, analysed and sorted by various parties to create profiles on you; and every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by these companies, governments and individuals for a variety of purposes. Profiles can be bought and sold;  data can be used to control, suppress or silence; it can be used to create harassment strategies. &lt;br /&gt;
&lt;br /&gt;
Data can be used to gain insight into who you are, what you do, where you have been and with whom you have been interacting. This information can then be used to make predictions on what you might do or where you might be in future. For example, if someone knows that you are an outspoken blogger on gender issues in country x, they know that you will probably be present at a conference on blogging and women held in that country. &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to your digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. &lt;br /&gt;
&lt;br /&gt;
You can't know exactly what is happening to our digital shadow, and that itself is a problem. Fortunately, there are many tools and tactics you can use to manage your digital shadows and to limit their ramifications in terms of profiling, control and surveillance. This will be discussed in the rest of this section. &lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
To move towards getting some control over your digital shadow, a good place to start is to see what it looks like (as far as is possible)&lt;br /&gt;
&lt;br /&gt;
* '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – is a tool launched by Tactical Tech that allows you to see what traces you are leaving online, and it offers a lot of tips on how to protect your privacy. &lt;br /&gt;
* Identifying and materialising social networks across your online and physical activities: John Fass, researcher and designer at the Royal College of Art, offers some activities for visualising your social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* A tool called '''OpenPaths.cc''' allows you to see through the eyes of your mobile phone. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone you can change the permissions for each app under its privacy setting. LINK?? &lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
The good news is that you can partly control what content and metadata you give away. When you publish content on the web, it is always a good idea to ask yourself if what you are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to your personal life, the names you mention or the images you upload may contribute to a picture about who you are, what you are doing, where you are doing it and so on. This could be used by people who wish to target you. &lt;br /&gt;
&lt;br /&gt;
This does not mean that you should silence yourself – by taking some basic measures, you can limit your risks by increasing the level of the effort that would be required to attack you or your contacts.&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like your IP address''', thereby increasing your anonymity online.&lt;br /&gt;
&lt;br /&gt;
* '''Use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about your life''', you can use private profiles that can only be accessed by selected contacts. When using those on commercial social media, you should be aware of the regular changes to the privacy policies of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web, you should ask yourself if the information you spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices. https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or '''Adblock Plus''', as well as by monitoring your privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not using your real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or you can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing metada from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
==== Self-Doxing ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet and constitute a type of social engineering technique. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find their flaws.&lt;br /&gt;
&amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;). Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser. Useful tips on self-doxing tools and techniques can be found here: &lt;br /&gt;
* https://lilithlela.cyberguerrilla.org/?page_id=93870  &lt;br /&gt;
* https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* Ubisoft’s '''Digital Shadow''' is a Facebook app which illustrates what third parties can know about you through your Facebook profile: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== Mapping our social domains ====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”. Everyone belongs to several '''social domains''' - your work or advocacy networks, your family networks, friends, and sports teams. Some networks may feel more secure than others. For example, you may tend to have a more secure communication practices for your work or advocacy activities, but less secure practices for interacting with friends on a social networking platform. &lt;br /&gt;
&lt;br /&gt;
If you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in a social networking platform that you like a particular kind of game, an attacker who wants to investigate your work or advocacy activities might trick you into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if your work identity and your gaming profile can be connected to the same person; and this is why separating your social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
To separate your social domains, it's helpful to first map them out and identify which ones could expose you most. You can do this by thinking about your different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
For instance, Polish computer security researcher Joanna Rutkowska has developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain, including her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the encrypted communication with her partner.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain includes the totally untrusted areas which don’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
You can find more details about her scheme here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
==== Deleting identities ====&lt;br /&gt;
&lt;br /&gt;
If you decide to separate your social domains by creating multiple identities, you should decide whether to delete or keep the identity or identities that you already have.  To do this, you can start by investigating the traces of your existing identity or identities. (For methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;). If you opt for deleting existing accounts, you can visit the following places:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitates the process of deleting social media profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once you have identified your different social domains and the digital activities and contacts that go with them, what you need to do is decide if you want to differentiate your identities accordingly, or if you'd rather stick to your official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
You may want to keep your work connected to your legal or &amp;quot;real&amp;quot; identity, or think that your activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social media, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific context the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once you have '''assessed our risk''', you can then consider different strategies for separating your identities online.  For more on assessing risk visit: https://ssd.eff.org/en/module/introduction-threat-modeling&lt;br /&gt;
&lt;br /&gt;
'''Strategies''' for maintaining separate identities can range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding (http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name) talks about her decision to start writing under her real name, dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously Vani, a human rights activist, writes]: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”.&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where you don't need to gain other people's trust, when there are few or no people you can trust, or when you don't want to expose others in your life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance, you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you, as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When you adopt anonymity as a strategy you may use pseudonyms, but these should not be used across different networks or social domains, and some may only be used once and then discarded. Because of this, anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. For more information on how to be anonymous online, see the security recommendations at the beginning of this manual and '''Anonymizing tools''' in Step0 in the wiki.&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. There are [[https://www.eff.org/deeplinks/2011/07/case-pseudonyms|myriad reasons why individuals may wish to use a name other than the one they were born with]]. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent harassment and discrimination or they may use a name that’s easier to pronounce or spell in a given culture. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot; applying a real name policy which typically means using your legal name or the name by which you are commonly known. This policy has caused many users to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that we can be reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is [https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community using a name-shaped pseudonym].&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers '''visibility''', which allows to network with others, and by pinning your voice to a particular name you can develop an '''online reputation'''. This depends on others to decide whether you are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to your legal identity, or not. The choice to connect your online reputation to your &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity.  &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice you make, what is important is that you keep your domains effectively separated. No matter how many domains you identify in your digital life, and how many corresponding identities you create, on the internet every identity - even the one bearing your real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example Tor or TAILS)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' You may think that deleting certain sensitive data from social networks and web services may be enough to protect yourself, but metadata cannot be deleted as easily. And using just one identity through your whole life - in all your work and personal domains - creates a bulk of information that makes it easier to profile you.&lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of your social domains. You might also choose to use your real identity in some areas, and your new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When you create a new identity, you should select the contacts for each one carefully, and avoid sharing contacts with other identities you use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* Your various identities should not linked to each other, or to your real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number.&lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be useful, as they can be discarded easily if compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be created for new acquaintances when appropriate as introductory profiles to get to know somebody before you include them in your more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgment on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If you want to use commercial social networking platforms, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that you use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once you have decided on a name, a surname, and a username for your virtual persona, you should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if you wish to develop your own reputation, you don’t want to be confused with someone else, especially if they don’t share your views of the world!&lt;br /&gt;
&lt;br /&gt;
Then you need to create a story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role. You can invent a new story if you feel particularly inspired or base your story on a “known” person’s story, a superhero, a fictional character from your favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when you create an identity you should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== Credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If you keep all your normal identifying traits - such as your gender, job, attitude or the way you write - it might be possible for someone to connect the dots and connect your pseudonymous personas with your real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': Your persona should have a job that is different from yours, but not so different that you don’t know anything about that field: for example, they shouldn’t be a surgeon if you don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select your persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': This could be identified through a &amp;quot;stylometric analysis&amp;quot; that makes it possible to identify the author of a particular text. To change this, you can start by using a spell-checker in your word processor to check for consistent typos and you could also think about adopting a different writing attitude. You could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': A good rule of thumb is to give your persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, you are able to weather the strikes and even have some fun in the process. &lt;br /&gt;
&lt;br /&gt;
In any case, you should always remember that on the internet, each one of your identities - even the one connected to your real name - is a “virtual” identity, and it is always better to decide what character traits you want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for your “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for your identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Once you have created several personas, it's important to keep them separate in both your physical and digital lives. While keeping notes on your identities might help ensure that you remember your story, there are technical measures you can take to make sure that your profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social media accounts''' for each of your identities. A good method is to always use different apps for each account/identity and, if possible, to separate your identities per device or operating system (see '''6. A different machine for each identity'''). &lt;br /&gt;
To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles. For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains you need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all you need is a '''disposable email address''' that you only need to use for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if you decide to have just one identity online, using disposable email addresses prevents sites from building up a history of your activities and ensures that if that account gets compromised you can simply delete it and create a new one, keeping your digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are: '''https://anonbox.net''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''.&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': ''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to your main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised you can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill your main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org).&lt;br /&gt;
&lt;br /&gt;
==== Commercial social platforms ====&lt;br /&gt;
&lt;br /&gt;
Whatever social networking platform you decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
Also be very careful about the '''profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for you in that social network, regardless of your privacy settings.&lt;br /&gt;
&lt;br /&gt;
Make sure your contacts do not overlap with your other identities, and your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when you interact with the platform using a GPS-enabled phone, but the network your computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
If you access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide your trails is to publish from your various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read: &lt;br /&gt;
* https://www.facebook.com/help/389849807718635 &lt;br /&gt;
* Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
It can be a good idea to follow, from your pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance your real identity from your pseudonymous identities, you can also write (and hashtag on Twitter) posts under your pseudonymous profiles about events that you are not attending, especially if they are taking place far away from you. It can also be fun to publish and then delete posts that look like you have exposed your identity, so as to further confuse anyone who may try to unmask you.&lt;br /&gt;
&lt;br /&gt;
==== Alternative social platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if your aim is to publicise as widely as possible an event you are organizing or a project you are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close your accounts if they find that your contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html).&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If you add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to your data, the best solution is to limit the use of commercial social networking platforms to specific projects you want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)], '''N-1''' (https://n-1.cc/) and '''Crabgrass''' (https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so you may wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, you should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (e.g. related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, how is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can you choose to share your videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of your activity and information?&lt;br /&gt;
&lt;br /&gt;
==== Creating a blog or website ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com). Based on the same software, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org) and Nadir’s '''BlackBlogs ''' – (http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see https://www.autistici.org/en/links.html and https://blackblogs.org/policy respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
If you want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, you can create your own website. For this you need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If you want to use your own '''domain''' name, bypassing payments and identifications may get difficult unless you use Bitcoin or another anonymous payment system. The personal data you will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, you can register your domain with the data of an association and use a prepaid credit card that is not connected to your own data (if available in your country). Alternatively, you can use a registrar like Gandi.net (https://www.gandi.net) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting you; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic approaches is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that needs to be secured.&lt;br /&gt;
&lt;br /&gt;
If you use the same operating system for your several identities, no matter how carefully you separate your profiles you can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile you have assigned to your &amp;quot;real&amp;quot; identity, or get infected by a malware that allows your attacker to monitor everything you do online, with all your identities. Both risks can be limited by using a virtual machine for each of your domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on your physical computer. You can think of a VM as a ''computer within a computer''. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For your purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== Whonix ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix''' (https://www.whonix.org) is an operating system that aims at protecting your anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. Whonix’s website offers a wide documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== Tails ====&lt;br /&gt;
&lt;br /&gt;
'''Tails''', or '''The Amnesic Incognito Live System''', is a free and open-source Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections. When you launch Tails, you have a complete operating system that comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, you can access the internet, communicate, and do all you need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless you ask it to do so.&lt;br /&gt;
&lt;br /&gt;
==== Qubes OS ====&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' (https://www.qubes-os.org) is a free and open-source security-oriented operating system based on '''Fedora''', a GNU/Linux distribution, and '''Xen''', a virtual machine monitor that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things you do on your computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, you can do everything on a single physical computer without having to worry that one successful cyberattack harms your whole system, potentially revealing all the connections among your several identities.&lt;br /&gt;
&lt;br /&gt;
==== What to choose ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described – Tails, Whonix and Qubes OS – allow you to use a completely separate operating system for managing your alternate identities, and can be quite useful to make sure that you don’t reveal your true identity while you use the anonymous one(s).&lt;br /&gt;
&lt;br /&gt;
Using '''Tails''' is pretty easy, and if what you need to do with your alternate persona needs a focus on ''anonymisation'', then it may be worthwhile to overcome the initial obstacle of installing it in a USB stick and launching it. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. But if on the other hand we need ''persistence'' and we want to keep some files or actions we have created, we need to enable this option when we start the system. Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what you need is both ''anonymity'' and ''security by isolation'' and you have a good machine where you can run Virtualbox (https://www.whonix.org/wiki/System_Requirements), installing '''Whonix''' seems a good solution that caters to all your needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if you want to keep all your activities inside your own computer without having to install anything else and if what you are trying to do is to effectively ''separate'' your identities rather than anonymise your activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if you feel that you really need to protect yourself against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protect you from every threat, and you shouldn’t look at them as a magic potion that will make you invulnerable. Nevertheless, by using any of them, according to your needs and resources, you will raise the level of effort that an attacker will need to harm you, thus making an attack less likely. For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1365</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1365"/>
				<updated>2015-05-28T11:18:33Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: changed title of chapter 1&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
'''Chapter 1: Identity online'''&lt;br /&gt;
&lt;br /&gt;
== Digital traces ==&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, it has also become a space where people who question or challenge dominant discourses - especially where those deal with gender and sexual orientation - are silenced, harassed and threatened. &lt;br /&gt;
&lt;br /&gt;
If you are active on the internet as women, human rights defenders, trans* or queer persons, and/or feminists, you'll probably want to make sure your privacy and security are protected as much as possible. &lt;br /&gt;
&lt;br /&gt;
A good place to start is by assessing the traces you are leaving behind on the internet, by getting to know your digital shadow and understanding how you organise your social domains and networks across your online and physical activities. &lt;br /&gt;
&lt;br /&gt;
The traces you leave online can tell very accurate stories about you; who you are, were you live and hang out; what you are interested in and who your friends and collaborators are. This information can expose you to several threats, including online harassment - particularly where the traces you leave behind are publicly available. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' you can use to take more control over your digital shadows - to increase your privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing your activity online.  &lt;br /&gt;
Some examples of these strategies and tools include controlling the amount of data you give away by consciously stripping valuable information from content and metadata; trying the art of self-doxing; and thinking about ways to play with and break up your online identity.&lt;br /&gt;
&lt;br /&gt;
Your digital shadow is the story data tells about you. This digital shadow is created by trillions of bits of data, left behind in the digital world when you connect to the internet, your mobile phones and your other online services. These digital shadows ultimately have a life of their own. They can be affected by others and can change in unpredictable ways. They grow continuously, and can be permanent, encompassing both your past and present activities. &lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' &lt;br /&gt;
The devices and the software you use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data. These bits of data can include your name, location, contacts, pictures, messages, tweets and likes, but also the brand of your computer, length of your phone calls and information about which websites you visit. These data traces can be put out there by yourself as well as by other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' &lt;br /&gt;
In some cases you '''actively '''share data – for example when you share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about you, by tagging you in pictures, mentioning you in tweets or simply by communicating with you. In other cases, you give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
&lt;br /&gt;
Your browsing habits and IP address are shared when you visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites you visit, and the information shared is collected for a wide range of purposes, from website analytics to advertising. Your mobile phone apps also collect data on you without your active knowledge or consent – for example, the photos you take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow you as you move from one service to another - from your internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in your readers to publishing pictures from the latest protest you covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of your messages, blogs, tweets and phone calls; it is your pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables your email to be delivered, files on your computer to be found and mobile communication to work. Metadata can include your email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the technological infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognised by computers.&lt;br /&gt;
&lt;br /&gt;
==== Who collects data? ====   &lt;br /&gt;
&lt;br /&gt;
You might wonder about the importance of one picture, one message, or one call. You might think there is so much data out there that nobody knows what to do with it, or cares that much about it. &lt;br /&gt;
&lt;br /&gt;
However, there are in reality a number of parties interested in this data - including companies, governments and individuals - and data collection and data analysis is by now very sophisticated. The data traces you leave behind online are constantly being collected, analysed and sorted by various parties to create profiles on you; and every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by these companies, governments and individuals for a variety of purposes. Profiles can be bought and sold;  data can be used to control, suppress or silence; it can be used to create harassment strategies. &lt;br /&gt;
&lt;br /&gt;
Data can be used to gain insight into who you are, what you do, where you have been and with whom you have been interacting. This information can then be used to make predictions on what you might do or where you might be in future. For example, if someone knows that you are an outspoken blogger on gender issues in country x, they know that you will probably be present at a conference on blogging and women held in that country. &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to your digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. &lt;br /&gt;
&lt;br /&gt;
You can't know exactly what is happening to our digital shadow, and that itself is a problem. Fortunately, there are many tools and tactics you can use to manage your digital shadows and to limit their ramifications in terms of profiling, control and surveillance. This will be discussed in the rest of this section. &lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
To move towards getting some control over your digital shadow, a good place to start is to see what it looks like (as far as is possible)&lt;br /&gt;
&lt;br /&gt;
* '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – is a tool launched by Tactical Tech that allows you to see what traces you are leaving online, and it offers a lot of tips on how to protect your privacy. &lt;br /&gt;
* Identifying and materialising social networks across your online and physical activities: John Fass, researcher and designer at the Royal College of Art, offers some activities for visualising your social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* A tool called '''OpenPaths.cc''' allows you to see through the eyes of your mobile phone. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone you can change the permissions for each app under its privacy setting. LINK?? &lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
The good news is that you can partly control what content and metadata you give away. When you publish content on the web, it is always a good idea to ask yourself if what you are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to your personal life, the names you mention or the images you upload may contribute to a picture about who you are, what you are doing, where you are doing it and so on. This could be used by people who wish to target you. &lt;br /&gt;
&lt;br /&gt;
This does not mean that you should silence yourself – by taking some basic measures, you can limit your risks by increasing the level of the effort that would be required to attack you or your contacts.&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like your IP address''', thereby increasing your anonymity online.&lt;br /&gt;
&lt;br /&gt;
* '''Use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about your life''', you can use private profiles that can only be accessed by selected contacts. When using those on commercial social media, you should be aware of the regular changes to the privacy policies of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web, you should ask yourself if the information you spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices. https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or '''Adblock Plus''', as well as by monitoring your privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not using your real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or you can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing metada from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
==== Self-Doxing ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet and constitute a type of social engineering technique. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find their flaws.&lt;br /&gt;
&amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;). Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser. Useful tips on self-doxing tools and techniques can be found here: &lt;br /&gt;
* https://lilithlela.cyberguerrilla.org/?page_id=93870  &lt;br /&gt;
* https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* Ubisoft’s '''Digital Shadow''' is a Facebook app which illustrates what third parties can know about you through your Facebook profile: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== Mapping our social domains ====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”. Everyone belongs to several '''social domains''' - your work or advocacy networks, your family networks, friends, and sports teams. Some networks may feel more secure than others. For example, you may tend to have a more secure communication practices for your work or advocacy activities, but less secure practices for interacting with friends on a social networking platform. &lt;br /&gt;
&lt;br /&gt;
If you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in a social networking platform that you like a particular kind of game, an attacker who wants to investigate your work or advocacy activities might trick you into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if your work identity and your gaming profile can be connected to the same person; and this is why separating your social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
To separate your social domains, it's helpful to first map them out and identify which ones could expose you most. You can do this by thinking about your different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
For instance, Polish computer security researcher Joanna Rutkowska has developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain, including her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the encrypted communication with her partner.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain includes the totally untrusted areas which don’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
You can find more details about her scheme here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
==== Deleting identities ====&lt;br /&gt;
&lt;br /&gt;
If you decide to separate your social domains by creating multiple identities, you should decide whether to delete or keep the identity or identities that you already have.  To do this, you can start by investigating the traces of your existing identity or identities. (For methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;). If you opt for deleting existing accounts, you can visit the following places:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitates the process of deleting social media profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once you have identified your different social domains and the digital activities and contacts that go with them, what you need to do is decide if you want to differentiate your identities accordingly, or if you'd rather stick to your official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
You may want to keep your work connected to your legal or &amp;quot;real&amp;quot; identity, or think that your activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social media, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific context the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once you have '''assessed our risk''', you can then consider different strategies for separating your identities online.  For more on assessing risk visit: https://ssd.eff.org/en/module/introduction-threat-modeling&lt;br /&gt;
&lt;br /&gt;
'''Strategies''' for maintaining separate identities can range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding (http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name) talks about her decision to start writing under her real name, dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously Vani, a human rights activist, writes]: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”.&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where you don't need to gain other people's trust, when there are few or no people you can trust, or when you don't want to expose others in your life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance, you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you, as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When you adopt anonymity as a strategy you may use pseudonyms, but these should not be used across different networks or social domains, and some may only be used once and then discarded. Because of this, anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. For more information on how to be anonymous online, see the security recommendations at the beginning of this manual and '''Anonymizing tools''' in Step0 in the wiki.&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. There are [[https://www.eff.org/deeplinks/2011/07/case-pseudonyms|myriad reasons why individuals may wish to use a name other than the one they were born with]]. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent harassment and discrimination or they may use a name that’s easier to pronounce or spell in a given culture. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot; applying a real name policy which typically means using your legal name or the name by which you are commonly known. This policy has caused many users to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that we can be reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is [https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community using a name-shaped pseudonym].&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers '''visibility''', which allows to network with others, and by pinning your voice to a particular name you can develop an '''online reputation'''. This depends on others to decide whether you are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to your legal identity, or not. The choice to connect your online reputation to your &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity.  &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice you make, what is important is that you keep your domains effectively separated. No matter how many domains you identify in your digital life, and how many corresponding identities you create, on the internet every identity - even the one bearing your real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example Tor or TAILS)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' You may think that deleting certain sensitive data from social networks and web services may be enough to protect yourself, but metadata cannot be deleted as easily. And using just one identity through your whole life - in all your work and personal domains - creates a bulk of information that makes it easier to profile you.&lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of your social domains. You might also choose to use your real identity in some areas, and your new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When you create a new identity, you should select the contacts for each one carefully, and avoid sharing contacts with other identities you use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* Your various identities should not linked to each other, or to your real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number.&lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be useful, as they can be discarded easily if compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be created for new acquaintances when appropriate as introductory profiles to get to know somebody before you include them in your more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgment on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If you want to use commercial social networking platforms, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that you use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once you have decided on a name, a surname, and a username for your virtual persona, you should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if you wish to develop your own reputation, you don’t want to be confused with someone else, especially if they don’t share your views of the world!&lt;br /&gt;
&lt;br /&gt;
Then you need to create a story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role. You can invent a new story if you feel particularly inspired or base your story on a “known” person’s story, a superhero, a fictional character from your favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when you create an identity you should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== Credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If you keep all your normal identifying traits - such as your gender, job, attitude or the way you write - it might be possible for someone to connect the dots and connect your pseudonymous personas with your real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': Your persona should have a job that is different from yours, but not so different that you don’t know anything about that field: for example, they shouldn’t be a surgeon if you don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select your persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': This could be identified through a &amp;quot;stylometric analysis&amp;quot; that makes it possible to identify the author of a particular text. To change this, you can start by using a spell-checker in your word processor to check for consistent typos and you could also think about adopting a different writing attitude. You could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': A good rule of thumb is to give your persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, you are able to weather the strikes and even have some fun in the process. &lt;br /&gt;
&lt;br /&gt;
In any case, you should always remember that on the internet, each one of your identities - even the one connected to your real name - is a “virtual” identity, and it is always better to decide what character traits you want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for your “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for your identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Once you have created several personas, it's important to keep them separate in both your physical and digital lives. While keeping notes on your identities might help ensure that you remember your story, there are technical measures you can take to make sure that your profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social media accounts''' for each of your identities. A good method is to always use different apps for each account/identity and, if possible, to separate your identities per device or operating system (see '''6. A different machine for each identity'''). &lt;br /&gt;
To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles. For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains you need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all you need is a '''disposable email address''' that you only need to use for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if you decide to have just one identity online, using disposable email addresses prevents sites from building up a history of your activities and ensures that if that account gets compromised you can simply delete it and create a new one, keeping your digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are: '''https://anonbox.net''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''.&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': ''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to your main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised you can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill your main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org).&lt;br /&gt;
&lt;br /&gt;
==== Commercial social platforms ====&lt;br /&gt;
&lt;br /&gt;
Whatever social networking platform you decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
Also be very careful about the '''profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for you in that social network, regardless of your privacy settings.&lt;br /&gt;
&lt;br /&gt;
Make sure your contacts do not overlap with your other identities, and your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when you interact with the platform using a GPS-enabled phone, but the network your computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
If you access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide your trails is to publish from your various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read: &lt;br /&gt;
* https://www.facebook.com/help/389849807718635 &lt;br /&gt;
* Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
It can be a good idea to follow, from your pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance your real identity from your pseudonymous identities, you can also write (and hashtag on Twitter) posts under your pseudonymous profiles about events that you are not attending, especially if they are taking place far away from you. It can also be fun to publish and then delete posts that look like you have exposed your identity, so as to further confuse anyone who may try to unmask you.&lt;br /&gt;
&lt;br /&gt;
==== Alternative social platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if your aim is to publicise as widely as possible an event you are organizing or a project you are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close your accounts if they find that your contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html).&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If you add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to your data, the best solution is to limit the use of commercial social networking platforms to specific projects you want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)], '''N-1''' (https://n-1.cc/) and '''Crabgrass''' (https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so you may wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, you should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (e.g. related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, how is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can you choose to share your videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of your activity and information?&lt;br /&gt;
&lt;br /&gt;
==== Creating a blog or website ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com). Based on the same software, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org) and Nadir’s '''BlackBlogs ''' – (http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see https://www.autistici.org/en/links.html and https://blackblogs.org/policy respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
If you want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, you can create your own website. For this you need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If you want to use your own '''domain''' name, bypassing payments and identifications may get difficult unless you use Bitcoin or another anonymous payment system. The personal data you will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, you can register your domain with the data of an association and use a prepaid credit card that is not connected to your own data (if available in your country). Alternatively, you can use a registrar like Gandi.net (https://www.gandi.net) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting you; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic approaches is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that needs to be secured.&lt;br /&gt;
&lt;br /&gt;
If you use the same operating system for your several identities, no matter how carefully you separate your profiles you can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile you have assigned to your &amp;quot;real&amp;quot; identity, or get infected by a malware that allows your attacker to monitor everything you do online, with all your identities. Both risks can be limited by using a virtual machine for each of your domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on your physical computer. You can think of a VM as a ''computer within a computer''. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For your purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== Whonix ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix''' (https://www.whonix.org) is an operating system that aims at protecting your anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. Whonix’s website offers a wide documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== Tails ====&lt;br /&gt;
&lt;br /&gt;
'''Tails''', or '''The Amnesic Incognito Live System''', is a free and open-source Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections. When you launch Tails, you have a complete operating system that comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, you can access the internet, communicate, and do all you need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless you ask it to do so.&lt;br /&gt;
&lt;br /&gt;
==== Qubes OS ====&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' (https://www.qubes-os.org) is a free and open-source security-oriented operating system based on '''Fedora''', a GNU/Linux distribution, and '''Xen''', a virtual machine monitor that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things you do on your computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, you can do everything on a single physical computer without having to worry that one successful cyberattack harms your whole system, potentially revealing all the connections among your several identities.&lt;br /&gt;
&lt;br /&gt;
==== What to choose ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described – Tails, Whonix and Qubes OS – allow you to use a completely separate operating system for managing your alternate identities, and can be quite useful to make sure that you don’t reveal your true identity while you use the anonymous one(s).&lt;br /&gt;
&lt;br /&gt;
Using '''Tails''' is pretty easy, and if what you need to do with your alternate persona needs a focus on ''anonymisation'', then it may be worthwhile to overcome the initial obstacle of installing it in a USB stick and launching it. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. But if on the other hand we need ''persistence'' and we want to keep some files or actions we have created, we need to enable this option when we start the system. Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what you need is both ''anonymity'' and ''security by isolation'' and you have a good machine where you can run Virtualbox (https://www.whonix.org/wiki/System_Requirements), installing '''Whonix''' seems a good solution that caters to all your needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if you want to keep all your activities inside your own computer without having to install anything else and if what you are trying to do is to effectively ''separate'' your identities rather than anonymise your activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if you feel that you really need to protect yourself against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protect you from every threat, and you shouldn’t look at them as a magic potion that will make you invulnerable. Nevertheless, by using any of them, according to your needs and resources, you will raise the level of effort that an attacker will need to harm you, thus making an attack less likely. For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1360</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1360"/>
				<updated>2015-05-28T11:11:41Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: /* A different machine for each identity */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
'''Chapter 1: Identity online'''&lt;br /&gt;
&lt;br /&gt;
== Understanding digital shadows ==&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, it has also become a space where people who question or challenge dominant discourses - especially where those deal with gender and sexual orientation - are silenced, harassed and threatened. &lt;br /&gt;
&lt;br /&gt;
If you are active on the internet as women, human rights defenders, trans* or queer persons, and/or feminists, you'll probably want to make sure your privacy and security are protected as much as possible. &lt;br /&gt;
&lt;br /&gt;
A good place to start is by assessing the traces you are leaving behind on the internet, by getting to know your digital shadow and understanding how you organise your social domains and networks across your online and physical activities. &lt;br /&gt;
&lt;br /&gt;
The traces you leave online can tell very accurate stories about you; who you are, were you live and hang out; what you are interested in and who your friends and collaborators are. This information can expose you to several threats, including online harassment - particularly where the traces you leave behind are publicly available. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' you can use to take more control over your digital shadows - to increase your privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing your activity online.  &lt;br /&gt;
Some examples of these strategies and tools include controlling the amount of data you give away by consciously stripping valuable information from content and metadata; trying the art of self-doxing; and thinking about ways to play with and break up your online identity.&lt;br /&gt;
&lt;br /&gt;
Your digital shadow is the story data tells about you. This digital shadow is created by trillions of bits of data, left behind in the digital world when you connect to the internet, your mobile phones and your other online services. These digital shadows ultimately have a life of their own. They can be affected by others and can change in unpredictable ways. They grow continuously, and can be permanent, encompassing both your past and present activities. &lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' &lt;br /&gt;
The devices and the software you use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data. These bits of data can include your name, location, contacts, pictures, messages, tweets and likes, but also the brand of your computer, length of your phone calls and information about which websites you visit. These data traces can be put out there by yourself as well as by other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' &lt;br /&gt;
In some cases you '''actively '''share data – for example when you share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about you, by tagging you in pictures, mentioning you in tweets or simply by communicating with you. In other cases, you give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
&lt;br /&gt;
Your browsing habits and IP address are shared when you visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites you visit, and the information shared is collected for a wide range of purposes, from website analytics to advertising. Your mobile phone apps also collect data on you without your active knowledge or consent – for example, the photos you take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow you as you move from one service to another - from your internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in your readers to publishing pictures from the latest protest you covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of your messages, blogs, tweets and phone calls; it is your pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables your email to be delivered, files on your computer to be found and mobile communication to work. Metadata can include your email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the technological infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognised by computers.&lt;br /&gt;
&lt;br /&gt;
==== Who collects data? ====   &lt;br /&gt;
&lt;br /&gt;
You might wonder about the importance of one picture, one message, or one call. You might think there is so much data out there that nobody knows what to do with it, or cares that much about it. &lt;br /&gt;
&lt;br /&gt;
However, there are in reality a number of parties interested in this data - including companies, governments and individuals - and data collection and data analysis is by now very sophisticated. The data traces you leave behind online are constantly being collected, analysed and sorted by various parties to create profiles on you; and every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by these companies, governments and individuals for a variety of purposes. Profiles can be bought and sold;  data can be used to control, suppress or silence; it can be used to create harassment strategies. &lt;br /&gt;
&lt;br /&gt;
Data can be used to gain insight into who you are, what you do, where you have been and with whom you have been interacting. This information can then be used to make predictions on what you might do or where you might be in future. For example, if someone knows that you are an outspoken blogger on gender issues in country x, they know that you will probably be present at a conference on blogging and women held in that country. &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to your digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. &lt;br /&gt;
&lt;br /&gt;
You can't know exactly what is happening to our digital shadow, and that itself is a problem. Fortunately, there are many tools and tactics you can use to manage your digital shadows and to limit their ramifications in terms of profiling, control and surveillance. This will be discussed in the rest of this section. &lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
To move towards getting some control over your digital shadow, a good place to start is to see what it looks like (as far as is possible)&lt;br /&gt;
&lt;br /&gt;
* '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – is a tool launched by Tactical Tech that allows you to see what traces you are leaving online, and it offers a lot of tips on how to protect your privacy. &lt;br /&gt;
* Identifying and materialising social networks across your online and physical activities: John Fass, researcher and designer at the Royal College of Art, offers some activities for visualising your social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* A tool called '''OpenPaths.cc''' allows you to see through the eyes of your mobile phone. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone you can change the permissions for each app under its privacy setting. LINK?? &lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
The good news is that you can partly control what content and metadata you give away. When you publish content on the web, it is always a good idea to ask yourself if what you are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to your personal life, the names you mention or the images you upload may contribute to a picture about who you are, what you are doing, where you are doing it and so on. This could be used by people who wish to target you. &lt;br /&gt;
&lt;br /&gt;
This does not mean that you should silence yourself – by taking some basic measures, you can limit your risks by increasing the level of the effort that would be required to attack you or your contacts.&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like your IP address''', thereby increasing your anonymity online.&lt;br /&gt;
&lt;br /&gt;
* '''Use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about your life''', you can use private profiles that can only be accessed by selected contacts. When using those on commercial social media, you should be aware of the regular changes to the privacy policies of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web, you should ask yourself if the information you spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices. https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or '''Adblock Plus''', as well as by monitoring your privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not using your real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or you can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing metada from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
==== Self-Doxing ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet and constitute a type of social engineering technique. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find their flaws.&lt;br /&gt;
&amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;). Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser. Useful tips on self-doxing tools and techniques can be found here: &lt;br /&gt;
* https://lilithlela.cyberguerrilla.org/?page_id=93870  &lt;br /&gt;
* https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* Ubisoft’s '''Digital Shadow''' is a Facebook app which illustrates what third parties can know about you through your Facebook profile: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== Mapping our social domains ====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”. Everyone belongs to several '''social domains''' - your work or advocacy networks, your family networks, friends, and sports teams. Some networks may feel more secure than others. For example, you may tend to have a more secure communication practices for your work or advocacy activities, but less secure practices for interacting with friends on a social networking platform. &lt;br /&gt;
&lt;br /&gt;
If you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in a social networking platform that you like a particular kind of game, an attacker who wants to investigate your work or advocacy activities might trick you into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if your work identity and your gaming profile can be connected to the same person; and this is why separating your social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
To separate your social domains, it's helpful to first map them out and identify which ones could expose you most. You can do this by thinking about your different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
For instance, Polish computer security researcher Joanna Rutkowska has developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain, including her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the encrypted communication with her partner.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain includes the totally untrusted areas which don’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
You can find more details about her scheme here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
==== Deleting identities ====&lt;br /&gt;
&lt;br /&gt;
If you decide to separate your social domains by creating multiple identities, you should decide whether to delete or keep the identity or identities that you already have.  To do this, you can start by investigating the traces of your existing identity or identities. (For methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;). If you opt for deleting existing accounts, you can visit the following places:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitates the process of deleting social media profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once you have identified your different social domains and the digital activities and contacts that go with them, what you need to do is decide if you want to differentiate your identities accordingly, or if you'd rather stick to your official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
You may want to keep your work connected to your legal or &amp;quot;real&amp;quot; identity, or think that your activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social media, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific context the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once you have '''assessed our risk''', you can then consider different strategies for separating your identities online.  For more on assessing risk visit: https://ssd.eff.org/en/module/introduction-threat-modeling&lt;br /&gt;
&lt;br /&gt;
'''Strategies''' for maintaining separate identities can range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding (http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name) talks about her decision to start writing under her real name, dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously Vani, a human rights activist, writes]: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”.&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where you don't need to gain other people's trust, when there are few or no people you can trust, or when you don't want to expose others in your life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance, you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you, as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When you adopt anonymity as a strategy you may use pseudonyms, but these should not be used across different networks or social domains, and some may only be used once and then discarded. Because of this, anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. For more information on how to be anonymous online, see the security recommendations at the beginning of this manual and '''Anonymizing tools''' in Step0 in the wiki.&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. There are [[https://www.eff.org/deeplinks/2011/07/case-pseudonyms|myriad reasons why individuals may wish to use a name other than the one they were born with]]. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent harassment and discrimination or they may use a name that’s easier to pronounce or spell in a given culture. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot; applying a real name policy which typically means using your legal name or the name by which you are commonly known. This policy has caused many users to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that we can be reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is [https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community using a name-shaped pseudonym].&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers '''visibility''', which allows to network with others, and by pinning your voice to a particular name you can develop an '''online reputation'''. This depends on others to decide whether you are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to your legal identity, or not. The choice to connect your online reputation to your &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity.  &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice you make, what is important is that you keep your domains effectively separated. No matter how many domains you identify in your digital life, and how many corresponding identities you create, on the internet every identity - even the one bearing your real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example Tor or TAILS)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' You may think that deleting certain sensitive data from social networks and web services may be enough to protect yourself, but metadata cannot be deleted as easily. And using just one identity through your whole life - in all your work and personal domains - creates a bulk of information that makes it easier to profile you.&lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of your social domains. You might also choose to use your real identity in some areas, and your new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When you create a new identity, you should select the contacts for each one carefully, and avoid sharing contacts with other identities you use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* Your various identities should not linked to each other, or to your real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number.&lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be useful, as they can be discarded easily if compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be created for new acquaintances when appropriate as introductory profiles to get to know somebody before you include them in your more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgment on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If you want to use commercial social networking platforms, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that you use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once you have decided on a name, a surname, and a username for your virtual persona, you should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if you wish to develop your own reputation, you don’t want to be confused with someone else, especially if they don’t share your views of the world!&lt;br /&gt;
&lt;br /&gt;
Then you need to create a story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role. You can invent a new story if you feel particularly inspired or base your story on a “known” person’s story, a superhero, a fictional character from your favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when you create an identity you should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== Credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If you keep all your normal identifying traits - such as your gender, job, attitude or the way you write - it might be possible for someone to connect the dots and connect your pseudonymous personas with your real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': Your persona should have a job that is different from yours, but not so different that you don’t know anything about that field: for example, they shouldn’t be a surgeon if you don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select your persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': This could be identified through a &amp;quot;stylometric analysis&amp;quot; that makes it possible to identify the author of a particular text. To change this, you can start by using a spell-checker in your word processor to check for consistent typos and you could also think about adopting a different writing attitude. You could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': A good rule of thumb is to give your persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, you are able to weather the strikes and even have some fun in the process. &lt;br /&gt;
&lt;br /&gt;
In any case, you should always remember that on the internet, each one of your identities - even the one connected to your real name - is a “virtual” identity, and it is always better to decide what character traits you want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for your “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for your identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Once you have created several personas, it's important to keep them separate in both your physical and digital lives. While keeping notes on your identities might help ensure that you remember your story, there are technical measures you can take to make sure that your profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social media accounts''' for each of your identities. A good method is to always use different apps for each account/identity and, if possible, to separate your identities per device or operating system (see '''6. A different machine for each identity'''). &lt;br /&gt;
To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles. For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains you need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all you need is a '''disposable email address''' that you only need to use for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if you decide to have just one identity online, using disposable email addresses prevents sites from building up a history of your activities and ensures that if that account gets compromised you can simply delete it and create a new one, keeping your digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are: '''https://anonbox.net''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''.&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': ''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to your main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised you can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill your main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org).&lt;br /&gt;
&lt;br /&gt;
==== Commercial social platforms ====&lt;br /&gt;
&lt;br /&gt;
Whatever social networking platform you decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
Also be very careful about the '''profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for you in that social network, regardless of your privacy settings.&lt;br /&gt;
&lt;br /&gt;
Make sure your contacts do not overlap with your other identities, and your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when you interact with the platform using a GPS-enabled phone, but the network your computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
If you access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide your trails is to publish from your various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read: &lt;br /&gt;
* https://www.facebook.com/help/389849807718635 &lt;br /&gt;
* Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
It can be a good idea to follow, from your pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance your real identity from your pseudonymous identities, you can also write (and hashtag on Twitter) posts under your pseudonymous profiles about events that you are not attending, especially if they are taking place far away from you. It can also be fun to publish and then delete posts that look like you have exposed your identity, so as to further confuse anyone who may try to unmask you.&lt;br /&gt;
&lt;br /&gt;
==== Alternative social platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if your aim is to publicise as widely as possible an event you are organizing or a project you are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close your accounts if they find that your contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html).&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If you add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to your data, the best solution is to limit the use of commercial social networking platforms to specific projects you want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)], '''N-1''' (https://n-1.cc/) and '''Crabgrass''' (https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so you may wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, you should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (e.g. related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, how is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can you choose to share your videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of your activity and information?&lt;br /&gt;
&lt;br /&gt;
==== Creating a blog or website ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com). Based on the same software, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org) and Nadir’s '''BlackBlogs ''' – (http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see https://www.autistici.org/en/links.html and https://blackblogs.org/policy respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
If you want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, you can create your own website. For this you need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If you want to use your own '''domain''' name, bypassing payments and identifications may get difficult unless you use Bitcoin or another anonymous payment system. The personal data you will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, you can register your domain with the data of an association and use a prepaid credit card that is not connected to your own data (if available in your country). Alternatively, you can use a registrar like Gandi.net (https://www.gandi.net) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting you; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic approaches is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that needs to be secured.&lt;br /&gt;
&lt;br /&gt;
If you use the same operating system for your several identities, no matter how carefully you separate your profiles you can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile you have assigned to your &amp;quot;real&amp;quot; identity, or get infected by a malware that allows your attacker to monitor everything you do online, with all your identities. Both risks can be limited by using a virtual machine for each of your domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on your physical computer. You can think of a VM as a ''computer within a computer''. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For your purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== Whonix ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix''' (https://www.whonix.org) is an operating system that aims at protecting your anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. Whonix’s website offers a wide documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== Tails ====&lt;br /&gt;
&lt;br /&gt;
'''Tails''', or '''The Amnesic Incognito Live System''', is a free and open-source Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections. When you launch Tails, you have a complete operating system that comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, you can access the internet, communicate, and do all you need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless you ask it to do so.&lt;br /&gt;
&lt;br /&gt;
==== Qubes OS ====&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' (https://www.qubes-os.org) is a free and open-source security-oriented operating system based on '''Fedora''', a GNU/Linux distribution, and '''Xen''', a virtual machine monitor that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things you do on your computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, you can do everything on a single physical computer without having to worry that one successful cyberattack harms your whole system, potentially revealing all the connections among your several identities.&lt;br /&gt;
&lt;br /&gt;
==== What to choose ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described – Tails, Whonix and Qubes OS – allow you to use a completely separate operating system for managing your alternate identities, and can be quite useful to make sure that you don’t reveal your true identity while you use the anonymous one(s).&lt;br /&gt;
&lt;br /&gt;
Using '''Tails''' is pretty easy, and if what you need to do with your alternate persona needs a focus on ''anonymisation'', then it may be worthwhile to overcome the initial obstacle of installing it in a USB stick and launching it. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. But if on the other hand we need ''persistence'' and we want to keep some files or actions we have created, we need to enable this option when we start the system. Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what you need is both ''anonymity'' and ''security by isolation'' and you have a good machine where you can run Virtualbox (https://www.whonix.org/wiki/System_Requirements), installing '''Whonix''' seems a good solution that caters to all your needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if you want to keep all your activities inside your own computer without having to install anything else and if what you are trying to do is to effectively ''separate'' your identities rather than anonymise your activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if you feel that you really need to protect yourself against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protect you from every threat, and you shouldn’t look at them as a magic potion that will make you invulnerable. Nevertheless, by using any of them, according to your needs and resources, you will raise the level of effort that an attacker will need to harm you, thus making an attack less likely. For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
'''Chapter 2: Safe spaces'''&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1359</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1359"/>
				<updated>2015-05-28T10:58:25Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: /* Creating a blog or website */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
'''Chapter 1: Identity online'''&lt;br /&gt;
&lt;br /&gt;
== Understanding digital shadows ==&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, it has also become a space where people who question or challenge dominant discourses - especially where those deal with gender and sexual orientation - are silenced, harassed and threatened. &lt;br /&gt;
&lt;br /&gt;
If you are active on the internet as women, human rights defenders, trans* or queer persons, and/or feminists, you'll probably want to make sure your privacy and security are protected as much as possible. &lt;br /&gt;
&lt;br /&gt;
A good place to start is by assessing the traces you are leaving behind on the internet, by getting to know your digital shadow and understanding how you organise your social domains and networks across your online and physical activities. &lt;br /&gt;
&lt;br /&gt;
The traces you leave online can tell very accurate stories about you; who you are, were you live and hang out; what you are interested in and who your friends and collaborators are. This information can expose you to several threats, including online harassment - particularly where the traces you leave behind are publicly available. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' you can use to take more control over your digital shadows - to increase your privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing your activity online.  &lt;br /&gt;
Some examples of these strategies and tools include controlling the amount of data you give away by consciously stripping valuable information from content and metadata; trying the art of self-doxing; and thinking about ways to play with and break up your online identity.&lt;br /&gt;
&lt;br /&gt;
Your digital shadow is the story data tells about you. This digital shadow is created by trillions of bits of data, left behind in the digital world when you connect to the internet, your mobile phones and your other online services. These digital shadows ultimately have a life of their own. They can be affected by others and can change in unpredictable ways. They grow continuously, and can be permanent, encompassing both your past and present activities. &lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' &lt;br /&gt;
The devices and the software you use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data. These bits of data can include your name, location, contacts, pictures, messages, tweets and likes, but also the brand of your computer, length of your phone calls and information about which websites you visit. These data traces can be put out there by yourself as well as by other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' &lt;br /&gt;
In some cases you '''actively '''share data – for example when you share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about you, by tagging you in pictures, mentioning you in tweets or simply by communicating with you. In other cases, you give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
&lt;br /&gt;
Your browsing habits and IP address are shared when you visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites you visit, and the information shared is collected for a wide range of purposes, from website analytics to advertising. Your mobile phone apps also collect data on you without your active knowledge or consent – for example, the photos you take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow you as you move from one service to another - from your internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in your readers to publishing pictures from the latest protest you covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of your messages, blogs, tweets and phone calls; it is your pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables your email to be delivered, files on your computer to be found and mobile communication to work. Metadata can include your email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the technological infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognised by computers.&lt;br /&gt;
&lt;br /&gt;
==== Who collects data? ====   &lt;br /&gt;
&lt;br /&gt;
You might wonder about the importance of one picture, one message, or one call. You might think there is so much data out there that nobody knows what to do with it, or cares that much about it. &lt;br /&gt;
&lt;br /&gt;
However, there are in reality a number of parties interested in this data - including companies, governments and individuals - and data collection and data analysis is by now very sophisticated. The data traces you leave behind online are constantly being collected, analysed and sorted by various parties to create profiles on you; and every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by these companies, governments and individuals for a variety of purposes. Profiles can be bought and sold;  data can be used to control, suppress or silence; it can be used to create harassment strategies. &lt;br /&gt;
&lt;br /&gt;
Data can be used to gain insight into who you are, what you do, where you have been and with whom you have been interacting. This information can then be used to make predictions on what you might do or where you might be in future. For example, if someone knows that you are an outspoken blogger on gender issues in country x, they know that you will probably be present at a conference on blogging and women held in that country. &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to your digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. &lt;br /&gt;
&lt;br /&gt;
You can't know exactly what is happening to our digital shadow, and that itself is a problem. Fortunately, there are many tools and tactics you can use to manage your digital shadows and to limit their ramifications in terms of profiling, control and surveillance. This will be discussed in the rest of this section. &lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
To move towards getting some control over your digital shadow, a good place to start is to see what it looks like (as far as is possible)&lt;br /&gt;
&lt;br /&gt;
* '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – is a tool launched by Tactical Tech that allows you to see what traces you are leaving online, and it offers a lot of tips on how to protect your privacy. &lt;br /&gt;
* Identifying and materialising social networks across your online and physical activities: John Fass, researcher and designer at the Royal College of Art, offers some activities for visualising your social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* A tool called '''OpenPaths.cc''' allows you to see through the eyes of your mobile phone. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone you can change the permissions for each app under its privacy setting. LINK?? &lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
The good news is that you can partly control what content and metadata you give away. When you publish content on the web, it is always a good idea to ask yourself if what you are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to your personal life, the names you mention or the images you upload may contribute to a picture about who you are, what you are doing, where you are doing it and so on. This could be used by people who wish to target you. &lt;br /&gt;
&lt;br /&gt;
This does not mean that you should silence yourself – by taking some basic measures, you can limit your risks by increasing the level of the effort that would be required to attack you or your contacts.&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like your IP address''', thereby increasing your anonymity online.&lt;br /&gt;
&lt;br /&gt;
* '''Use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about your life''', you can use private profiles that can only be accessed by selected contacts. When using those on commercial social media, you should be aware of the regular changes to the privacy policies of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web, you should ask yourself if the information you spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices. https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or '''Adblock Plus''', as well as by monitoring your privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not using your real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or you can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing metada from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
==== Self-Doxing ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet and constitute a type of social engineering technique. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find their flaws.&lt;br /&gt;
&amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;). Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser. Useful tips on self-doxing tools and techniques can be found here: &lt;br /&gt;
* https://lilithlela.cyberguerrilla.org/?page_id=93870  &lt;br /&gt;
* https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* Ubisoft’s '''Digital Shadow''' is a Facebook app which illustrates what third parties can know about you through your Facebook profile: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== Mapping our social domains ====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”. Everyone belongs to several '''social domains''' - your work or advocacy networks, your family networks, friends, and sports teams. Some networks may feel more secure than others. For example, you may tend to have a more secure communication practices for your work or advocacy activities, but less secure practices for interacting with friends on a social networking platform. &lt;br /&gt;
&lt;br /&gt;
If you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in a social networking platform that you like a particular kind of game, an attacker who wants to investigate your work or advocacy activities might trick you into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if your work identity and your gaming profile can be connected to the same person; and this is why separating your social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
To separate your social domains, it's helpful to first map them out and identify which ones could expose you most. You can do this by thinking about your different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
For instance, Polish computer security researcher Joanna Rutkowska has developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain, including her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the encrypted communication with her partner.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain includes the totally untrusted areas which don’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
You can find more details about her scheme here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
==== Deleting identities ====&lt;br /&gt;
&lt;br /&gt;
If you decide to separate your social domains by creating multiple identities, you should decide whether to delete or keep the identity or identities that you already have.  To do this, you can start by investigating the traces of your existing identity or identities. (For methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;). If you opt for deleting existing accounts, you can visit the following places:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitates the process of deleting social media profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once you have identified your different social domains and the digital activities and contacts that go with them, what you need to do is decide if you want to differentiate your identities accordingly, or if you'd rather stick to your official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
You may want to keep your work connected to your legal or &amp;quot;real&amp;quot; identity, or think that your activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social media, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific context the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once you have '''assessed our risk''', you can then consider different strategies for separating your identities online.  For more on assessing risk visit: https://ssd.eff.org/en/module/introduction-threat-modeling&lt;br /&gt;
&lt;br /&gt;
'''Strategies''' for maintaining separate identities can range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding (http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name) talks about her decision to start writing under her real name, dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously Vani, a human rights activist, writes]: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”.&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where you don't need to gain other people's trust, when there are few or no people you can trust, or when you don't want to expose others in your life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance, you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you, as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When you adopt anonymity as a strategy you may use pseudonyms, but these should not be used across different networks or social domains, and some may only be used once and then discarded. Because of this, anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. For more information on how to be anonymous online, see the security recommendations at the beginning of this manual and '''Anonymizing tools''' in Step0 in the wiki.&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. There are [[https://www.eff.org/deeplinks/2011/07/case-pseudonyms|myriad reasons why individuals may wish to use a name other than the one they were born with]]. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent harassment and discrimination or they may use a name that’s easier to pronounce or spell in a given culture. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot; applying a real name policy which typically means using your legal name or the name by which you are commonly known. This policy has caused many users to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that we can be reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is [https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community using a name-shaped pseudonym].&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers '''visibility''', which allows to network with others, and by pinning your voice to a particular name you can develop an '''online reputation'''. This depends on others to decide whether you are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to your legal identity, or not. The choice to connect your online reputation to your &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity.  &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice you make, what is important is that you keep your domains effectively separated. No matter how many domains you identify in your digital life, and how many corresponding identities you create, on the internet every identity - even the one bearing your real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example Tor or TAILS)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' You may think that deleting certain sensitive data from social networks and web services may be enough to protect yourself, but metadata cannot be deleted as easily. And using just one identity through your whole life - in all your work and personal domains - creates a bulk of information that makes it easier to profile you.&lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of your social domains. You might also choose to use your real identity in some areas, and your new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When you create a new identity, you should select the contacts for each one carefully, and avoid sharing contacts with other identities you use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* Your various identities should not linked to each other, or to your real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number.&lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be useful, as they can be discarded easily if compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be created for new acquaintances when appropriate as introductory profiles to get to know somebody before you include them in your more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgment on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If you want to use commercial social networking platforms, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that you use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once you have decided on a name, a surname, and a username for your virtual persona, you should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if you wish to develop your own reputation, you don’t want to be confused with someone else, especially if they don’t share your views of the world!&lt;br /&gt;
&lt;br /&gt;
Then you need to create a story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role. You can invent a new story if you feel particularly inspired or base your story on a “known” person’s story, a superhero, a fictional character from your favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when you create an identity you should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== Credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If you keep all your normal identifying traits - such as your gender, job, attitude or the way you write - it might be possible for someone to connect the dots and connect your pseudonymous personas with your real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': Your persona should have a job that is different from yours, but not so different that you don’t know anything about that field: for example, they shouldn’t be a surgeon if you don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select your persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': This could be identified through a &amp;quot;stylometric analysis&amp;quot; that makes it possible to identify the author of a particular text. To change this, you can start by using a spell-checker in your word processor to check for consistent typos and you could also think about adopting a different writing attitude. You could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': A good rule of thumb is to give your persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, you are able to weather the strikes and even have some fun in the process. &lt;br /&gt;
&lt;br /&gt;
In any case, you should always remember that on the internet, each one of your identities - even the one connected to your real name - is a “virtual” identity, and it is always better to decide what character traits you want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for your “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for your identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Once you have created several personas, it's important to keep them separate in both your physical and digital lives. While keeping notes on your identities might help ensure that you remember your story, there are technical measures you can take to make sure that your profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social media accounts''' for each of your identities. A good method is to always use different apps for each account/identity and, if possible, to separate your identities per device or operating system (see '''6. A different machine for each identity'''). &lt;br /&gt;
To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles. For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains you need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all you need is a '''disposable email address''' that you only need to use for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if you decide to have just one identity online, using disposable email addresses prevents sites from building up a history of your activities and ensures that if that account gets compromised you can simply delete it and create a new one, keeping your digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are: '''https://anonbox.net''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''.&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': ''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to your main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised you can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill your main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org).&lt;br /&gt;
&lt;br /&gt;
==== Commercial social platforms ====&lt;br /&gt;
&lt;br /&gt;
Whatever social networking platform you decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
Also be very careful about the '''profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for you in that social network, regardless of your privacy settings.&lt;br /&gt;
&lt;br /&gt;
Make sure your contacts do not overlap with your other identities, and your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when you interact with the platform using a GPS-enabled phone, but the network your computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
If you access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide your trails is to publish from your various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read: &lt;br /&gt;
* https://www.facebook.com/help/389849807718635 &lt;br /&gt;
* Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
It can be a good idea to follow, from your pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance your real identity from your pseudonymous identities, you can also write (and hashtag on Twitter) posts under your pseudonymous profiles about events that you are not attending, especially if they are taking place far away from you. It can also be fun to publish and then delete posts that look like you have exposed your identity, so as to further confuse anyone who may try to unmask you.&lt;br /&gt;
&lt;br /&gt;
==== Alternative social platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if your aim is to publicise as widely as possible an event you are organizing or a project you are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close your accounts if they find that your contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html).&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If you add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to your data, the best solution is to limit the use of commercial social networking platforms to specific projects you want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)], '''N-1''' (https://n-1.cc/) and '''Crabgrass''' (https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so you may wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, you should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (e.g. related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, how is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can you choose to share your videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of your activity and information?&lt;br /&gt;
&lt;br /&gt;
==== Creating a blog or website ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com). Based on the same software, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org) and Nadir’s '''BlackBlogs ''' – (http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see https://www.autistici.org/en/links.html and https://blackblogs.org/policy respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
If you want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, you can create your own website. For this you need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If you want to use your own '''domain''' name, bypassing payments and identifications may get difficult unless you use Bitcoin or another anonymous payment system. The personal data you will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, you can register your domain with the data of an association and use a prepaid credit card that is not connected to your own data (if available in your country). Alternatively, you can use a registrar like Gandi.net (https://www.gandi.net) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting us; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic, approach is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that we want to secure.&lt;br /&gt;
&lt;br /&gt;
If we use the same operating system for our several identities, no matter how carefully we separate our profiles we can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile we have assigned to our 'real' identity, or get infected by a malware that allows our attacker to monitor everything we do online, with all our identities. Both risks can be limited by using a virtual machine for each of our domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on our physical computer. We can think of a VM as a ''computer within a computer''. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For our purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== Whonix' ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix '''(https://www.whonix.org) is an operating system that aims at protecting our anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. Whonix’s website offers a wide documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== Tails ====&lt;br /&gt;
&lt;br /&gt;
'''Tails''', or '''The Amnesic Incognito Live System''', a free and open-source Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections. When we launch Tails, we have a complete operating system that comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, we can access the internet, communicate, and do all we need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless we ask it to do so.&lt;br /&gt;
&lt;br /&gt;
==== Qubes OS ====&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' – https://www.qubes-os.org – is a free and open-source security-oriented operating system based on '''Fedora''', a Linux distribution, and '''Xen''', a virtual machine that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things we do on our computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, we can do everything on a single physical computer without having to worry that one successful cyberattack harms our whole system, potentially revealing all the connections among our several identities.&lt;br /&gt;
&lt;br /&gt;
==== What to choose ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described – Tails, Whonix and Qubes OS – allow us to use a completely separate operating system for managing our alternate identities, and can be quite useful to make sure that we don’t reveal our true identity while we use the anonymous one(s).&lt;br /&gt;
&lt;br /&gt;
Using '''Tails''' is pretty easy, and if what we need to do with our alternate persona needs a focus on ''anonymization'', then it may be worthwhile to overcome the initial obstacle. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. But if on the other hand we need ''persistence'' and we want to keep some files or actions we have created we need to enable this option when we start the system. Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what we need is both ''anonymity'' and ''security by isolation'' and we have a good machine – https://www.whonix.org/wiki/System_Requirements – where we can run Virtualbox and installing '''Whonix''', according to the number of our alternative identities it seems a good solution that caters to all our needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if we want to keep all our activities inside our own computer without having to install anything else and if what we are trying to do is to effectively ''separate'' our identities rather than anonymize our activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if we feel that we really need to protect ourselves against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protects us from every threat, and we shouldn’t look at them as a magic potion that will make us invulnerable. Nevertheless, by using any of them, according to our needs and resources, we will raise the level of effort that an attacker will need to harm us, thus making an attack less likely. For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&amp;lt;nowiki/&amp;gt;&amp;lt;nowiki/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
'''Chapter 2: Safe spaces'''&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1358</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1358"/>
				<updated>2015-05-28T10:51:34Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: /* Alternative social platforms */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
'''Chapter 1: Identity online'''&lt;br /&gt;
&lt;br /&gt;
== Understanding digital shadows ==&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, it has also become a space where people who question or challenge dominant discourses - especially where those deal with gender and sexual orientation - are silenced, harassed and threatened. &lt;br /&gt;
&lt;br /&gt;
If you are active on the internet as women, human rights defenders, trans* or queer persons, and/or feminists, you'll probably want to make sure your privacy and security are protected as much as possible. &lt;br /&gt;
&lt;br /&gt;
A good place to start is by assessing the traces you are leaving behind on the internet, by getting to know your digital shadow and understanding how you organise your social domains and networks across your online and physical activities. &lt;br /&gt;
&lt;br /&gt;
The traces you leave online can tell very accurate stories about you; who you are, were you live and hang out; what you are interested in and who your friends and collaborators are. This information can expose you to several threats, including online harassment - particularly where the traces you leave behind are publicly available. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' you can use to take more control over your digital shadows - to increase your privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing your activity online.  &lt;br /&gt;
Some examples of these strategies and tools include controlling the amount of data you give away by consciously stripping valuable information from content and metadata; trying the art of self-doxing; and thinking about ways to play with and break up your online identity.&lt;br /&gt;
&lt;br /&gt;
Your digital shadow is the story data tells about you. This digital shadow is created by trillions of bits of data, left behind in the digital world when you connect to the internet, your mobile phones and your other online services. These digital shadows ultimately have a life of their own. They can be affected by others and can change in unpredictable ways. They grow continuously, and can be permanent, encompassing both your past and present activities. &lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' &lt;br /&gt;
The devices and the software you use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data. These bits of data can include your name, location, contacts, pictures, messages, tweets and likes, but also the brand of your computer, length of your phone calls and information about which websites you visit. These data traces can be put out there by yourself as well as by other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' &lt;br /&gt;
In some cases you '''actively '''share data – for example when you share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about you, by tagging you in pictures, mentioning you in tweets or simply by communicating with you. In other cases, you give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
&lt;br /&gt;
Your browsing habits and IP address are shared when you visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites you visit, and the information shared is collected for a wide range of purposes, from website analytics to advertising. Your mobile phone apps also collect data on you without your active knowledge or consent – for example, the photos you take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow you as you move from one service to another - from your internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in your readers to publishing pictures from the latest protest you covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of your messages, blogs, tweets and phone calls; it is your pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables your email to be delivered, files on your computer to be found and mobile communication to work. Metadata can include your email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the technological infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognised by computers.&lt;br /&gt;
&lt;br /&gt;
==== Who collects data? ====   &lt;br /&gt;
&lt;br /&gt;
You might wonder about the importance of one picture, one message, or one call. You might think there is so much data out there that nobody knows what to do with it, or cares that much about it. &lt;br /&gt;
&lt;br /&gt;
However, there are in reality a number of parties interested in this data - including companies, governments and individuals - and data collection and data analysis is by now very sophisticated. The data traces you leave behind online are constantly being collected, analysed and sorted by various parties to create profiles on you; and every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by these companies, governments and individuals for a variety of purposes. Profiles can be bought and sold;  data can be used to control, suppress or silence; it can be used to create harassment strategies. &lt;br /&gt;
&lt;br /&gt;
Data can be used to gain insight into who you are, what you do, where you have been and with whom you have been interacting. This information can then be used to make predictions on what you might do or where you might be in future. For example, if someone knows that you are an outspoken blogger on gender issues in country x, they know that you will probably be present at a conference on blogging and women held in that country. &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to your digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. &lt;br /&gt;
&lt;br /&gt;
You can't know exactly what is happening to our digital shadow, and that itself is a problem. Fortunately, there are many tools and tactics you can use to manage your digital shadows and to limit their ramifications in terms of profiling, control and surveillance. This will be discussed in the rest of this section. &lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
To move towards getting some control over your digital shadow, a good place to start is to see what it looks like (as far as is possible)&lt;br /&gt;
&lt;br /&gt;
* '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – is a tool launched by Tactical Tech that allows you to see what traces you are leaving online, and it offers a lot of tips on how to protect your privacy. &lt;br /&gt;
* Identifying and materialising social networks across your online and physical activities: John Fass, researcher and designer at the Royal College of Art, offers some activities for visualising your social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* A tool called '''OpenPaths.cc''' allows you to see through the eyes of your mobile phone. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone you can change the permissions for each app under its privacy setting. LINK?? &lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
The good news is that you can partly control what content and metadata you give away. When you publish content on the web, it is always a good idea to ask yourself if what you are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to your personal life, the names you mention or the images you upload may contribute to a picture about who you are, what you are doing, where you are doing it and so on. This could be used by people who wish to target you. &lt;br /&gt;
&lt;br /&gt;
This does not mean that you should silence yourself – by taking some basic measures, you can limit your risks by increasing the level of the effort that would be required to attack you or your contacts.&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like your IP address''', thereby increasing your anonymity online.&lt;br /&gt;
&lt;br /&gt;
* '''Use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about your life''', you can use private profiles that can only be accessed by selected contacts. When using those on commercial social media, you should be aware of the regular changes to the privacy policies of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web, you should ask yourself if the information you spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices. https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or '''Adblock Plus''', as well as by monitoring your privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not using your real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or you can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing metada from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
==== Self-Doxing ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet and constitute a type of social engineering technique. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find their flaws.&lt;br /&gt;
&amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;). Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser. Useful tips on self-doxing tools and techniques can be found here: &lt;br /&gt;
* https://lilithlela.cyberguerrilla.org/?page_id=93870  &lt;br /&gt;
* https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* Ubisoft’s '''Digital Shadow''' is a Facebook app which illustrates what third parties can know about you through your Facebook profile: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== Mapping our social domains ====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”. Everyone belongs to several '''social domains''' - your work or advocacy networks, your family networks, friends, and sports teams. Some networks may feel more secure than others. For example, you may tend to have a more secure communication practices for your work or advocacy activities, but less secure practices for interacting with friends on a social networking platform. &lt;br /&gt;
&lt;br /&gt;
If you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in a social networking platform that you like a particular kind of game, an attacker who wants to investigate your work or advocacy activities might trick you into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if your work identity and your gaming profile can be connected to the same person; and this is why separating your social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
To separate your social domains, it's helpful to first map them out and identify which ones could expose you most. You can do this by thinking about your different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
For instance, Polish computer security researcher Joanna Rutkowska has developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain, including her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the encrypted communication with her partner.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain includes the totally untrusted areas which don’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
You can find more details about her scheme here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
==== Deleting identities ====&lt;br /&gt;
&lt;br /&gt;
If you decide to separate your social domains by creating multiple identities, you should decide whether to delete or keep the identity or identities that you already have.  To do this, you can start by investigating the traces of your existing identity or identities. (For methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;). If you opt for deleting existing accounts, you can visit the following places:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitates the process of deleting social media profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once you have identified your different social domains and the digital activities and contacts that go with them, what you need to do is decide if you want to differentiate your identities accordingly, or if you'd rather stick to your official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
You may want to keep your work connected to your legal or &amp;quot;real&amp;quot; identity, or think that your activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social media, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific context the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once you have '''assessed our risk''', you can then consider different strategies for separating your identities online.  For more on assessing risk visit: https://ssd.eff.org/en/module/introduction-threat-modeling&lt;br /&gt;
&lt;br /&gt;
'''Strategies''' for maintaining separate identities can range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding (http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name) talks about her decision to start writing under her real name, dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously Vani, a human rights activist, writes]: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”.&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where you don't need to gain other people's trust, when there are few or no people you can trust, or when you don't want to expose others in your life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance, you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you, as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When you adopt anonymity as a strategy you may use pseudonyms, but these should not be used across different networks or social domains, and some may only be used once and then discarded. Because of this, anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. For more information on how to be anonymous online, see the security recommendations at the beginning of this manual and '''Anonymizing tools''' in Step0 in the wiki.&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. There are [[https://www.eff.org/deeplinks/2011/07/case-pseudonyms|myriad reasons why individuals may wish to use a name other than the one they were born with]]. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent harassment and discrimination or they may use a name that’s easier to pronounce or spell in a given culture. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot; applying a real name policy which typically means using your legal name or the name by which you are commonly known. This policy has caused many users to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that we can be reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is [https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community using a name-shaped pseudonym].&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers '''visibility''', which allows to network with others, and by pinning your voice to a particular name you can develop an '''online reputation'''. This depends on others to decide whether you are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to your legal identity, or not. The choice to connect your online reputation to your &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity.  &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice you make, what is important is that you keep your domains effectively separated. No matter how many domains you identify in your digital life, and how many corresponding identities you create, on the internet every identity - even the one bearing your real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example Tor or TAILS)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' You may think that deleting certain sensitive data from social networks and web services may be enough to protect yourself, but metadata cannot be deleted as easily. And using just one identity through your whole life - in all your work and personal domains - creates a bulk of information that makes it easier to profile you.&lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of your social domains. You might also choose to use your real identity in some areas, and your new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When you create a new identity, you should select the contacts for each one carefully, and avoid sharing contacts with other identities you use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* Your various identities should not linked to each other, or to your real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number.&lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be useful, as they can be discarded easily if compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be created for new acquaintances when appropriate as introductory profiles to get to know somebody before you include them in your more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgment on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If you want to use commercial social networking platforms, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that you use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once you have decided on a name, a surname, and a username for your virtual persona, you should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if you wish to develop your own reputation, you don’t want to be confused with someone else, especially if they don’t share your views of the world!&lt;br /&gt;
&lt;br /&gt;
Then you need to create a story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role. You can invent a new story if you feel particularly inspired or base your story on a “known” person’s story, a superhero, a fictional character from your favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when you create an identity you should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== Credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If you keep all your normal identifying traits - such as your gender, job, attitude or the way you write - it might be possible for someone to connect the dots and connect your pseudonymous personas with your real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': Your persona should have a job that is different from yours, but not so different that you don’t know anything about that field: for example, they shouldn’t be a surgeon if you don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select your persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': This could be identified through a &amp;quot;stylometric analysis&amp;quot; that makes it possible to identify the author of a particular text. To change this, you can start by using a spell-checker in your word processor to check for consistent typos and you could also think about adopting a different writing attitude. You could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': A good rule of thumb is to give your persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, you are able to weather the strikes and even have some fun in the process. &lt;br /&gt;
&lt;br /&gt;
In any case, you should always remember that on the internet, each one of your identities - even the one connected to your real name - is a “virtual” identity, and it is always better to decide what character traits you want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for your “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for your identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Once you have created several personas, it's important to keep them separate in both your physical and digital lives. While keeping notes on your identities might help ensure that you remember your story, there are technical measures you can take to make sure that your profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social media accounts''' for each of your identities. A good method is to always use different apps for each account/identity and, if possible, to separate your identities per device or operating system (see '''6. A different machine for each identity'''). &lt;br /&gt;
To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles. For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains you need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all you need is a '''disposable email address''' that you only need to use for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if you decide to have just one identity online, using disposable email addresses prevents sites from building up a history of your activities and ensures that if that account gets compromised you can simply delete it and create a new one, keeping your digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are: '''https://anonbox.net''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''.&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': ''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to your main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised you can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill your main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org).&lt;br /&gt;
&lt;br /&gt;
==== Commercial social platforms ====&lt;br /&gt;
&lt;br /&gt;
Whatever social networking platform you decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
Also be very careful about the '''profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for you in that social network, regardless of your privacy settings.&lt;br /&gt;
&lt;br /&gt;
Make sure your contacts do not overlap with your other identities, and your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when you interact with the platform using a GPS-enabled phone, but the network your computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
If you access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide your trails is to publish from your various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read: &lt;br /&gt;
* https://www.facebook.com/help/389849807718635 &lt;br /&gt;
* Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
It can be a good idea to follow, from your pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance your real identity from your pseudonymous identities, you can also write (and hashtag on Twitter) posts under your pseudonymous profiles about events that you are not attending, especially if they are taking place far away from you. It can also be fun to publish and then delete posts that look like you have exposed your identity, so as to further confuse anyone who may try to unmask you.&lt;br /&gt;
&lt;br /&gt;
==== Alternative social platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if your aim is to publicise as widely as possible an event you are organizing or a project you are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close your accounts if they find that your contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html).&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If you add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to your data, the best solution is to limit the use of commercial social networking platforms to specific projects you want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)], '''N-1''' (https://n-1.cc/) and '''Crabgrass''' (https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so you may wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, you should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (e.g. related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, how is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can you choose to share your videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of your activity and information?&lt;br /&gt;
&lt;br /&gt;
==== Creating a blog or website ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com).  Based on it, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org/ http://noblogs.org) and Nadir’s '''BlackBlogs '''– (http://blackblogs.org/ http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see &amp;lt;nowiki/&amp;gt;https://www.autistici.org/en/links.html &amp;lt;nowiki/&amp;gt;and &amp;lt;nowiki/&amp;gt;https://blackblogs.org/policy &amp;lt;nowiki/&amp;gt;respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
If we want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, we can create our own website. For this we need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If we want to use our own '''domain''' name, bypassing payments and identifications may get difficult unless we use Bitcoin or another pseudonymous payment system. The personal data we will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, we can register our domain with the data of an association and use a prepaid credit card that is not connected to our own data (if available in our country). Alternatively, we can use a registrar like Gandi.net ([https://www.gandi.net/ https://www.gandi.net]) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting us; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic, approach is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that we want to secure.&lt;br /&gt;
&lt;br /&gt;
If we use the same operating system for our several identities, no matter how carefully we separate our profiles we can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile we have assigned to our 'real' identity, or get infected by a malware that allows our attacker to monitor everything we do online, with all our identities. Both risks can be limited by using a virtual machine for each of our domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on our physical computer. We can think of a VM as a ''computer within a computer''. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For our purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== Whonix' ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix '''(https://www.whonix.org) is an operating system that aims at protecting our anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. Whonix’s website offers a wide documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== Tails ====&lt;br /&gt;
&lt;br /&gt;
'''Tails''', or '''The Amnesic Incognito Live System''', a free and open-source Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections. When we launch Tails, we have a complete operating system that comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, we can access the internet, communicate, and do all we need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless we ask it to do so.&lt;br /&gt;
&lt;br /&gt;
==== Qubes OS ====&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' – https://www.qubes-os.org – is a free and open-source security-oriented operating system based on '''Fedora''', a Linux distribution, and '''Xen''', a virtual machine that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things we do on our computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, we can do everything on a single physical computer without having to worry that one successful cyberattack harms our whole system, potentially revealing all the connections among our several identities.&lt;br /&gt;
&lt;br /&gt;
==== What to choose ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described – Tails, Whonix and Qubes OS – allow us to use a completely separate operating system for managing our alternate identities, and can be quite useful to make sure that we don’t reveal our true identity while we use the anonymous one(s).&lt;br /&gt;
&lt;br /&gt;
Using '''Tails''' is pretty easy, and if what we need to do with our alternate persona needs a focus on ''anonymization'', then it may be worthwhile to overcome the initial obstacle. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. But if on the other hand we need ''persistence'' and we want to keep some files or actions we have created we need to enable this option when we start the system. Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what we need is both ''anonymity'' and ''security by isolation'' and we have a good machine – https://www.whonix.org/wiki/System_Requirements – where we can run Virtualbox and installing '''Whonix''', according to the number of our alternative identities it seems a good solution that caters to all our needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if we want to keep all our activities inside our own computer without having to install anything else and if what we are trying to do is to effectively ''separate'' our identities rather than anonymize our activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if we feel that we really need to protect ourselves against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protects us from every threat, and we shouldn’t look at them as a magic potion that will make us invulnerable. Nevertheless, by using any of them, according to our needs and resources, we will raise the level of effort that an attacker will need to harm us, thus making an attack less likely. For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&amp;lt;nowiki/&amp;gt;&amp;lt;nowiki/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
'''Chapter 2: Safe spaces'''&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1356</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1356"/>
				<updated>2015-05-28T10:46:05Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: /* Commercial social platforms */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
== Understanding digital shadows ==&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, it has also become a space where people who question or challenge dominant discourses - especially where those deal with gender and sexual orientation - are silenced, harassed and threatened. &lt;br /&gt;
&lt;br /&gt;
If you are active on the internet as women, human rights defenders, trans* or queer persons, and/or feminists, you'll probably want to make sure your privacy and security are protected as much as possible. &lt;br /&gt;
&lt;br /&gt;
A good place to start is by assessing the traces you are leaving behind on the internet, by getting to know your digital shadow and understanding how you organise your social domains and networks across your online and physical activities. &lt;br /&gt;
&lt;br /&gt;
The traces you leave online can tell very accurate stories about you; who you are, were you live and hang out; what you are interested in and who your friends and collaborators are. This information can expose you to several threats, including online harassment - particularly where the traces you leave behind are publicly available. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' you can use to take more control over your digital shadows - to increase your privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing your activity online.  &lt;br /&gt;
Some examples of these strategies and tools include controlling the amount of data you give away by consciously stripping valuable information from content and metadata; trying the art of self-doxing; and thinking about ways to play with and break up your online identity.&lt;br /&gt;
&lt;br /&gt;
Your digital shadow is the story data tells about you. This digital shadow is created by trillions of bits of data, left behind in the digital world when you connect to the internet, your mobile phones and your other online services. These digital shadows ultimately have a life of their own. They can be affected by others and can change in unpredictable ways. They grow continuously, and can be permanent, encompassing both your past and present activities. &lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' &lt;br /&gt;
The devices and the software you use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data. These bits of data can include your name, location, contacts, pictures, messages, tweets and likes, but also the brand of your computer, length of your phone calls and information about which websites you visit. These data traces can be put out there by yourself as well as by other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' &lt;br /&gt;
In some cases you '''actively '''share data – for example when you share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about you, by tagging you in pictures, mentioning you in tweets or simply by communicating with you. In other cases, you give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
&lt;br /&gt;
Your browsing habits and IP address are shared when you visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites you visit, and the information shared is collected for a wide range of purposes, from website analytics to advertising. Your mobile phone apps also collect data on you without your active knowledge or consent – for example, the photos you take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow you as you move from one service to another - from your internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in your readers to publishing pictures from the latest protest you covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of your messages, blogs, tweets and phone calls; it is your pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables your email to be delivered, files on your computer to be found and mobile communication to work. Metadata can include your email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the technological infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognised by computers.&lt;br /&gt;
&lt;br /&gt;
==== Who collects data? ====   &lt;br /&gt;
&lt;br /&gt;
You might wonder about the importance of one picture, one message, or one call. You might think there is so much data out there that nobody knows what to do with it, or cares that much about it. &lt;br /&gt;
&lt;br /&gt;
However, there are in reality a number of parties interested in this data - including companies, governments and individuals - and data collection and data analysis is by now very sophisticated. The data traces you leave behind online are constantly being collected, analysed and sorted by various parties to create profiles on you; and every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by these companies, governments and individuals for a variety of purposes. Profiles can be bought and sold;  data can be used to control, suppress or silence; it can be used to create harassment strategies. &lt;br /&gt;
&lt;br /&gt;
Data can be used to gain insight into who you are, what you do, where you have been and with whom you have been interacting. This information can then be used to make predictions on what you might do or where you might be in future. For example, if someone knows that you are an outspoken blogger on gender issues in country x, they know that you will probably be present at a conference on blogging and women held in that country. &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to your digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. &lt;br /&gt;
&lt;br /&gt;
You can't know exactly what is happening to our digital shadow, and that itself is a problem. Fortunately, there are many tools and tactics you can use to manage your digital shadows and to limit their ramifications in terms of profiling, control and surveillance. This will be discussed in the rest of this section. &lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
To move towards getting some control over your digital shadow, a good place to start is to see what it looks like (as far as is possible)&lt;br /&gt;
&lt;br /&gt;
* '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – is a tool launched by Tactical Tech that allows you to see what traces you are leaving online, and it offers a lot of tips on how to protect your privacy. &lt;br /&gt;
* Identifying and materialising social networks across your online and physical activities: John Fass, researcher and designer at the Royal College of Art, offers some activities for visualising your social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* A tool called '''OpenPaths.cc''' allows you to see through the eyes of your mobile phone. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone you can change the permissions for each app under its privacy setting. LINK?? &lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
The good news is that you can partly control what content and metadata you give away. When you publish content on the web, it is always a good idea to ask yourself if what you are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to your personal life, the names you mention or the images you upload may contribute to a picture about who you are, what you are doing, where you are doing it and so on. This could be used by people who wish to target you. &lt;br /&gt;
&lt;br /&gt;
This does not mean that you should silence yourself – by taking some basic measures, you can limit your risks by increasing the level of the effort that would be required to attack you or your contacts.&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like your IP address''', thereby increasing your anonymity online.&lt;br /&gt;
&lt;br /&gt;
* '''Use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about your life''', you can use private profiles that can only be accessed by selected contacts. When using those on commercial social media, you should be aware of the regular changes to the privacy policies of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web, you should ask yourself if the information you spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices. https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or '''Adblock Plus''', as well as by monitoring your privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not using your real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or you can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing metada from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
==== Self-Doxing ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet and constitute a type of social engineering technique. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find their flaws.&lt;br /&gt;
&amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;). Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser. Useful tips on self-doxing tools and techniques can be found here: &lt;br /&gt;
* https://lilithlela.cyberguerrilla.org/?page_id=93870  &lt;br /&gt;
* https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* Ubisoft’s '''Digital Shadow''' is a Facebook app which illustrates what third parties can know about you through your Facebook profile: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== Mapping our social domains ====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”. Everyone belongs to several '''social domains''' - your work or advocacy networks, your family networks, friends, and sports teams. Some networks may feel more secure than others. For example, you may tend to have a more secure communication practices for your work or advocacy activities, but less secure practices for interacting with friends on a social networking platform. &lt;br /&gt;
&lt;br /&gt;
If you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in a social networking platform that you like a particular kind of game, an attacker who wants to investigate your work or advocacy activities might trick you into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if your work identity and your gaming profile can be connected to the same person; and this is why separating your social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
To separate your social domains, it's helpful to first map them out and identify which ones could expose you most. You can do this by thinking about your different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
For instance, Polish computer security researcher Joanna Rutkowska has developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain, including her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the encrypted communication with her partner.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain includes the totally untrusted areas which don’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
You can find more details about her scheme here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
==== Deleting identities ====&lt;br /&gt;
&lt;br /&gt;
If you decide to separate your social domains by creating multiple identities, you should decide whether to delete or keep the identity or identities that you already have.  To do this, you can start by investigating the traces of your existing identity or identities. (For methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;). If you opt for deleting existing accounts, you can visit the following places:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitates the process of deleting social media profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once you have identified your different social domains and the digital activities and contacts that go with them, what you need to do is decide if you want to differentiate your identities accordingly, or if you'd rather stick to your official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
You may want to keep your work connected to your legal or &amp;quot;real&amp;quot; identity, or think that your activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social media, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific context the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once you have '''assessed our risk''', you can then consider different strategies for separating your identities online.  For more on assessing risk visit: https://ssd.eff.org/en/module/introduction-threat-modeling&lt;br /&gt;
&lt;br /&gt;
'''Strategies''' for maintaining separate identities can range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding (http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name) talks about her decision to start writing under her real name, dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously Vani, a human rights activist, writes]: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”.&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where you don't need to gain other people's trust, when there are few or no people you can trust, or when you don't want to expose others in your life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance, you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you, as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When you adopt anonymity as a strategy you may use pseudonyms, but these should not be used across different networks or social domains, and some may only be used once and then discarded. Because of this, anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. For more information on how to be anonymous online, see the security recommendations at the beginning of this manual and '''Anonymizing tools''' in Step0 in the wiki.&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. There are [[https://www.eff.org/deeplinks/2011/07/case-pseudonyms|myriad reasons why individuals may wish to use a name other than the one they were born with]]. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent harassment and discrimination or they may use a name that’s easier to pronounce or spell in a given culture. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot; applying a real name policy which typically means using your legal name or the name by which you are commonly known. This policy has caused many users to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that we can be reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is [https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community using a name-shaped pseudonym].&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers '''visibility''', which allows to network with others, and by pinning your voice to a particular name you can develop an '''online reputation'''. This depends on others to decide whether you are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to your legal identity, or not. The choice to connect your online reputation to your &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity.  &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice you make, what is important is that you keep your domains effectively separated. No matter how many domains you identify in your digital life, and how many corresponding identities you create, on the internet every identity - even the one bearing your real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example Tor or TAILS)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' You may think that deleting certain sensitive data from social networks and web services may be enough to protect yourself, but metadata cannot be deleted as easily. And using just one identity through your whole life - in all your work and personal domains - creates a bulk of information that makes it easier to profile you.&lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of your social domains. You might also choose to use your real identity in some areas, and your new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When you create a new identity, you should select the contacts for each one carefully, and avoid sharing contacts with other identities you use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* Your various identities should not linked to each other, or to your real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number.&lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be useful, as they can be discarded easily if compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be created for new acquaintances when appropriate as introductory profiles to get to know somebody before you include them in your more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgment on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If you want to use commercial social networking platforms, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that you use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once you have decided on a name, a surname, and a username for your virtual persona, you should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if you wish to develop your own reputation, you don’t want to be confused with someone else, especially if they don’t share your views of the world!&lt;br /&gt;
&lt;br /&gt;
Then you need to create a story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role. You can invent a new story if you feel particularly inspired or base your story on a “known” person’s story, a superhero, a fictional character from your favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when you create an identity you should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== Credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If you keep all your normal identifying traits - such as your gender, job, attitude or the way you write - it might be possible for someone to connect the dots and connect your pseudonymous personas with your real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': Your persona should have a job that is different from yours, but not so different that you don’t know anything about that field: for example, they shouldn’t be a surgeon if you don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select your persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': This could be identified through a &amp;quot;stylometric analysis&amp;quot; that makes it possible to identify the author of a particular text. To change this, you can start by using a spell-checker in your word processor to check for consistent typos and you could also think about adopting a different writing attitude. You could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': A good rule of thumb is to give your persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, you are able to weather the strikes and even have some fun in the process. &lt;br /&gt;
&lt;br /&gt;
In any case, you should always remember that on the internet, each one of your identities - even the one connected to your real name - is a “virtual” identity, and it is always better to decide what character traits you want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for your “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for your identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Once you have created several personas, it's important to keep them separate in both your physical and digital lives. While keeping notes on your identities might help ensure that you remember your story, there are technical measures you can take to make sure that your profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social media accounts''' for each of your identities. A good method is to always use different apps for each account/identity and, if possible, to separate your identities per device or operating system (see '''6. A different machine for each identity'''). &lt;br /&gt;
To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles. For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains you need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all you need is a '''disposable email address''' that you only need to use for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if you decide to have just one identity online, using disposable email addresses prevents sites from building up a history of your activities and ensures that if that account gets compromised you can simply delete it and create a new one, keeping your digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are: '''https://anonbox.net''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''.&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': ''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to your main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised you can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill your main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org).&lt;br /&gt;
&lt;br /&gt;
==== Commercial social platforms ====&lt;br /&gt;
&lt;br /&gt;
Whatever social networking platform you decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
Also be very careful about the '''profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for you in that social network, regardless of your privacy settings.&lt;br /&gt;
&lt;br /&gt;
Make sure your contacts do not overlap with your other identities, and your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when you interact with the platform using a GPS-enabled phone, but the network your computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
If you access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide your trails is to publish from your various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read: &lt;br /&gt;
* https://www.facebook.com/help/389849807718635 &lt;br /&gt;
* Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
It can be a good idea to follow, from your pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance your real identity from your pseudonymous identities, you can also write (and hashtag on Twitter) posts under your pseudonymous profiles about events that you are not attending, especially if they are taking place far away from you. It can also be fun to publish and then delete posts that look like you have exposed your identity, so as to further confuse anyone who may try to unmask you.&lt;br /&gt;
&lt;br /&gt;
==== Alternative social platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if our aim is to publicise as widely as possible an event we are organizing or a project we are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close our accounts if they find that our contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If we add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to our data, the best solution is to limit the use of commercial social networking platforms to specific projects we want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)], '''N-1''' 8https://n-1.cc/) and '''Crabgrass '''(https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so we way wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, we should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (eg related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, How is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can we choose to share our videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of our activity and information?&lt;br /&gt;
&lt;br /&gt;
==== Creating a blog or website ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com).  Based on it, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org/ http://noblogs.org) and Nadir’s '''BlackBlogs '''– (http://blackblogs.org/ http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see &amp;lt;nowiki/&amp;gt;https://www.autistici.org/en/links.html &amp;lt;nowiki/&amp;gt;and &amp;lt;nowiki/&amp;gt;https://blackblogs.org/policy &amp;lt;nowiki/&amp;gt;respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
If we want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, we can create our own website. For this we need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If we want to use our own '''domain''' name, bypassing payments and identifications may get difficult unless we use Bitcoin or another pseudonymous payment system. The personal data we will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, we can register our domain with the data of an association and use a prepaid credit card that is not connected to our own data (if available in our country). Alternatively, we can use a registrar like Gandi.net ([https://www.gandi.net/ https://www.gandi.net]) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting us; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic, approach is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that we want to secure.&lt;br /&gt;
&lt;br /&gt;
If we use the same operating system for our several identities, no matter how carefully we separate our profiles we can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile we have assigned to our 'real' identity, or get infected by a malware that allows our attacker to monitor everything we do online, with all our identities. Both risks can be limited by using a virtual machine for each of our domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on our physical computer. We can think of a VM as a ''computer within a computer''. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For our purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== Whonix' ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix '''(https://www.whonix.org) is an operating system that aims at protecting our anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. Whonix’s website offers a wide documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== Tails ====&lt;br /&gt;
&lt;br /&gt;
'''Tails''', or '''The Amnesic Incognito Live System''', a free and open-source Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections. When we launch Tails, we have a complete operating system that comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, we can access the internet, communicate, and do all we need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless we ask it to do so.&lt;br /&gt;
&lt;br /&gt;
==== Qubes OS ====&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' – https://www.qubes-os.org – is a free and open-source security-oriented operating system based on '''Fedora''', a Linux distribution, and '''Xen''', a virtual machine that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things we do on our computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, we can do everything on a single physical computer without having to worry that one successful cyberattack harms our whole system, potentially revealing all the connections among our several identities.&lt;br /&gt;
&lt;br /&gt;
==== What to choose ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described – Tails, Whonix and Qubes OS – allow us to use a completely separate operating system for managing our alternate identities, and can be quite useful to make sure that we don’t reveal our true identity while we use the anonymous one(s).&lt;br /&gt;
&lt;br /&gt;
Using '''Tails''' is pretty easy, and if what we need to do with our alternate persona needs a focus on ''anonymization'', then it may be worthwhile to overcome the initial obstacle. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. But if on the other hand we need ''persistence'' and we want to keep some files or actions we have created we need to enable this option when we start the system. Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what we need is both ''anonymity'' and ''security by isolation'' and we have a good machine – https://www.whonix.org/wiki/System_Requirements – where we can run Virtualbox and installing '''Whonix''', according to the number of our alternative identities it seems a good solution that caters to all our needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if we want to keep all our activities inside our own computer without having to install anything else and if what we are trying to do is to effectively ''separate'' our identities rather than anonymize our activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if we feel that we really need to protect ourselves against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protects us from every threat, and we shouldn’t look at them as a magic potion that will make us invulnerable. Nevertheless, by using any of them, according to our needs and resources, we will raise the level of effort that an attacker will need to harm us, thus making an attack less likely. For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&amp;lt;nowiki/&amp;gt;&amp;lt;nowiki/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1355</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1355"/>
				<updated>2015-05-28T10:44:09Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: /* Managing several identities */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
== Understanding digital shadows ==&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, it has also become a space where people who question or challenge dominant discourses - especially where those deal with gender and sexual orientation - are silenced, harassed and threatened. &lt;br /&gt;
&lt;br /&gt;
If you are active on the internet as women, human rights defenders, trans* or queer persons, and/or feminists, you'll probably want to make sure your privacy and security are protected as much as possible. &lt;br /&gt;
&lt;br /&gt;
A good place to start is by assessing the traces you are leaving behind on the internet, by getting to know your digital shadow and understanding how you organise your social domains and networks across your online and physical activities. &lt;br /&gt;
&lt;br /&gt;
The traces you leave online can tell very accurate stories about you; who you are, were you live and hang out; what you are interested in and who your friends and collaborators are. This information can expose you to several threats, including online harassment - particularly where the traces you leave behind are publicly available. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' you can use to take more control over your digital shadows - to increase your privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing your activity online.  &lt;br /&gt;
Some examples of these strategies and tools include controlling the amount of data you give away by consciously stripping valuable information from content and metadata; trying the art of self-doxing; and thinking about ways to play with and break up your online identity.&lt;br /&gt;
&lt;br /&gt;
Your digital shadow is the story data tells about you. This digital shadow is created by trillions of bits of data, left behind in the digital world when you connect to the internet, your mobile phones and your other online services. These digital shadows ultimately have a life of their own. They can be affected by others and can change in unpredictable ways. They grow continuously, and can be permanent, encompassing both your past and present activities. &lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' &lt;br /&gt;
The devices and the software you use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data. These bits of data can include your name, location, contacts, pictures, messages, tweets and likes, but also the brand of your computer, length of your phone calls and information about which websites you visit. These data traces can be put out there by yourself as well as by other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' &lt;br /&gt;
In some cases you '''actively '''share data – for example when you share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about you, by tagging you in pictures, mentioning you in tweets or simply by communicating with you. In other cases, you give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
&lt;br /&gt;
Your browsing habits and IP address are shared when you visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites you visit, and the information shared is collected for a wide range of purposes, from website analytics to advertising. Your mobile phone apps also collect data on you without your active knowledge or consent – for example, the photos you take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow you as you move from one service to another - from your internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in your readers to publishing pictures from the latest protest you covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of your messages, blogs, tweets and phone calls; it is your pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables your email to be delivered, files on your computer to be found and mobile communication to work. Metadata can include your email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the technological infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognised by computers.&lt;br /&gt;
&lt;br /&gt;
==== Who collects data? ====   &lt;br /&gt;
&lt;br /&gt;
You might wonder about the importance of one picture, one message, or one call. You might think there is so much data out there that nobody knows what to do with it, or cares that much about it. &lt;br /&gt;
&lt;br /&gt;
However, there are in reality a number of parties interested in this data - including companies, governments and individuals - and data collection and data analysis is by now very sophisticated. The data traces you leave behind online are constantly being collected, analysed and sorted by various parties to create profiles on you; and every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by these companies, governments and individuals for a variety of purposes. Profiles can be bought and sold;  data can be used to control, suppress or silence; it can be used to create harassment strategies. &lt;br /&gt;
&lt;br /&gt;
Data can be used to gain insight into who you are, what you do, where you have been and with whom you have been interacting. This information can then be used to make predictions on what you might do or where you might be in future. For example, if someone knows that you are an outspoken blogger on gender issues in country x, they know that you will probably be present at a conference on blogging and women held in that country. &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to your digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. &lt;br /&gt;
&lt;br /&gt;
You can't know exactly what is happening to our digital shadow, and that itself is a problem. Fortunately, there are many tools and tactics you can use to manage your digital shadows and to limit their ramifications in terms of profiling, control and surveillance. This will be discussed in the rest of this section. &lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
To move towards getting some control over your digital shadow, a good place to start is to see what it looks like (as far as is possible)&lt;br /&gt;
&lt;br /&gt;
* '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – is a tool launched by Tactical Tech that allows you to see what traces you are leaving online, and it offers a lot of tips on how to protect your privacy. &lt;br /&gt;
* Identifying and materialising social networks across your online and physical activities: John Fass, researcher and designer at the Royal College of Art, offers some activities for visualising your social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* A tool called '''OpenPaths.cc''' allows you to see through the eyes of your mobile phone. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone you can change the permissions for each app under its privacy setting. LINK?? &lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
The good news is that you can partly control what content and metadata you give away. When you publish content on the web, it is always a good idea to ask yourself if what you are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to your personal life, the names you mention or the images you upload may contribute to a picture about who you are, what you are doing, where you are doing it and so on. This could be used by people who wish to target you. &lt;br /&gt;
&lt;br /&gt;
This does not mean that you should silence yourself – by taking some basic measures, you can limit your risks by increasing the level of the effort that would be required to attack you or your contacts.&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like your IP address''', thereby increasing your anonymity online.&lt;br /&gt;
&lt;br /&gt;
* '''Use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about your life''', you can use private profiles that can only be accessed by selected contacts. When using those on commercial social media, you should be aware of the regular changes to the privacy policies of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web, you should ask yourself if the information you spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices. https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or '''Adblock Plus''', as well as by monitoring your privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not using your real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or you can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing metada from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
==== Self-Doxing ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet and constitute a type of social engineering technique. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find their flaws.&lt;br /&gt;
&amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;). Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser. Useful tips on self-doxing tools and techniques can be found here: &lt;br /&gt;
* https://lilithlela.cyberguerrilla.org/?page_id=93870  &lt;br /&gt;
* https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* Ubisoft’s '''Digital Shadow''' is a Facebook app which illustrates what third parties can know about you through your Facebook profile: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== Mapping our social domains ====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”. Everyone belongs to several '''social domains''' - your work or advocacy networks, your family networks, friends, and sports teams. Some networks may feel more secure than others. For example, you may tend to have a more secure communication practices for your work or advocacy activities, but less secure practices for interacting with friends on a social networking platform. &lt;br /&gt;
&lt;br /&gt;
If you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in a social networking platform that you like a particular kind of game, an attacker who wants to investigate your work or advocacy activities might trick you into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if your work identity and your gaming profile can be connected to the same person; and this is why separating your social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
To separate your social domains, it's helpful to first map them out and identify which ones could expose you most. You can do this by thinking about your different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
For instance, Polish computer security researcher Joanna Rutkowska has developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain, including her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the encrypted communication with her partner.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain includes the totally untrusted areas which don’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
You can find more details about her scheme here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
==== Deleting identities ====&lt;br /&gt;
&lt;br /&gt;
If you decide to separate your social domains by creating multiple identities, you should decide whether to delete or keep the identity or identities that you already have.  To do this, you can start by investigating the traces of your existing identity or identities. (For methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;). If you opt for deleting existing accounts, you can visit the following places:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitates the process of deleting social media profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once you have identified your different social domains and the digital activities and contacts that go with them, what you need to do is decide if you want to differentiate your identities accordingly, or if you'd rather stick to your official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
You may want to keep your work connected to your legal or &amp;quot;real&amp;quot; identity, or think that your activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social media, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific context the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once you have '''assessed our risk''', you can then consider different strategies for separating your identities online.  For more on assessing risk visit: https://ssd.eff.org/en/module/introduction-threat-modeling&lt;br /&gt;
&lt;br /&gt;
'''Strategies''' for maintaining separate identities can range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding (http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name) talks about her decision to start writing under her real name, dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously Vani, a human rights activist, writes]: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”.&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where you don't need to gain other people's trust, when there are few or no people you can trust, or when you don't want to expose others in your life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance, you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you, as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When you adopt anonymity as a strategy you may use pseudonyms, but these should not be used across different networks or social domains, and some may only be used once and then discarded. Because of this, anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. For more information on how to be anonymous online, see the security recommendations at the beginning of this manual and '''Anonymizing tools''' in Step0 in the wiki.&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. There are [[https://www.eff.org/deeplinks/2011/07/case-pseudonyms|myriad reasons why individuals may wish to use a name other than the one they were born with]]. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent harassment and discrimination or they may use a name that’s easier to pronounce or spell in a given culture. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot; applying a real name policy which typically means using your legal name or the name by which you are commonly known. This policy has caused many users to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that we can be reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is [https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community using a name-shaped pseudonym].&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers '''visibility''', which allows to network with others, and by pinning your voice to a particular name you can develop an '''online reputation'''. This depends on others to decide whether you are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to your legal identity, or not. The choice to connect your online reputation to your &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity.  &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice you make, what is important is that you keep your domains effectively separated. No matter how many domains you identify in your digital life, and how many corresponding identities you create, on the internet every identity - even the one bearing your real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example Tor or TAILS)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' You may think that deleting certain sensitive data from social networks and web services may be enough to protect yourself, but metadata cannot be deleted as easily. And using just one identity through your whole life - in all your work and personal domains - creates a bulk of information that makes it easier to profile you.&lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of your social domains. You might also choose to use your real identity in some areas, and your new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When you create a new identity, you should select the contacts for each one carefully, and avoid sharing contacts with other identities you use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* Your various identities should not linked to each other, or to your real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number.&lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be useful, as they can be discarded easily if compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be created for new acquaintances when appropriate as introductory profiles to get to know somebody before you include them in your more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgment on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If you want to use commercial social networking platforms, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that you use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once you have decided on a name, a surname, and a username for your virtual persona, you should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if you wish to develop your own reputation, you don’t want to be confused with someone else, especially if they don’t share your views of the world!&lt;br /&gt;
&lt;br /&gt;
Then you need to create a story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role. You can invent a new story if you feel particularly inspired or base your story on a “known” person’s story, a superhero, a fictional character from your favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when you create an identity you should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== Credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If you keep all your normal identifying traits - such as your gender, job, attitude or the way you write - it might be possible for someone to connect the dots and connect your pseudonymous personas with your real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': Your persona should have a job that is different from yours, but not so different that you don’t know anything about that field: for example, they shouldn’t be a surgeon if you don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select your persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': This could be identified through a &amp;quot;stylometric analysis&amp;quot; that makes it possible to identify the author of a particular text. To change this, you can start by using a spell-checker in your word processor to check for consistent typos and you could also think about adopting a different writing attitude. You could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': A good rule of thumb is to give your persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, you are able to weather the strikes and even have some fun in the process. &lt;br /&gt;
&lt;br /&gt;
In any case, you should always remember that on the internet, each one of your identities - even the one connected to your real name - is a “virtual” identity, and it is always better to decide what character traits you want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for your “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for your identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Once you have created several personas, it's important to keep them separate in both your physical and digital lives. While keeping notes on your identities might help ensure that you remember your story, there are technical measures you can take to make sure that your profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social media accounts''' for each of your identities. A good method is to always use different apps for each account/identity and, if possible, to separate your identities per device or operating system (see '''6. A different machine for each identity'''). &lt;br /&gt;
To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles. For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains you need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all you need is a '''disposable email address''' that you only need to use for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if you decide to have just one identity online, using disposable email addresses prevents sites from building up a history of your activities and ensures that if that account gets compromised you can simply delete it and create a new one, keeping your digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are: '''https://anonbox.net''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''.&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': ''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to your main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised you can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill your main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org).&lt;br /&gt;
&lt;br /&gt;
==== Commercial social platforms ====&lt;br /&gt;
&lt;br /&gt;
Whatever social networking platform you decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
Also be very careful about the '''profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for you in that social network, regardless of your privacy settings.&lt;br /&gt;
&lt;br /&gt;
Make sure your contacts do not overlap with your other identities, and your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when you interact with the platform using a GPS-enabled phone, but the network your computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
If we access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide our trails is to publish from our various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read: &lt;br /&gt;
* https://www.facebook.com/help/389849807718635 &lt;br /&gt;
* Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
It can be a good idea to follow, from our pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance our real identity from our pseudonymous identities, we can also write (and hashtag on Twitter) posts under our pseudonymous profiles about events that we are not attending, especially if they are taking place far away from us. It can also be fun to publish and then delete posts that look like we have exposed our identity, so as to further confuse anyone who may try to unmask us.&lt;br /&gt;
&lt;br /&gt;
==== Alternative social platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if our aim is to publicise as widely as possible an event we are organizing or a project we are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close our accounts if they find that our contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If we add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to our data, the best solution is to limit the use of commercial social networking platforms to specific projects we want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)], '''N-1''' 8https://n-1.cc/) and '''Crabgrass '''(https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so we way wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, we should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (eg related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, How is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can we choose to share our videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of our activity and information?&lt;br /&gt;
&lt;br /&gt;
==== Creating a blog or website ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com).  Based on it, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org/ http://noblogs.org) and Nadir’s '''BlackBlogs '''– (http://blackblogs.org/ http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see &amp;lt;nowiki/&amp;gt;https://www.autistici.org/en/links.html &amp;lt;nowiki/&amp;gt;and &amp;lt;nowiki/&amp;gt;https://blackblogs.org/policy &amp;lt;nowiki/&amp;gt;respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
If we want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, we can create our own website. For this we need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If we want to use our own '''domain''' name, bypassing payments and identifications may get difficult unless we use Bitcoin or another pseudonymous payment system. The personal data we will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, we can register our domain with the data of an association and use a prepaid credit card that is not connected to our own data (if available in our country). Alternatively, we can use a registrar like Gandi.net ([https://www.gandi.net/ https://www.gandi.net]) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting us; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic, approach is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that we want to secure.&lt;br /&gt;
&lt;br /&gt;
If we use the same operating system for our several identities, no matter how carefully we separate our profiles we can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile we have assigned to our 'real' identity, or get infected by a malware that allows our attacker to monitor everything we do online, with all our identities. Both risks can be limited by using a virtual machine for each of our domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on our physical computer. We can think of a VM as a ''computer within a computer''. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For our purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== Whonix' ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix '''(https://www.whonix.org) is an operating system that aims at protecting our anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. Whonix’s website offers a wide documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== Tails ====&lt;br /&gt;
&lt;br /&gt;
'''Tails''', or '''The Amnesic Incognito Live System''', a free and open-source Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections. When we launch Tails, we have a complete operating system that comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, we can access the internet, communicate, and do all we need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless we ask it to do so.&lt;br /&gt;
&lt;br /&gt;
==== Qubes OS ====&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' – https://www.qubes-os.org – is a free and open-source security-oriented operating system based on '''Fedora''', a Linux distribution, and '''Xen''', a virtual machine that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things we do on our computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, we can do everything on a single physical computer without having to worry that one successful cyberattack harms our whole system, potentially revealing all the connections among our several identities.&lt;br /&gt;
&lt;br /&gt;
==== What to choose ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described – Tails, Whonix and Qubes OS – allow us to use a completely separate operating system for managing our alternate identities, and can be quite useful to make sure that we don’t reveal our true identity while we use the anonymous one(s).&lt;br /&gt;
&lt;br /&gt;
Using '''Tails''' is pretty easy, and if what we need to do with our alternate persona needs a focus on ''anonymization'', then it may be worthwhile to overcome the initial obstacle. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. But if on the other hand we need ''persistence'' and we want to keep some files or actions we have created we need to enable this option when we start the system. Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what we need is both ''anonymity'' and ''security by isolation'' and we have a good machine – https://www.whonix.org/wiki/System_Requirements – where we can run Virtualbox and installing '''Whonix''', according to the number of our alternative identities it seems a good solution that caters to all our needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if we want to keep all our activities inside our own computer without having to install anything else and if what we are trying to do is to effectively ''separate'' our identities rather than anonymize our activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if we feel that we really need to protect ourselves against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protects us from every threat, and we shouldn’t look at them as a magic potion that will make us invulnerable. Nevertheless, by using any of them, according to our needs and resources, we will raise the level of effort that an attacker will need to harm us, thus making an attack less likely. For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&amp;lt;nowiki/&amp;gt;&amp;lt;nowiki/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1354</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1354"/>
				<updated>2015-05-28T10:35:15Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: /* Credible persona */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
== Understanding digital shadows ==&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, it has also become a space where people who question or challenge dominant discourses - especially where those deal with gender and sexual orientation - are silenced, harassed and threatened. &lt;br /&gt;
&lt;br /&gt;
If you are active on the internet as women, human rights defenders, trans* or queer persons, and/or feminists, you'll probably want to make sure your privacy and security are protected as much as possible. &lt;br /&gt;
&lt;br /&gt;
A good place to start is by assessing the traces you are leaving behind on the internet, by getting to know your digital shadow and understanding how you organise your social domains and networks across your online and physical activities. &lt;br /&gt;
&lt;br /&gt;
The traces you leave online can tell very accurate stories about you; who you are, were you live and hang out; what you are interested in and who your friends and collaborators are. This information can expose you to several threats, including online harassment - particularly where the traces you leave behind are publicly available. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' you can use to take more control over your digital shadows - to increase your privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing your activity online.  &lt;br /&gt;
Some examples of these strategies and tools include controlling the amount of data you give away by consciously stripping valuable information from content and metadata; trying the art of self-doxing; and thinking about ways to play with and break up your online identity.&lt;br /&gt;
&lt;br /&gt;
Your digital shadow is the story data tells about you. This digital shadow is created by trillions of bits of data, left behind in the digital world when you connect to the internet, your mobile phones and your other online services. These digital shadows ultimately have a life of their own. They can be affected by others and can change in unpredictable ways. They grow continuously, and can be permanent, encompassing both your past and present activities. &lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' &lt;br /&gt;
The devices and the software you use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data. These bits of data can include your name, location, contacts, pictures, messages, tweets and likes, but also the brand of your computer, length of your phone calls and information about which websites you visit. These data traces can be put out there by yourself as well as by other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' &lt;br /&gt;
In some cases you '''actively '''share data – for example when you share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about you, by tagging you in pictures, mentioning you in tweets or simply by communicating with you. In other cases, you give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
&lt;br /&gt;
Your browsing habits and IP address are shared when you visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites you visit, and the information shared is collected for a wide range of purposes, from website analytics to advertising. Your mobile phone apps also collect data on you without your active knowledge or consent – for example, the photos you take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow you as you move from one service to another - from your internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in your readers to publishing pictures from the latest protest you covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of your messages, blogs, tweets and phone calls; it is your pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables your email to be delivered, files on your computer to be found and mobile communication to work. Metadata can include your email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the technological infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognised by computers.&lt;br /&gt;
&lt;br /&gt;
==== Who collects data? ====   &lt;br /&gt;
&lt;br /&gt;
You might wonder about the importance of one picture, one message, or one call. You might think there is so much data out there that nobody knows what to do with it, or cares that much about it. &lt;br /&gt;
&lt;br /&gt;
However, there are in reality a number of parties interested in this data - including companies, governments and individuals - and data collection and data analysis is by now very sophisticated. The data traces you leave behind online are constantly being collected, analysed and sorted by various parties to create profiles on you; and every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by these companies, governments and individuals for a variety of purposes. Profiles can be bought and sold;  data can be used to control, suppress or silence; it can be used to create harassment strategies. &lt;br /&gt;
&lt;br /&gt;
Data can be used to gain insight into who you are, what you do, where you have been and with whom you have been interacting. This information can then be used to make predictions on what you might do or where you might be in future. For example, if someone knows that you are an outspoken blogger on gender issues in country x, they know that you will probably be present at a conference on blogging and women held in that country. &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to your digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. &lt;br /&gt;
&lt;br /&gt;
You can't know exactly what is happening to our digital shadow, and that itself is a problem. Fortunately, there are many tools and tactics you can use to manage your digital shadows and to limit their ramifications in terms of profiling, control and surveillance. This will be discussed in the rest of this section. &lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
To move towards getting some control over your digital shadow, a good place to start is to see what it looks like (as far as is possible)&lt;br /&gt;
&lt;br /&gt;
* '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – is a tool launched by Tactical Tech that allows you to see what traces you are leaving online, and it offers a lot of tips on how to protect your privacy. &lt;br /&gt;
* Identifying and materialising social networks across your online and physical activities: John Fass, researcher and designer at the Royal College of Art, offers some activities for visualising your social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* A tool called '''OpenPaths.cc''' allows you to see through the eyes of your mobile phone. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone you can change the permissions for each app under its privacy setting. LINK?? &lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
The good news is that you can partly control what content and metadata you give away. When you publish content on the web, it is always a good idea to ask yourself if what you are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to your personal life, the names you mention or the images you upload may contribute to a picture about who you are, what you are doing, where you are doing it and so on. This could be used by people who wish to target you. &lt;br /&gt;
&lt;br /&gt;
This does not mean that you should silence yourself – by taking some basic measures, you can limit your risks by increasing the level of the effort that would be required to attack you or your contacts.&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like your IP address''', thereby increasing your anonymity online.&lt;br /&gt;
&lt;br /&gt;
* '''Use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about your life''', you can use private profiles that can only be accessed by selected contacts. When using those on commercial social media, you should be aware of the regular changes to the privacy policies of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web, you should ask yourself if the information you spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices. https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or '''Adblock Plus''', as well as by monitoring your privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not using your real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or you can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing metada from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
==== Self-Doxing ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet and constitute a type of social engineering technique. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find their flaws.&lt;br /&gt;
&amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;). Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser. Useful tips on self-doxing tools and techniques can be found here: &lt;br /&gt;
* https://lilithlela.cyberguerrilla.org/?page_id=93870  &lt;br /&gt;
* https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* Ubisoft’s '''Digital Shadow''' is a Facebook app which illustrates what third parties can know about you through your Facebook profile: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== Mapping our social domains ====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”. Everyone belongs to several '''social domains''' - your work or advocacy networks, your family networks, friends, and sports teams. Some networks may feel more secure than others. For example, you may tend to have a more secure communication practices for your work or advocacy activities, but less secure practices for interacting with friends on a social networking platform. &lt;br /&gt;
&lt;br /&gt;
If you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in a social networking platform that you like a particular kind of game, an attacker who wants to investigate your work or advocacy activities might trick you into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if your work identity and your gaming profile can be connected to the same person; and this is why separating your social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
To separate your social domains, it's helpful to first map them out and identify which ones could expose you most. You can do this by thinking about your different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
For instance, Polish computer security researcher Joanna Rutkowska has developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain, including her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the encrypted communication with her partner.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain includes the totally untrusted areas which don’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
You can find more details about her scheme here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
==== Deleting identities ====&lt;br /&gt;
&lt;br /&gt;
If you decide to separate your social domains by creating multiple identities, you should decide whether to delete or keep the identity or identities that you already have.  To do this, you can start by investigating the traces of your existing identity or identities. (For methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;). If you opt for deleting existing accounts, you can visit the following places:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitates the process of deleting social media profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once you have identified your different social domains and the digital activities and contacts that go with them, what you need to do is decide if you want to differentiate your identities accordingly, or if you'd rather stick to your official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
You may want to keep your work connected to your legal or &amp;quot;real&amp;quot; identity, or think that your activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social media, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific context the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once you have '''assessed our risk''', you can then consider different strategies for separating your identities online.  For more on assessing risk visit: https://ssd.eff.org/en/module/introduction-threat-modeling&lt;br /&gt;
&lt;br /&gt;
'''Strategies''' for maintaining separate identities can range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding (http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name) talks about her decision to start writing under her real name, dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously Vani, a human rights activist, writes]: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”.&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where you don't need to gain other people's trust, when there are few or no people you can trust, or when you don't want to expose others in your life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance, you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you, as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When you adopt anonymity as a strategy you may use pseudonyms, but these should not be used across different networks or social domains, and some may only be used once and then discarded. Because of this, anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. For more information on how to be anonymous online, see the security recommendations at the beginning of this manual and '''Anonymizing tools''' in Step0 in the wiki.&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. There are [[https://www.eff.org/deeplinks/2011/07/case-pseudonyms|myriad reasons why individuals may wish to use a name other than the one they were born with]]. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent harassment and discrimination or they may use a name that’s easier to pronounce or spell in a given culture. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot; applying a real name policy which typically means using your legal name or the name by which you are commonly known. This policy has caused many users to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that we can be reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is [https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community using a name-shaped pseudonym].&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers '''visibility''', which allows to network with others, and by pinning your voice to a particular name you can develop an '''online reputation'''. This depends on others to decide whether you are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to your legal identity, or not. The choice to connect your online reputation to your &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity.  &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice you make, what is important is that you keep your domains effectively separated. No matter how many domains you identify in your digital life, and how many corresponding identities you create, on the internet every identity - even the one bearing your real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example Tor or TAILS)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' You may think that deleting certain sensitive data from social networks and web services may be enough to protect yourself, but metadata cannot be deleted as easily. And using just one identity through your whole life - in all your work and personal domains - creates a bulk of information that makes it easier to profile you.&lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of your social domains. You might also choose to use your real identity in some areas, and your new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When you create a new identity, you should select the contacts for each one carefully, and avoid sharing contacts with other identities you use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* Your various identities should not linked to each other, or to your real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number.&lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be useful, as they can be discarded easily if compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be created for new acquaintances when appropriate as introductory profiles to get to know somebody before you include them in your more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgment on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If you want to use commercial social networking platforms, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that you use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once you have decided on a name, a surname, and a username for your virtual persona, you should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if you wish to develop your own reputation, you don’t want to be confused with someone else, especially if they don’t share your views of the world!&lt;br /&gt;
&lt;br /&gt;
Then you need to create a story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role. You can invent a new story if you feel particularly inspired or base your story on a “known” person’s story, a superhero, a fictional character from your favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when you create an identity you should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== Credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If you keep all your normal identifying traits - such as your gender, job, attitude or the way you write - it might be possible for someone to connect the dots and connect your pseudonymous personas with your real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': Your persona should have a job that is different from yours, but not so different that you don’t know anything about that field: for example, they shouldn’t be a surgeon if you don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select your persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': This could be identified through a &amp;quot;stylometric analysis&amp;quot; that makes it possible to identify the author of a particular text. To change this, you can start by using a spell-checker in your word processor to check for consistent typos and you could also think about adopting a different writing attitude. You could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': A good rule of thumb is to give your persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, you are able to weather the strikes and even have some fun in the process. &lt;br /&gt;
&lt;br /&gt;
In any case, you should always remember that on the internet, each one of your identities - even the one connected to your real name - is a “virtual” identity, and it is always better to decide what character traits you want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for your “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for your identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Once we have created several personas, it's important keep them separate in both our physical and digital lives. While keeping notes on our identities might help ensure that we remember our story, there are technical measures we can take to make sure that our profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social network accounts''' for each of our identities. A good method is to always use different apps for each account/identity and, if possible, to separate our identities per device or operating system (see '''6. A different machine for each identity'''). &lt;br /&gt;
To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles  . For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains we need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all we need is a '''disposable email address''' that we only need to use for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if we decide to have just one identity online, using disposable email addresses prevents sites from building up a history of our activities and ensures that if that account gets compromised we can simply delete it and create a new one, keeping our digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are:''' '''https://anonbox.net'''&amp;lt;nowiki/&amp;gt;''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': ''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to our main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised we can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill our main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org).&lt;br /&gt;
&lt;br /&gt;
==== Commercial social platforms ====&lt;br /&gt;
&lt;br /&gt;
Whatever social networking platform we decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
Also be very careful about the''' profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for us in that social network, regardless of our privacy settings.&lt;br /&gt;
&lt;br /&gt;
Make sure your contacts do not overlap with your other identities, and to make sure your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when we interact with the platform using a GPS-enabled phone, but the network our computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
If we access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide our trails is to publish from our various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read: &lt;br /&gt;
* https://www.facebook.com/help/389849807718635 &lt;br /&gt;
* Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
It can be a good idea to follow, from our pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance our real identity from our pseudonymous identities, we can also write (and hashtag on Twitter) posts under our pseudonymous profiles about events that we are not attending, especially if they are taking place far away from us. It can also be fun to publish and then delete posts that look like we have exposed our identity, so as to further confuse anyone who may try to unmask us.&lt;br /&gt;
&lt;br /&gt;
==== Alternative social platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if our aim is to publicise as widely as possible an event we are organizing or a project we are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close our accounts if they find that our contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If we add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to our data, the best solution is to limit the use of commercial social networking platforms to specific projects we want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)], '''N-1''' 8https://n-1.cc/) and '''Crabgrass '''(https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so we way wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, we should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (eg related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, How is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can we choose to share our videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of our activity and information?&lt;br /&gt;
&lt;br /&gt;
==== Creating a blog or website ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com).  Based on it, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org/ http://noblogs.org) and Nadir’s '''BlackBlogs '''– (http://blackblogs.org/ http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see &amp;lt;nowiki/&amp;gt;https://www.autistici.org/en/links.html &amp;lt;nowiki/&amp;gt;and &amp;lt;nowiki/&amp;gt;https://blackblogs.org/policy &amp;lt;nowiki/&amp;gt;respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
If we want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, we can create our own website. For this we need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If we want to use our own '''domain''' name, bypassing payments and identifications may get difficult unless we use Bitcoin or another pseudonymous payment system. The personal data we will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, we can register our domain with the data of an association and use a prepaid credit card that is not connected to our own data (if available in our country). Alternatively, we can use a registrar like Gandi.net ([https://www.gandi.net/ https://www.gandi.net]) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting us; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic, approach is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that we want to secure.&lt;br /&gt;
&lt;br /&gt;
If we use the same operating system for our several identities, no matter how carefully we separate our profiles we can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile we have assigned to our 'real' identity, or get infected by a malware that allows our attacker to monitor everything we do online, with all our identities. Both risks can be limited by using a virtual machine for each of our domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on our physical computer. We can think of a VM as a ''computer within a computer''. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For our purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== Whonix' ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix '''(https://www.whonix.org) is an operating system that aims at protecting our anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. Whonix’s website offers a wide documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== Tails ====&lt;br /&gt;
&lt;br /&gt;
'''Tails''', or '''The Amnesic Incognito Live System''', a free and open-source Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections. When we launch Tails, we have a complete operating system that comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, we can access the internet, communicate, and do all we need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless we ask it to do so.&lt;br /&gt;
&lt;br /&gt;
==== Qubes OS ====&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' – https://www.qubes-os.org – is a free and open-source security-oriented operating system based on '''Fedora''', a Linux distribution, and '''Xen''', a virtual machine that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things we do on our computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, we can do everything on a single physical computer without having to worry that one successful cyberattack harms our whole system, potentially revealing all the connections among our several identities.&lt;br /&gt;
&lt;br /&gt;
==== What to choose ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described – Tails, Whonix and Qubes OS – allow us to use a completely separate operating system for managing our alternate identities, and can be quite useful to make sure that we don’t reveal our true identity while we use the anonymous one(s).&lt;br /&gt;
&lt;br /&gt;
Using '''Tails''' is pretty easy, and if what we need to do with our alternate persona needs a focus on ''anonymization'', then it may be worthwhile to overcome the initial obstacle. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. But if on the other hand we need ''persistence'' and we want to keep some files or actions we have created we need to enable this option when we start the system. Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what we need is both ''anonymity'' and ''security by isolation'' and we have a good machine – https://www.whonix.org/wiki/System_Requirements – where we can run Virtualbox and installing '''Whonix''', according to the number of our alternative identities it seems a good solution that caters to all our needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if we want to keep all our activities inside our own computer without having to install anything else and if what we are trying to do is to effectively ''separate'' our identities rather than anonymize our activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if we feel that we really need to protect ourselves against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protects us from every threat, and we shouldn’t look at them as a magic potion that will make us invulnerable. Nevertheless, by using any of them, according to our needs and resources, we will raise the level of effort that an attacker will need to harm us, thus making an attack less likely. For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&amp;lt;nowiki/&amp;gt;&amp;lt;nowiki/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1353</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1353"/>
				<updated>2015-05-28T10:34:40Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: /* Credible persona */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
== Understanding digital shadows ==&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, it has also become a space where people who question or challenge dominant discourses - especially where those deal with gender and sexual orientation - are silenced, harassed and threatened. &lt;br /&gt;
&lt;br /&gt;
If you are active on the internet as women, human rights defenders, trans* or queer persons, and/or feminists, you'll probably want to make sure your privacy and security are protected as much as possible. &lt;br /&gt;
&lt;br /&gt;
A good place to start is by assessing the traces you are leaving behind on the internet, by getting to know your digital shadow and understanding how you organise your social domains and networks across your online and physical activities. &lt;br /&gt;
&lt;br /&gt;
The traces you leave online can tell very accurate stories about you; who you are, were you live and hang out; what you are interested in and who your friends and collaborators are. This information can expose you to several threats, including online harassment - particularly where the traces you leave behind are publicly available. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' you can use to take more control over your digital shadows - to increase your privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing your activity online.  &lt;br /&gt;
Some examples of these strategies and tools include controlling the amount of data you give away by consciously stripping valuable information from content and metadata; trying the art of self-doxing; and thinking about ways to play with and break up your online identity.&lt;br /&gt;
&lt;br /&gt;
Your digital shadow is the story data tells about you. This digital shadow is created by trillions of bits of data, left behind in the digital world when you connect to the internet, your mobile phones and your other online services. These digital shadows ultimately have a life of their own. They can be affected by others and can change in unpredictable ways. They grow continuously, and can be permanent, encompassing both your past and present activities. &lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' &lt;br /&gt;
The devices and the software you use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data. These bits of data can include your name, location, contacts, pictures, messages, tweets and likes, but also the brand of your computer, length of your phone calls and information about which websites you visit. These data traces can be put out there by yourself as well as by other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' &lt;br /&gt;
In some cases you '''actively '''share data – for example when you share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about you, by tagging you in pictures, mentioning you in tweets or simply by communicating with you. In other cases, you give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
&lt;br /&gt;
Your browsing habits and IP address are shared when you visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites you visit, and the information shared is collected for a wide range of purposes, from website analytics to advertising. Your mobile phone apps also collect data on you without your active knowledge or consent – for example, the photos you take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow you as you move from one service to another - from your internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in your readers to publishing pictures from the latest protest you covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of your messages, blogs, tweets and phone calls; it is your pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables your email to be delivered, files on your computer to be found and mobile communication to work. Metadata can include your email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the technological infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognised by computers.&lt;br /&gt;
&lt;br /&gt;
==== Who collects data? ====   &lt;br /&gt;
&lt;br /&gt;
You might wonder about the importance of one picture, one message, or one call. You might think there is so much data out there that nobody knows what to do with it, or cares that much about it. &lt;br /&gt;
&lt;br /&gt;
However, there are in reality a number of parties interested in this data - including companies, governments and individuals - and data collection and data analysis is by now very sophisticated. The data traces you leave behind online are constantly being collected, analysed and sorted by various parties to create profiles on you; and every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by these companies, governments and individuals for a variety of purposes. Profiles can be bought and sold;  data can be used to control, suppress or silence; it can be used to create harassment strategies. &lt;br /&gt;
&lt;br /&gt;
Data can be used to gain insight into who you are, what you do, where you have been and with whom you have been interacting. This information can then be used to make predictions on what you might do or where you might be in future. For example, if someone knows that you are an outspoken blogger on gender issues in country x, they know that you will probably be present at a conference on blogging and women held in that country. &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to your digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. &lt;br /&gt;
&lt;br /&gt;
You can't know exactly what is happening to our digital shadow, and that itself is a problem. Fortunately, there are many tools and tactics you can use to manage your digital shadows and to limit their ramifications in terms of profiling, control and surveillance. This will be discussed in the rest of this section. &lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
To move towards getting some control over your digital shadow, a good place to start is to see what it looks like (as far as is possible)&lt;br /&gt;
&lt;br /&gt;
* '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – is a tool launched by Tactical Tech that allows you to see what traces you are leaving online, and it offers a lot of tips on how to protect your privacy. &lt;br /&gt;
* Identifying and materialising social networks across your online and physical activities: John Fass, researcher and designer at the Royal College of Art, offers some activities for visualising your social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* A tool called '''OpenPaths.cc''' allows you to see through the eyes of your mobile phone. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone you can change the permissions for each app under its privacy setting. LINK?? &lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
The good news is that you can partly control what content and metadata you give away. When you publish content on the web, it is always a good idea to ask yourself if what you are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to your personal life, the names you mention or the images you upload may contribute to a picture about who you are, what you are doing, where you are doing it and so on. This could be used by people who wish to target you. &lt;br /&gt;
&lt;br /&gt;
This does not mean that you should silence yourself – by taking some basic measures, you can limit your risks by increasing the level of the effort that would be required to attack you or your contacts.&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like your IP address''', thereby increasing your anonymity online.&lt;br /&gt;
&lt;br /&gt;
* '''Use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about your life''', you can use private profiles that can only be accessed by selected contacts. When using those on commercial social media, you should be aware of the regular changes to the privacy policies of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web, you should ask yourself if the information you spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices. https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or '''Adblock Plus''', as well as by monitoring your privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not using your real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or you can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing metada from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
==== Self-Doxing ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet and constitute a type of social engineering technique. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find their flaws.&lt;br /&gt;
&amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;). Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser. Useful tips on self-doxing tools and techniques can be found here: &lt;br /&gt;
* https://lilithlela.cyberguerrilla.org/?page_id=93870  &lt;br /&gt;
* https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* Ubisoft’s '''Digital Shadow''' is a Facebook app which illustrates what third parties can know about you through your Facebook profile: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== Mapping our social domains ====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”. Everyone belongs to several '''social domains''' - your work or advocacy networks, your family networks, friends, and sports teams. Some networks may feel more secure than others. For example, you may tend to have a more secure communication practices for your work or advocacy activities, but less secure practices for interacting with friends on a social networking platform. &lt;br /&gt;
&lt;br /&gt;
If you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in a social networking platform that you like a particular kind of game, an attacker who wants to investigate your work or advocacy activities might trick you into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if your work identity and your gaming profile can be connected to the same person; and this is why separating your social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
To separate your social domains, it's helpful to first map them out and identify which ones could expose you most. You can do this by thinking about your different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
For instance, Polish computer security researcher Joanna Rutkowska has developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain, including her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the encrypted communication with her partner.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain includes the totally untrusted areas which don’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
You can find more details about her scheme here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
==== Deleting identities ====&lt;br /&gt;
&lt;br /&gt;
If you decide to separate your social domains by creating multiple identities, you should decide whether to delete or keep the identity or identities that you already have.  To do this, you can start by investigating the traces of your existing identity or identities. (For methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;). If you opt for deleting existing accounts, you can visit the following places:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitates the process of deleting social media profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once you have identified your different social domains and the digital activities and contacts that go with them, what you need to do is decide if you want to differentiate your identities accordingly, or if you'd rather stick to your official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
You may want to keep your work connected to your legal or &amp;quot;real&amp;quot; identity, or think that your activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social media, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific context the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once you have '''assessed our risk''', you can then consider different strategies for separating your identities online.  For more on assessing risk visit: https://ssd.eff.org/en/module/introduction-threat-modeling&lt;br /&gt;
&lt;br /&gt;
'''Strategies''' for maintaining separate identities can range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding (http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name) talks about her decision to start writing under her real name, dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously Vani, a human rights activist, writes]: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”.&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where you don't need to gain other people's trust, when there are few or no people you can trust, or when you don't want to expose others in your life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance, you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you, as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When you adopt anonymity as a strategy you may use pseudonyms, but these should not be used across different networks or social domains, and some may only be used once and then discarded. Because of this, anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. For more information on how to be anonymous online, see the security recommendations at the beginning of this manual and '''Anonymizing tools''' in Step0 in the wiki.&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. There are [[https://www.eff.org/deeplinks/2011/07/case-pseudonyms|myriad reasons why individuals may wish to use a name other than the one they were born with]]. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent harassment and discrimination or they may use a name that’s easier to pronounce or spell in a given culture. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot; applying a real name policy which typically means using your legal name or the name by which you are commonly known. This policy has caused many users to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that we can be reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is [https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community using a name-shaped pseudonym].&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers '''visibility''', which allows to network with others, and by pinning your voice to a particular name you can develop an '''online reputation'''. This depends on others to decide whether you are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to your legal identity, or not. The choice to connect your online reputation to your &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity.  &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice you make, what is important is that you keep your domains effectively separated. No matter how many domains you identify in your digital life, and how many corresponding identities you create, on the internet every identity - even the one bearing your real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example Tor or TAILS)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' You may think that deleting certain sensitive data from social networks and web services may be enough to protect yourself, but metadata cannot be deleted as easily. And using just one identity through your whole life - in all your work and personal domains - creates a bulk of information that makes it easier to profile you.&lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of your social domains. You might also choose to use your real identity in some areas, and your new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When you create a new identity, you should select the contacts for each one carefully, and avoid sharing contacts with other identities you use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* Your various identities should not linked to each other, or to your real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number.&lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be useful, as they can be discarded easily if compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be created for new acquaintances when appropriate as introductory profiles to get to know somebody before you include them in your more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgment on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If you want to use commercial social networking platforms, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that you use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once you have decided on a name, a surname, and a username for your virtual persona, you should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if you wish to develop your own reputation, you don’t want to be confused with someone else, especially if they don’t share your views of the world!&lt;br /&gt;
&lt;br /&gt;
Then you need to create a story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role. You can invent a new story if you feel particularly inspired or base your story on a “known” person’s story, a superhero, a fictional character from your favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when you create an identity you should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== Credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If you keep all your normal identifying traits - such as your gender, job, attitude or the way you write - it might be possible for someone to connect the dots and connect your pseudonymous personas with your real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': Your persona should have a job that is different from yours, but not so different that you don’t know anything about that field: for example, they shouldn’t be a surgeon if you don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select your persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': This could be identified through a &amp;quot;stylometric analysis&amp;quot; that makes it possible to identify the author of a particular text. To change this, you can start by using a spell-checker in your word processor to check for consistent typos and you could also think about adopting a different writing attitude. You could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': A good rule of thumb is to give your persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, you are able to weather the strikes and even have some fun in the process. &lt;br /&gt;
&lt;br /&gt;
In any case, you should always remember that on the internet, each one of your identities - even the one connected to your real name - is a “virtual” identity, and it is always better to decide what character traits you want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for your “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for our identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Once we have created several personas, it's important keep them separate in both our physical and digital lives. While keeping notes on our identities might help ensure that we remember our story, there are technical measures we can take to make sure that our profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social network accounts''' for each of our identities. A good method is to always use different apps for each account/identity and, if possible, to separate our identities per device or operating system (see '''6. A different machine for each identity'''). &lt;br /&gt;
To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles  . For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains we need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all we need is a '''disposable email address''' that we only need to use for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if we decide to have just one identity online, using disposable email addresses prevents sites from building up a history of our activities and ensures that if that account gets compromised we can simply delete it and create a new one, keeping our digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are:''' '''https://anonbox.net'''&amp;lt;nowiki/&amp;gt;''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': ''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to our main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised we can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill our main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org).&lt;br /&gt;
&lt;br /&gt;
==== Commercial social platforms ====&lt;br /&gt;
&lt;br /&gt;
Whatever social networking platform we decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
Also be very careful about the''' profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for us in that social network, regardless of our privacy settings.&lt;br /&gt;
&lt;br /&gt;
Make sure your contacts do not overlap with your other identities, and to make sure your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when we interact with the platform using a GPS-enabled phone, but the network our computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
If we access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide our trails is to publish from our various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read: &lt;br /&gt;
* https://www.facebook.com/help/389849807718635 &lt;br /&gt;
* Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
It can be a good idea to follow, from our pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance our real identity from our pseudonymous identities, we can also write (and hashtag on Twitter) posts under our pseudonymous profiles about events that we are not attending, especially if they are taking place far away from us. It can also be fun to publish and then delete posts that look like we have exposed our identity, so as to further confuse anyone who may try to unmask us.&lt;br /&gt;
&lt;br /&gt;
==== Alternative social platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if our aim is to publicise as widely as possible an event we are organizing or a project we are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close our accounts if they find that our contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If we add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to our data, the best solution is to limit the use of commercial social networking platforms to specific projects we want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)], '''N-1''' 8https://n-1.cc/) and '''Crabgrass '''(https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so we way wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, we should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (eg related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, How is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can we choose to share our videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of our activity and information?&lt;br /&gt;
&lt;br /&gt;
==== Creating a blog or website ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com).  Based on it, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org/ http://noblogs.org) and Nadir’s '''BlackBlogs '''– (http://blackblogs.org/ http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see &amp;lt;nowiki/&amp;gt;https://www.autistici.org/en/links.html &amp;lt;nowiki/&amp;gt;and &amp;lt;nowiki/&amp;gt;https://blackblogs.org/policy &amp;lt;nowiki/&amp;gt;respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
If we want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, we can create our own website. For this we need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If we want to use our own '''domain''' name, bypassing payments and identifications may get difficult unless we use Bitcoin or another pseudonymous payment system. The personal data we will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, we can register our domain with the data of an association and use a prepaid credit card that is not connected to our own data (if available in our country). Alternatively, we can use a registrar like Gandi.net ([https://www.gandi.net/ https://www.gandi.net]) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting us; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic, approach is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that we want to secure.&lt;br /&gt;
&lt;br /&gt;
If we use the same operating system for our several identities, no matter how carefully we separate our profiles we can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile we have assigned to our 'real' identity, or get infected by a malware that allows our attacker to monitor everything we do online, with all our identities. Both risks can be limited by using a virtual machine for each of our domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on our physical computer. We can think of a VM as a ''computer within a computer''. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For our purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== Whonix' ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix '''(https://www.whonix.org) is an operating system that aims at protecting our anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. Whonix’s website offers a wide documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== Tails ====&lt;br /&gt;
&lt;br /&gt;
'''Tails''', or '''The Amnesic Incognito Live System''', a free and open-source Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections. When we launch Tails, we have a complete operating system that comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, we can access the internet, communicate, and do all we need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless we ask it to do so.&lt;br /&gt;
&lt;br /&gt;
==== Qubes OS ====&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' – https://www.qubes-os.org – is a free and open-source security-oriented operating system based on '''Fedora''', a Linux distribution, and '''Xen''', a virtual machine that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things we do on our computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, we can do everything on a single physical computer without having to worry that one successful cyberattack harms our whole system, potentially revealing all the connections among our several identities.&lt;br /&gt;
&lt;br /&gt;
==== What to choose ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described – Tails, Whonix and Qubes OS – allow us to use a completely separate operating system for managing our alternate identities, and can be quite useful to make sure that we don’t reveal our true identity while we use the anonymous one(s).&lt;br /&gt;
&lt;br /&gt;
Using '''Tails''' is pretty easy, and if what we need to do with our alternate persona needs a focus on ''anonymization'', then it may be worthwhile to overcome the initial obstacle. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. But if on the other hand we need ''persistence'' and we want to keep some files or actions we have created we need to enable this option when we start the system. Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what we need is both ''anonymity'' and ''security by isolation'' and we have a good machine – https://www.whonix.org/wiki/System_Requirements – where we can run Virtualbox and installing '''Whonix''', according to the number of our alternative identities it seems a good solution that caters to all our needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if we want to keep all our activities inside our own computer without having to install anything else and if what we are trying to do is to effectively ''separate'' our identities rather than anonymize our activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if we feel that we really need to protect ourselves against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protects us from every threat, and we shouldn’t look at them as a magic potion that will make us invulnerable. Nevertheless, by using any of them, according to our needs and resources, we will raise the level of effort that an attacker will need to harm us, thus making an attack less likely. For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&amp;lt;nowiki/&amp;gt;&amp;lt;nowiki/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1352</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1352"/>
				<updated>2015-05-28T10:31:19Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: /* What’s in a name ? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
== Understanding digital shadows ==&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, it has also become a space where people who question or challenge dominant discourses - especially where those deal with gender and sexual orientation - are silenced, harassed and threatened. &lt;br /&gt;
&lt;br /&gt;
If you are active on the internet as women, human rights defenders, trans* or queer persons, and/or feminists, you'll probably want to make sure your privacy and security are protected as much as possible. &lt;br /&gt;
&lt;br /&gt;
A good place to start is by assessing the traces you are leaving behind on the internet, by getting to know your digital shadow and understanding how you organise your social domains and networks across your online and physical activities. &lt;br /&gt;
&lt;br /&gt;
The traces you leave online can tell very accurate stories about you; who you are, were you live and hang out; what you are interested in and who your friends and collaborators are. This information can expose you to several threats, including online harassment - particularly where the traces you leave behind are publicly available. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' you can use to take more control over your digital shadows - to increase your privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing your activity online.  &lt;br /&gt;
Some examples of these strategies and tools include controlling the amount of data you give away by consciously stripping valuable information from content and metadata; trying the art of self-doxing; and thinking about ways to play with and break up your online identity.&lt;br /&gt;
&lt;br /&gt;
Your digital shadow is the story data tells about you. This digital shadow is created by trillions of bits of data, left behind in the digital world when you connect to the internet, your mobile phones and your other online services. These digital shadows ultimately have a life of their own. They can be affected by others and can change in unpredictable ways. They grow continuously, and can be permanent, encompassing both your past and present activities. &lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' &lt;br /&gt;
The devices and the software you use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data. These bits of data can include your name, location, contacts, pictures, messages, tweets and likes, but also the brand of your computer, length of your phone calls and information about which websites you visit. These data traces can be put out there by yourself as well as by other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' &lt;br /&gt;
In some cases you '''actively '''share data – for example when you share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about you, by tagging you in pictures, mentioning you in tweets or simply by communicating with you. In other cases, you give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
&lt;br /&gt;
Your browsing habits and IP address are shared when you visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites you visit, and the information shared is collected for a wide range of purposes, from website analytics to advertising. Your mobile phone apps also collect data on you without your active knowledge or consent – for example, the photos you take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow you as you move from one service to another - from your internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in your readers to publishing pictures from the latest protest you covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of your messages, blogs, tweets and phone calls; it is your pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables your email to be delivered, files on your computer to be found and mobile communication to work. Metadata can include your email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the technological infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognised by computers.&lt;br /&gt;
&lt;br /&gt;
==== Who collects data? ====   &lt;br /&gt;
&lt;br /&gt;
You might wonder about the importance of one picture, one message, or one call. You might think there is so much data out there that nobody knows what to do with it, or cares that much about it. &lt;br /&gt;
&lt;br /&gt;
However, there are in reality a number of parties interested in this data - including companies, governments and individuals - and data collection and data analysis is by now very sophisticated. The data traces you leave behind online are constantly being collected, analysed and sorted by various parties to create profiles on you; and every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by these companies, governments and individuals for a variety of purposes. Profiles can be bought and sold;  data can be used to control, suppress or silence; it can be used to create harassment strategies. &lt;br /&gt;
&lt;br /&gt;
Data can be used to gain insight into who you are, what you do, where you have been and with whom you have been interacting. This information can then be used to make predictions on what you might do or where you might be in future. For example, if someone knows that you are an outspoken blogger on gender issues in country x, they know that you will probably be present at a conference on blogging and women held in that country. &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to your digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. &lt;br /&gt;
&lt;br /&gt;
You can't know exactly what is happening to our digital shadow, and that itself is a problem. Fortunately, there are many tools and tactics you can use to manage your digital shadows and to limit their ramifications in terms of profiling, control and surveillance. This will be discussed in the rest of this section. &lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
To move towards getting some control over your digital shadow, a good place to start is to see what it looks like (as far as is possible)&lt;br /&gt;
&lt;br /&gt;
* '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – is a tool launched by Tactical Tech that allows you to see what traces you are leaving online, and it offers a lot of tips on how to protect your privacy. &lt;br /&gt;
* Identifying and materialising social networks across your online and physical activities: John Fass, researcher and designer at the Royal College of Art, offers some activities for visualising your social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* A tool called '''OpenPaths.cc''' allows you to see through the eyes of your mobile phone. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone you can change the permissions for each app under its privacy setting. LINK?? &lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
The good news is that you can partly control what content and metadata you give away. When you publish content on the web, it is always a good idea to ask yourself if what you are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to your personal life, the names you mention or the images you upload may contribute to a picture about who you are, what you are doing, where you are doing it and so on. This could be used by people who wish to target you. &lt;br /&gt;
&lt;br /&gt;
This does not mean that you should silence yourself – by taking some basic measures, you can limit your risks by increasing the level of the effort that would be required to attack you or your contacts.&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like your IP address''', thereby increasing your anonymity online.&lt;br /&gt;
&lt;br /&gt;
* '''Use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about your life''', you can use private profiles that can only be accessed by selected contacts. When using those on commercial social media, you should be aware of the regular changes to the privacy policies of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web, you should ask yourself if the information you spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices. https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or '''Adblock Plus''', as well as by monitoring your privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not using your real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or you can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing metada from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
==== Self-Doxing ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet and constitute a type of social engineering technique. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find their flaws.&lt;br /&gt;
&amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;). Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser. Useful tips on self-doxing tools and techniques can be found here: &lt;br /&gt;
* https://lilithlela.cyberguerrilla.org/?page_id=93870  &lt;br /&gt;
* https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* Ubisoft’s '''Digital Shadow''' is a Facebook app which illustrates what third parties can know about you through your Facebook profile: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== Mapping our social domains ====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”. Everyone belongs to several '''social domains''' - your work or advocacy networks, your family networks, friends, and sports teams. Some networks may feel more secure than others. For example, you may tend to have a more secure communication practices for your work or advocacy activities, but less secure practices for interacting with friends on a social networking platform. &lt;br /&gt;
&lt;br /&gt;
If you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in a social networking platform that you like a particular kind of game, an attacker who wants to investigate your work or advocacy activities might trick you into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if your work identity and your gaming profile can be connected to the same person; and this is why separating your social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
To separate your social domains, it's helpful to first map them out and identify which ones could expose you most. You can do this by thinking about your different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
For instance, Polish computer security researcher Joanna Rutkowska has developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain, including her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the encrypted communication with her partner.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain includes the totally untrusted areas which don’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
You can find more details about her scheme here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
==== Deleting identities ====&lt;br /&gt;
&lt;br /&gt;
If you decide to separate your social domains by creating multiple identities, you should decide whether to delete or keep the identity or identities that you already have.  To do this, you can start by investigating the traces of your existing identity or identities. (For methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;). If you opt for deleting existing accounts, you can visit the following places:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitates the process of deleting social media profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once you have identified your different social domains and the digital activities and contacts that go with them, what you need to do is decide if you want to differentiate your identities accordingly, or if you'd rather stick to your official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
You may want to keep your work connected to your legal or &amp;quot;real&amp;quot; identity, or think that your activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social media, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific context the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once you have '''assessed our risk''', you can then consider different strategies for separating your identities online.  For more on assessing risk visit: https://ssd.eff.org/en/module/introduction-threat-modeling&lt;br /&gt;
&lt;br /&gt;
'''Strategies''' for maintaining separate identities can range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding (http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name) talks about her decision to start writing under her real name, dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously Vani, a human rights activist, writes]: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”.&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where you don't need to gain other people's trust, when there are few or no people you can trust, or when you don't want to expose others in your life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance, you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you, as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When you adopt anonymity as a strategy you may use pseudonyms, but these should not be used across different networks or social domains, and some may only be used once and then discarded. Because of this, anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. For more information on how to be anonymous online, see the security recommendations at the beginning of this manual and '''Anonymizing tools''' in Step0 in the wiki.&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. There are [[https://www.eff.org/deeplinks/2011/07/case-pseudonyms|myriad reasons why individuals may wish to use a name other than the one they were born with]]. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent harassment and discrimination or they may use a name that’s easier to pronounce or spell in a given culture. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot; applying a real name policy which typically means using your legal name or the name by which you are commonly known. This policy has caused many users to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that we can be reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is [https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community using a name-shaped pseudonym].&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers '''visibility''', which allows to network with others, and by pinning your voice to a particular name you can develop an '''online reputation'''. This depends on others to decide whether you are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to your legal identity, or not. The choice to connect your online reputation to your &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity.  &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice you make, what is important is that you keep your domains effectively separated. No matter how many domains you identify in your digital life, and how many corresponding identities you create, on the internet every identity - even the one bearing your real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example Tor or TAILS)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' You may think that deleting certain sensitive data from social networks and web services may be enough to protect yourself, but metadata cannot be deleted as easily. And using just one identity through your whole life - in all your work and personal domains - creates a bulk of information that makes it easier to profile you.&lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of your social domains. You might also choose to use your real identity in some areas, and your new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When you create a new identity, you should select the contacts for each one carefully, and avoid sharing contacts with other identities you use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* Your various identities should not linked to each other, or to your real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number.&lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be useful, as they can be discarded easily if compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be created for new acquaintances when appropriate as introductory profiles to get to know somebody before you include them in your more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgment on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If you want to use commercial social networking platforms, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that you use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once you have decided on a name, a surname, and a username for your virtual persona, you should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if you wish to develop your own reputation, you don’t want to be confused with someone else, especially if they don’t share your views of the world!&lt;br /&gt;
&lt;br /&gt;
Then you need to create a story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role. You can invent a new story if you feel particularly inspired or base your story on a “known” person’s story, a superhero, a fictional character from your favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when you create an identity you should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== Credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If we keep all our normal identifying traits - such as our gender, job, attitude or the way we write - it might be possible for someone to connect the dots and connect our pseudonymous personas with our real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': Our persona should have a job that is different from ours, but not so different that we don’t know anything about that field: for example, they shouldn’t be a surgeon if we don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select our persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': This could be identified through a &amp;quot;stylometric analysis&amp;quot; that make it possible to identify the author of a particular text. To change this, we can start by using a spell-checker in our word processor to check for consistent typos and we could also think about adopting a different writing attitude. We could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': A good rule of thumb is to give our persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, we are able to weather the strikes and even have some fun in the process. &lt;br /&gt;
&lt;br /&gt;
In any case, we should always remember that on the internet, each one of our identities - even the one connected to our real name - is a “virtual” identity, and it is always better to decide what character traits we want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for our “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for our identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Once we have created several personas, it's important keep them separate in both our physical and digital lives. While keeping notes on our identities might help ensure that we remember our story, there are technical measures we can take to make sure that our profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social network accounts''' for each of our identities. A good method is to always use different apps for each account/identity and, if possible, to separate our identities per device or operating system (see '''6. A different machine for each identity'''). &lt;br /&gt;
To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles  . For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains we need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all we need is a '''disposable email address''' that we only need to use for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if we decide to have just one identity online, using disposable email addresses prevents sites from building up a history of our activities and ensures that if that account gets compromised we can simply delete it and create a new one, keeping our digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are:''' '''https://anonbox.net'''&amp;lt;nowiki/&amp;gt;''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': ''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to our main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised we can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill our main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org).&lt;br /&gt;
&lt;br /&gt;
==== Commercial social platforms ====&lt;br /&gt;
&lt;br /&gt;
Whatever social networking platform we decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
Also be very careful about the''' profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for us in that social network, regardless of our privacy settings.&lt;br /&gt;
&lt;br /&gt;
Make sure your contacts do not overlap with your other identities, and to make sure your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when we interact with the platform using a GPS-enabled phone, but the network our computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
If we access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide our trails is to publish from our various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read: &lt;br /&gt;
* https://www.facebook.com/help/389849807718635 &lt;br /&gt;
* Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
It can be a good idea to follow, from our pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance our real identity from our pseudonymous identities, we can also write (and hashtag on Twitter) posts under our pseudonymous profiles about events that we are not attending, especially if they are taking place far away from us. It can also be fun to publish and then delete posts that look like we have exposed our identity, so as to further confuse anyone who may try to unmask us.&lt;br /&gt;
&lt;br /&gt;
==== Alternative social platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if our aim is to publicise as widely as possible an event we are organizing or a project we are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close our accounts if they find that our contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If we add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to our data, the best solution is to limit the use of commercial social networking platforms to specific projects we want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)], '''N-1''' 8https://n-1.cc/) and '''Crabgrass '''(https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so we way wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, we should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (eg related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, How is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can we choose to share our videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of our activity and information?&lt;br /&gt;
&lt;br /&gt;
==== Creating a blog or website ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com).  Based on it, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org/ http://noblogs.org) and Nadir’s '''BlackBlogs '''– (http://blackblogs.org/ http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see &amp;lt;nowiki/&amp;gt;https://www.autistici.org/en/links.html &amp;lt;nowiki/&amp;gt;and &amp;lt;nowiki/&amp;gt;https://blackblogs.org/policy &amp;lt;nowiki/&amp;gt;respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
If we want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, we can create our own website. For this we need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If we want to use our own '''domain''' name, bypassing payments and identifications may get difficult unless we use Bitcoin or another pseudonymous payment system. The personal data we will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, we can register our domain with the data of an association and use a prepaid credit card that is not connected to our own data (if available in our country). Alternatively, we can use a registrar like Gandi.net ([https://www.gandi.net/ https://www.gandi.net]) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting us; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic, approach is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that we want to secure.&lt;br /&gt;
&lt;br /&gt;
If we use the same operating system for our several identities, no matter how carefully we separate our profiles we can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile we have assigned to our 'real' identity, or get infected by a malware that allows our attacker to monitor everything we do online, with all our identities. Both risks can be limited by using a virtual machine for each of our domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on our physical computer. We can think of a VM as a ''computer within a computer''. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For our purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== Whonix' ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix '''(https://www.whonix.org) is an operating system that aims at protecting our anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. Whonix’s website offers a wide documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== Tails ====&lt;br /&gt;
&lt;br /&gt;
'''Tails''', or '''The Amnesic Incognito Live System''', a free and open-source Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections. When we launch Tails, we have a complete operating system that comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, we can access the internet, communicate, and do all we need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless we ask it to do so.&lt;br /&gt;
&lt;br /&gt;
==== Qubes OS ====&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' – https://www.qubes-os.org – is a free and open-source security-oriented operating system based on '''Fedora''', a Linux distribution, and '''Xen''', a virtual machine that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things we do on our computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, we can do everything on a single physical computer without having to worry that one successful cyberattack harms our whole system, potentially revealing all the connections among our several identities.&lt;br /&gt;
&lt;br /&gt;
==== What to choose ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described – Tails, Whonix and Qubes OS – allow us to use a completely separate operating system for managing our alternate identities, and can be quite useful to make sure that we don’t reveal our true identity while we use the anonymous one(s).&lt;br /&gt;
&lt;br /&gt;
Using '''Tails''' is pretty easy, and if what we need to do with our alternate persona needs a focus on ''anonymization'', then it may be worthwhile to overcome the initial obstacle. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. But if on the other hand we need ''persistence'' and we want to keep some files or actions we have created we need to enable this option when we start the system. Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what we need is both ''anonymity'' and ''security by isolation'' and we have a good machine – https://www.whonix.org/wiki/System_Requirements – where we can run Virtualbox and installing '''Whonix''', according to the number of our alternative identities it seems a good solution that caters to all our needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if we want to keep all our activities inside our own computer without having to install anything else and if what we are trying to do is to effectively ''separate'' our identities rather than anonymize our activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if we feel that we really need to protect ourselves against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protects us from every threat, and we shouldn’t look at them as a magic potion that will make us invulnerable. Nevertheless, by using any of them, according to our needs and resources, we will raise the level of effort that an attacker will need to harm us, thus making an attack less likely. For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&amp;lt;nowiki/&amp;gt;&amp;lt;nowiki/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1351</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1351"/>
				<updated>2015-05-28T10:27:22Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
== Understanding digital shadows ==&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, it has also become a space where people who question or challenge dominant discourses - especially where those deal with gender and sexual orientation - are silenced, harassed and threatened. &lt;br /&gt;
&lt;br /&gt;
If you are active on the internet as women, human rights defenders, trans* or queer persons, and/or feminists, you'll probably want to make sure your privacy and security are protected as much as possible. &lt;br /&gt;
&lt;br /&gt;
A good place to start is by assessing the traces you are leaving behind on the internet, by getting to know your digital shadow and understanding how you organise your social domains and networks across your online and physical activities. &lt;br /&gt;
&lt;br /&gt;
The traces you leave online can tell very accurate stories about you; who you are, were you live and hang out; what you are interested in and who your friends and collaborators are. This information can expose you to several threats, including online harassment - particularly where the traces you leave behind are publicly available. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' you can use to take more control over your digital shadows - to increase your privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing your activity online.  &lt;br /&gt;
Some examples of these strategies and tools include controlling the amount of data you give away by consciously stripping valuable information from content and metadata; trying the art of self-doxing; and thinking about ways to play with and break up your online identity.&lt;br /&gt;
&lt;br /&gt;
Your digital shadow is the story data tells about you. This digital shadow is created by trillions of bits of data, left behind in the digital world when you connect to the internet, your mobile phones and your other online services. These digital shadows ultimately have a life of their own. They can be affected by others and can change in unpredictable ways. They grow continuously, and can be permanent, encompassing both your past and present activities. &lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' &lt;br /&gt;
The devices and the software you use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data. These bits of data can include your name, location, contacts, pictures, messages, tweets and likes, but also the brand of your computer, length of your phone calls and information about which websites you visit. These data traces can be put out there by yourself as well as by other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' &lt;br /&gt;
In some cases you '''actively '''share data – for example when you share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about you, by tagging you in pictures, mentioning you in tweets or simply by communicating with you. In other cases, you give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
&lt;br /&gt;
Your browsing habits and IP address are shared when you visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites you visit, and the information shared is collected for a wide range of purposes, from website analytics to advertising. Your mobile phone apps also collect data on you without your active knowledge or consent – for example, the photos you take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow you as you move from one service to another - from your internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in your readers to publishing pictures from the latest protest you covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of your messages, blogs, tweets and phone calls; it is your pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables your email to be delivered, files on your computer to be found and mobile communication to work. Metadata can include your email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the technological infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognised by computers.&lt;br /&gt;
&lt;br /&gt;
==== Who collects data? ====   &lt;br /&gt;
&lt;br /&gt;
You might wonder about the importance of one picture, one message, or one call. You might think there is so much data out there that nobody knows what to do with it, or cares that much about it. &lt;br /&gt;
&lt;br /&gt;
However, there are in reality a number of parties interested in this data - including companies, governments and individuals - and data collection and data analysis is by now very sophisticated. The data traces you leave behind online are constantly being collected, analysed and sorted by various parties to create profiles on you; and every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by these companies, governments and individuals for a variety of purposes. Profiles can be bought and sold;  data can be used to control, suppress or silence; it can be used to create harassment strategies. &lt;br /&gt;
&lt;br /&gt;
Data can be used to gain insight into who you are, what you do, where you have been and with whom you have been interacting. This information can then be used to make predictions on what you might do or where you might be in future. For example, if someone knows that you are an outspoken blogger on gender issues in country x, they know that you will probably be present at a conference on blogging and women held in that country. &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to your digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. &lt;br /&gt;
&lt;br /&gt;
You can't know exactly what is happening to our digital shadow, and that itself is a problem. Fortunately, there are many tools and tactics you can use to manage your digital shadows and to limit their ramifications in terms of profiling, control and surveillance. This will be discussed in the rest of this section. &lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
To move towards getting some control over your digital shadow, a good place to start is to see what it looks like (as far as is possible)&lt;br /&gt;
&lt;br /&gt;
* '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – is a tool launched by Tactical Tech that allows you to see what traces you are leaving online, and it offers a lot of tips on how to protect your privacy. &lt;br /&gt;
* Identifying and materialising social networks across your online and physical activities: John Fass, researcher and designer at the Royal College of Art, offers some activities for visualising your social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* A tool called '''OpenPaths.cc''' allows you to see through the eyes of your mobile phone. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone you can change the permissions for each app under its privacy setting. LINK?? &lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
The good news is that you can partly control what content and metadata you give away. When you publish content on the web, it is always a good idea to ask yourself if what you are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to your personal life, the names you mention or the images you upload may contribute to a picture about who you are, what you are doing, where you are doing it and so on. This could be used by people who wish to target you. &lt;br /&gt;
&lt;br /&gt;
This does not mean that you should silence yourself – by taking some basic measures, you can limit your risks by increasing the level of the effort that would be required to attack you or your contacts.&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like your IP address''', thereby increasing your anonymity online.&lt;br /&gt;
&lt;br /&gt;
* '''Use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about your life''', you can use private profiles that can only be accessed by selected contacts. When using those on commercial social media, you should be aware of the regular changes to the privacy policies of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web, you should ask yourself if the information you spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices. https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or '''Adblock Plus''', as well as by monitoring your privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not using your real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or you can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing metada from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
==== Self-Doxing ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet and constitute a type of social engineering technique. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find their flaws.&lt;br /&gt;
&amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;). Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser. Useful tips on self-doxing tools and techniques can be found here: &lt;br /&gt;
* https://lilithlela.cyberguerrilla.org/?page_id=93870  &lt;br /&gt;
* https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* Ubisoft’s '''Digital Shadow''' is a Facebook app which illustrates what third parties can know about you through your Facebook profile: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== Mapping our social domains ====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”. Everyone belongs to several '''social domains''' - your work or advocacy networks, your family networks, friends, and sports teams. Some networks may feel more secure than others. For example, you may tend to have a more secure communication practices for your work or advocacy activities, but less secure practices for interacting with friends on a social networking platform. &lt;br /&gt;
&lt;br /&gt;
If you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in a social networking platform that you like a particular kind of game, an attacker who wants to investigate your work or advocacy activities might trick you into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if your work identity and your gaming profile can be connected to the same person; and this is why separating your social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
To separate your social domains, it's helpful to first map them out and identify which ones could expose you most. You can do this by thinking about your different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
For instance, Polish computer security researcher Joanna Rutkowska has developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain, including her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the encrypted communication with her partner.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain includes the totally untrusted areas which don’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
You can find more details about her scheme here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
==== Deleting identities ====&lt;br /&gt;
&lt;br /&gt;
If you decide to separate your social domains by creating multiple identities, you should decide whether to delete or keep the identity or identities that you already have.  To do this, you can start by investigating the traces of your existing identity or identities. (For methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;). If you opt for deleting existing accounts, you can visit the following places:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitates the process of deleting social media profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once you have identified your different social domains and the digital activities and contacts that go with them, what you need to do is decide if you want to differentiate your identities accordingly, or if you'd rather stick to your official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
You may want to keep your work connected to your legal or &amp;quot;real&amp;quot; identity, or think that your activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social media, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific context the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once you have '''assessed our risk''', you can then consider different strategies for separating your identities online.  For more on assessing risk visit: https://ssd.eff.org/en/module/introduction-threat-modeling&lt;br /&gt;
&lt;br /&gt;
'''Strategies''' for maintaining separate identities can range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding (http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name) talks about her decision to start writing under her real name, dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously Vani, a human rights activist, writes]: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”.&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where you don't need to gain other people's trust, when there are few or no people you can trust, or when you don't want to expose others in your life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance, you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you, as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When you adopt anonymity as a strategy you may use pseudonyms, but these should not be used across different networks or social domains, and some may only be used once and then discarded. Because of this, anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. For more information on how to be anonymous online, see the security recommendations at the beginning of this manual and '''Anonymizing tools''' in Step0 in the wiki.&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. There are [[https://www.eff.org/deeplinks/2011/07/case-pseudonyms|myriad reasons why individuals may wish to use a name other than the one they were born with]]. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent harassment and discrimination or they may use a name that’s easier to pronounce or spell in a given culture. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot; applying a real name policy which typically means using your legal name or the name by which you are commonly known. This policy has caused many users to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that we can be reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is [https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community using a name-shaped pseudonym].&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers '''visibility''', which allows to network with others, and by pinning your voice to a particular name you can develop an '''online reputation'''. This depends on others to decide whether you are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to your legal identity, or not. The choice to connect your online reputation to your &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity.  &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice you make, what is important is that you keep your domains effectively separated. No matter how many domains you identify in your digital life, and how many corresponding identities you create, on the internet every identity - even the one bearing your real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example Tor or TAILS)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' You may think that deleting certain sensitive data from social networks and web services may be enough to protect yourself, but metadata cannot be deleted as easily. And using just one identity through your whole life - in all your work and personal domains - creates a bulk of information that makes it easier to profile you.&lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of your social domains. You might also choose to use your real identity in some areas, and your new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When you create a new identity, you should select the contacts for each one carefully, and avoid sharing contacts with other identities you use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* Your various identities should not linked to each other, or to your real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number.&lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be useful, as they can be discarded easily if compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be created for new acquaintances when appropriate as introductory profiles to get to know somebody before you include them in your more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgment on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If we want to use commercial social networks, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that we use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once we have decided on a name, a surname, and a username for our virtual persona, we should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if we wish to develop our own reputation, we don’t want to be confused with someone else, especially if they don’t share our views of the world!&lt;br /&gt;
&lt;br /&gt;
Then we need to create story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role.  We can invent a new story if we feel particularly inspired or base our story on a “known” person’s story, a superhero, a fictional character from our favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when we create an identity we should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== Credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If we keep all our normal identifying traits - such as our gender, job, attitude or the way we write - it might be possible for someone to connect the dots and connect our pseudonymous personas with our real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': Our persona should have a job that is different from ours, but not so different that we don’t know anything about that field: for example, they shouldn’t be a surgeon if we don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select our persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': This could be identified through a &amp;quot;stylometric analysis&amp;quot; that make it possible to identify the author of a particular text. To change this, we can start by using a spell-checker in our word processor to check for consistent typos and we could also think about adopting a different writing attitude. We could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': A good rule of thumb is to give our persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, we are able to weather the strikes and even have some fun in the process. &lt;br /&gt;
&lt;br /&gt;
In any case, we should always remember that on the internet, each one of our identities - even the one connected to our real name - is a “virtual” identity, and it is always better to decide what character traits we want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for our “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for our identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Once we have created several personas, it's important keep them separate in both our physical and digital lives. While keeping notes on our identities might help ensure that we remember our story, there are technical measures we can take to make sure that our profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social network accounts''' for each of our identities. A good method is to always use different apps for each account/identity and, if possible, to separate our identities per device or operating system (see '''6. A different machine for each identity'''). &lt;br /&gt;
To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles  . For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains we need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all we need is a '''disposable email address''' that we only need to use for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if we decide to have just one identity online, using disposable email addresses prevents sites from building up a history of our activities and ensures that if that account gets compromised we can simply delete it and create a new one, keeping our digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are:''' '''https://anonbox.net'''&amp;lt;nowiki/&amp;gt;''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': ''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to our main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised we can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill our main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org).&lt;br /&gt;
&lt;br /&gt;
==== Commercial social platforms ====&lt;br /&gt;
&lt;br /&gt;
Whatever social networking platform we decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
Also be very careful about the''' profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for us in that social network, regardless of our privacy settings.&lt;br /&gt;
&lt;br /&gt;
Make sure your contacts do not overlap with your other identities, and to make sure your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when we interact with the platform using a GPS-enabled phone, but the network our computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
If we access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide our trails is to publish from our various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read: &lt;br /&gt;
* https://www.facebook.com/help/389849807718635 &lt;br /&gt;
* Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
It can be a good idea to follow, from our pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance our real identity from our pseudonymous identities, we can also write (and hashtag on Twitter) posts under our pseudonymous profiles about events that we are not attending, especially if they are taking place far away from us. It can also be fun to publish and then delete posts that look like we have exposed our identity, so as to further confuse anyone who may try to unmask us.&lt;br /&gt;
&lt;br /&gt;
==== Alternative social platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if our aim is to publicise as widely as possible an event we are organizing or a project we are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close our accounts if they find that our contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If we add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to our data, the best solution is to limit the use of commercial social networking platforms to specific projects we want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)], '''N-1''' 8https://n-1.cc/) and '''Crabgrass '''(https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so we way wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, we should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (eg related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, How is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can we choose to share our videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of our activity and information?&lt;br /&gt;
&lt;br /&gt;
==== Creating a blog or website ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com).  Based on it, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org/ http://noblogs.org) and Nadir’s '''BlackBlogs '''– (http://blackblogs.org/ http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see &amp;lt;nowiki/&amp;gt;https://www.autistici.org/en/links.html &amp;lt;nowiki/&amp;gt;and &amp;lt;nowiki/&amp;gt;https://blackblogs.org/policy &amp;lt;nowiki/&amp;gt;respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
If we want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, we can create our own website. For this we need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If we want to use our own '''domain''' name, bypassing payments and identifications may get difficult unless we use Bitcoin or another pseudonymous payment system. The personal data we will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, we can register our domain with the data of an association and use a prepaid credit card that is not connected to our own data (if available in our country). Alternatively, we can use a registrar like Gandi.net ([https://www.gandi.net/ https://www.gandi.net]) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting us; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic, approach is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that we want to secure.&lt;br /&gt;
&lt;br /&gt;
If we use the same operating system for our several identities, no matter how carefully we separate our profiles we can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile we have assigned to our 'real' identity, or get infected by a malware that allows our attacker to monitor everything we do online, with all our identities. Both risks can be limited by using a virtual machine for each of our domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on our physical computer. We can think of a VM as a ''computer within a computer''. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For our purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== Whonix' ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix '''(https://www.whonix.org) is an operating system that aims at protecting our anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. Whonix’s website offers a wide documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== Tails ====&lt;br /&gt;
&lt;br /&gt;
'''Tails''', or '''The Amnesic Incognito Live System''', a free and open-source Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections. When we launch Tails, we have a complete operating system that comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, we can access the internet, communicate, and do all we need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless we ask it to do so.&lt;br /&gt;
&lt;br /&gt;
==== Qubes OS ====&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' – https://www.qubes-os.org – is a free and open-source security-oriented operating system based on '''Fedora''', a Linux distribution, and '''Xen''', a virtual machine that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things we do on our computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, we can do everything on a single physical computer without having to worry that one successful cyberattack harms our whole system, potentially revealing all the connections among our several identities.&lt;br /&gt;
&lt;br /&gt;
==== What to choose ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described – Tails, Whonix and Qubes OS – allow us to use a completely separate operating system for managing our alternate identities, and can be quite useful to make sure that we don’t reveal our true identity while we use the anonymous one(s).&lt;br /&gt;
&lt;br /&gt;
Using '''Tails''' is pretty easy, and if what we need to do with our alternate persona needs a focus on ''anonymization'', then it may be worthwhile to overcome the initial obstacle. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. But if on the other hand we need ''persistence'' and we want to keep some files or actions we have created we need to enable this option when we start the system. Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what we need is both ''anonymity'' and ''security by isolation'' and we have a good machine – https://www.whonix.org/wiki/System_Requirements – where we can run Virtualbox and installing '''Whonix''', according to the number of our alternative identities it seems a good solution that caters to all our needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if we want to keep all our activities inside our own computer without having to install anything else and if what we are trying to do is to effectively ''separate'' our identities rather than anonymize our activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if we feel that we really need to protect ourselves against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protects us from every threat, and we shouldn’t look at them as a magic potion that will make us invulnerable. Nevertheless, by using any of them, according to our needs and resources, we will raise the level of effort that an attacker will need to harm us, thus making an attack less likely. For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&amp;lt;nowiki/&amp;gt;&amp;lt;nowiki/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1350</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1350"/>
				<updated>2015-05-28T10:24:45Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: /* Comparing strategies */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
== Understanding digital shadows ==&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, it has also become a space where people who question or challenge dominant discourses - especially where those deal with gender and sexual orientation - are silenced, harassed and threatened. &lt;br /&gt;
&lt;br /&gt;
If you are active on the internet as women, human rights defenders, trans* or queer persons, and/or feminists, you'll probably want to make sure your privacy and security are protected as much as possible. &lt;br /&gt;
&lt;br /&gt;
A good place to start is by assessing the traces you are leaving behind on the internet, by getting to know your digital shadow and understanding how you organise your social domains and networks across your online and physical activities. &lt;br /&gt;
&lt;br /&gt;
The traces you leave online can tell very accurate stories about you; who you are, were you live and hang out; what you are interested in and who your friends and collaborators are. This information can expose you to several threats, including online harassment - particularly where the traces you leave behind are publicly available. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' you can use to take more control over your digital shadows - to increase your privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing your activity online.  &lt;br /&gt;
Some examples of these strategies and tools include controlling the amount of data you give away by consciously stripping valuable information from content and metadata; trying the art of self-doxing; and thinking about ways to play with and break up your online identity.&lt;br /&gt;
&lt;br /&gt;
Your digital shadow is the story data tells about you. This digital shadow is created by trillions of bits of data, left behind in the digital world when you connect to the internet, your mobile phones and your other online services. These digital shadows ultimately have a life of their own. They can be affected by others and can change in unpredictable ways. They grow continuously, and can be permanent, encompassing both your past and present activities. &lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' &lt;br /&gt;
The devices and the software you use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data. These bits of data can include your name, location, contacts, pictures, messages, tweets and likes, but also the brand of your computer, length of your phone calls and information about which websites you visit. These data traces can be put out there by yourself as well as by other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' &lt;br /&gt;
In some cases you '''actively '''share data – for example when you share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about you, by tagging you in pictures, mentioning you in tweets or simply by communicating with you. In other cases, you give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
&lt;br /&gt;
Your browsing habits and IP address are shared when you visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites you visit, and the information shared is collected for a wide range of purposes, from website analytics to advertising. Your mobile phone apps also collect data on you without your active knowledge or consent – for example, the photos you take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow you as you move from one service to another - from your internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in your readers to publishing pictures from the latest protest you covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of your messages, blogs, tweets and phone calls; it is your pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables your email to be delivered, files on your computer to be found and mobile communication to work. Metadata can include your email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the technological infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognised by computers.&lt;br /&gt;
&lt;br /&gt;
==== Who collects data? ====   &lt;br /&gt;
&lt;br /&gt;
You might wonder about the importance of one picture, one message, or one call. You might think there is so much data out there that nobody knows what to do with it, or cares that much about it. &lt;br /&gt;
&lt;br /&gt;
However, there are in reality a number of parties interested in this data - including companies, governments and individuals - and data collection and data analysis is by now very sophisticated. The data traces you leave behind online are constantly being collected, analysed and sorted by various parties to create profiles on you; and every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by these companies, governments and individuals for a variety of purposes. Profiles can be bought and sold;  data can be used to control, suppress or silence; it can be used to create harassment strategies. &lt;br /&gt;
&lt;br /&gt;
Data can be used to gain insight into who you are, what you do, where you have been and with whom you have been interacting. This information can then be used to make predictions on what you might do or where you might be in future. For example, if someone knows that you are an outspoken blogger on gender issues in country x, they know that you will probably be present at a conference on blogging and women held in that country. &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to your digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. &lt;br /&gt;
&lt;br /&gt;
You can't know exactly what is happening to our digital shadow, and that itself is a problem. Fortunately, there are many tools and tactics you can use to manage your digital shadows and to limit their ramifications in terms of profiling, control and surveillance. This will be discussed in the rest of this section. &lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
To move towards getting some control over your digital shadow, a good place to start is to see what it looks like (as far as is possible)&lt;br /&gt;
&lt;br /&gt;
* '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – is a tool launched by Tactical Tech that allows you to see what traces you are leaving online, and it offers a lot of tips on how to protect your privacy. &lt;br /&gt;
* Identifying and materialising social networks across your online and physical activities: John Fass, researcher and designer at the Royal College of Art, offers some activities for visualising your social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* A tool called '''OpenPaths.cc''' allows you to see through the eyes of your mobile phone. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone you can change the permissions for each app under its privacy setting. LINK?? &lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
The good news is that you can partly control what content and metadata you give away. When you publish content on the web, it is always a good idea to ask yourself if what you are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to your personal life, the names you mention or the images you upload may contribute to a picture about who you are, what you are doing, where you are doing it and so on. This could be used by people who wish to target you. &lt;br /&gt;
&lt;br /&gt;
This does not mean that you should silence yourself – by taking some basic measures, you can limit your risks by increasing the level of the effort that would be required to attack you or your contacts.&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like your IP address''', thereby increasing your anonymity online.&lt;br /&gt;
&lt;br /&gt;
* '''Use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about your life''', you can use private profiles that can only be accessed by selected contacts. When using those on commercial social media, you should be aware of the regular changes to the privacy policies of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web, you should ask yourself if the information you spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices. https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or '''Adblock Plus''', as well as by monitoring your privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not using your real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or you can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing metada from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
==== Self-Doxing ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet and constitute a type of social engineering technique. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find their flaws.&lt;br /&gt;
&amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;). Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser. Useful tips on self-doxing tools and techniques can be found here: &lt;br /&gt;
* https://lilithlela.cyberguerrilla.org/?page_id=93870  &lt;br /&gt;
* https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* Ubisoft’s '''Digital Shadow''' is a Facebook app which illustrates what third parties can know about you through your Facebook profile: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== Mapping our social domains ====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”. Everyone belongs to several '''social domains''' - your work or advocacy networks, your family networks, friends, and sports teams. Some networks may feel more secure than others. For example, you may tend to have a more secure communication practices for your work or advocacy activities, but less secure practices for interacting with friends on a social networking platform. &lt;br /&gt;
&lt;br /&gt;
If you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in a social networking platform that you like a particular kind of game, an attacker who wants to investigate your work or advocacy activities might trick you into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if your work identity and your gaming profile can be connected to the same person; and this is why separating your social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
To separate your social domains, it's helpful to first map them out and identify which ones could expose you most. You can do this by thinking about your different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
For instance, Polish computer security researcher Joanna Rutkowska has developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain, including her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the encrypted communication with her partner.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain includes the totally untrusted areas which don’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
You can find more details about her scheme here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
==== Deleting identities ====&lt;br /&gt;
&lt;br /&gt;
If you decide to separate your social domains by creating multiple identities, you should decide whether to delete or keep the identity or identities that you already have.  To do this, you can start by investigating the traces of your existing identity or identities. (For methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;). If you opt for deleting existing accounts, you can visit the following places:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitates the process of deleting social media profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once you have identified your different social domains and the digital activities and contacts that go with them, what you need to do is decide if you want to differentiate your identities accordingly, or if you'd rather stick to your official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
You may want to keep your work connected to your legal or &amp;quot;real&amp;quot; identity, or think that your activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social media, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific context the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once you have '''assessed our risk''', you can then consider different strategies for separating your identities online.  For more on assessing risk visit: https://ssd.eff.org/en/module/introduction-threat-modeling&lt;br /&gt;
&lt;br /&gt;
'''Strategies''' for maintaining separate identities can range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding (http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name) talks about her decision to start writing under her real name, dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously Vani, a human rights activist, writes]: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”.&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where you don't need to gain other people's trust, when there are few or no people you can trust, or when you don't want to expose others in your life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance, you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you, as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When you adopt anonymity as a strategy you may use pseudonyms, but these should not be used across different networks or social domains, and some may only be used once and then discarded. Because of this, anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. For more information on how to be anonymous online, see the security recommendations at the beginning of this manual and '''Anonymizing tools''' in Step0 in the wiki.&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. There are [[https://www.eff.org/deeplinks/2011/07/case-pseudonyms|myriad reasons why individuals may wish to use a name other than the one they were born with]]. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent harassment and discrimination or they may use a name that’s easier to pronounce or spell in a given culture. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot; applying a real name policy which typically means using your legal name or the name by which you are commonly known. This policy has caused many users to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that we can be reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is [https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community using a name-shaped pseudonym].&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers '''visibility''', which allows to network with others, and by pinning your voice to a particular name you can develop an '''online reputation'''. This depends on others to decide whether you are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to your legal identity, or not. The choice to connect your online reputation to your &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity.  &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice you make, what is important is that you keep your domains effectively separated. No matter how many domains you identify in your digital life, and how many corresponding identities you create, on the internet every identity - even the one bearing your real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example Tor or TAILS)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of your real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' We may think that deleting certain sensitive data from social networks and web services may be enough to protect ourselves, but metadata cannot be deleted as easily.  And using just one identity through our whole life - in all our work and personal domains - creates a bulk of information that makes it easier to profile us. &lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of our social domains. We might also choose to use our real identity in some areas, and our new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When we create a new identity, we should select the contacts for each one carefully, and avoid sharing contacts with other identities we use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* Our various identities should not linked to each other, or to our real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number.&lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be useful, as they can be discarded easily if compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be created for new acquaintances when appropriate as introductory profiles to get to know somebody before we include them in our more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgment on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If we want to use commercial social networks, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that we use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once we have decided on a name, a surname, and a username for our virtual persona, we should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if we wish to develop our own reputation, we don’t want to be confused with someone else, especially if they don’t share our views of the world!&lt;br /&gt;
&lt;br /&gt;
Then we need to create story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role.  We can invent a new story if we feel particularly inspired or base our story on a “known” person’s story, a superhero, a fictional character from our favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when we create an identity we should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== Credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If we keep all our normal identifying traits - such as our gender, job, attitude or the way we write - it might be possible for someone to connect the dots and connect our pseudonymous personas with our real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': Our persona should have a job that is different from ours, but not so different that we don’t know anything about that field: for example, they shouldn’t be a surgeon if we don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select our persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': This could be identified through a &amp;quot;stylometric analysis&amp;quot; that make it possible to identify the author of a particular text. To change this, we can start by using a spell-checker in our word processor to check for consistent typos and we could also think about adopting a different writing attitude. We could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': A good rule of thumb is to give our persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, we are able to weather the strikes and even have some fun in the process. &lt;br /&gt;
&lt;br /&gt;
In any case, we should always remember that on the internet, each one of our identities - even the one connected to our real name - is a “virtual” identity, and it is always better to decide what character traits we want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for our “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for our identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Once we have created several personas, it's important keep them separate in both our physical and digital lives. While keeping notes on our identities might help ensure that we remember our story, there are technical measures we can take to make sure that our profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social network accounts''' for each of our identities. A good method is to always use different apps for each account/identity and, if possible, to separate our identities per device or operating system (see '''6. A different machine for each identity'''). &lt;br /&gt;
To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles  . For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains we need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all we need is a '''disposable email address''' that we only need to use for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if we decide to have just one identity online, using disposable email addresses prevents sites from building up a history of our activities and ensures that if that account gets compromised we can simply delete it and create a new one, keeping our digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are:''' '''https://anonbox.net'''&amp;lt;nowiki/&amp;gt;''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': ''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to our main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised we can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill our main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org).&lt;br /&gt;
&lt;br /&gt;
==== Commercial social platforms ====&lt;br /&gt;
&lt;br /&gt;
Whatever social networking platform we decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
Also be very careful about the''' profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for us in that social network, regardless of our privacy settings.&lt;br /&gt;
&lt;br /&gt;
Make sure your contacts do not overlap with your other identities, and to make sure your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when we interact with the platform using a GPS-enabled phone, but the network our computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
If we access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide our trails is to publish from our various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read: &lt;br /&gt;
* https://www.facebook.com/help/389849807718635 &lt;br /&gt;
* Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
It can be a good idea to follow, from our pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance our real identity from our pseudonymous identities, we can also write (and hashtag on Twitter) posts under our pseudonymous profiles about events that we are not attending, especially if they are taking place far away from us. It can also be fun to publish and then delete posts that look like we have exposed our identity, so as to further confuse anyone who may try to unmask us.&lt;br /&gt;
&lt;br /&gt;
==== Alternative social platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if our aim is to publicise as widely as possible an event we are organizing or a project we are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close our accounts if they find that our contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If we add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to our data, the best solution is to limit the use of commercial social networking platforms to specific projects we want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)], '''N-1''' 8https://n-1.cc/) and '''Crabgrass '''(https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so we way wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, we should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (eg related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, How is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can we choose to share our videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of our activity and information?&lt;br /&gt;
&lt;br /&gt;
==== Creating a blog or website ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com).  Based on it, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org/ http://noblogs.org) and Nadir’s '''BlackBlogs '''– (http://blackblogs.org/ http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see &amp;lt;nowiki/&amp;gt;https://www.autistici.org/en/links.html &amp;lt;nowiki/&amp;gt;and &amp;lt;nowiki/&amp;gt;https://blackblogs.org/policy &amp;lt;nowiki/&amp;gt;respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
If we want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, we can create our own website. For this we need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If we want to use our own '''domain''' name, bypassing payments and identifications may get difficult unless we use Bitcoin or another pseudonymous payment system. The personal data we will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, we can register our domain with the data of an association and use a prepaid credit card that is not connected to our own data (if available in our country). Alternatively, we can use a registrar like Gandi.net ([https://www.gandi.net/ https://www.gandi.net]) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting us; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic, approach is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that we want to secure.&lt;br /&gt;
&lt;br /&gt;
If we use the same operating system for our several identities, no matter how carefully we separate our profiles we can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile we have assigned to our 'real' identity, or get infected by a malware that allows our attacker to monitor everything we do online, with all our identities. Both risks can be limited by using a virtual machine for each of our domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on our physical computer. We can think of a VM as a ''computer within a computer''. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For our purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== Whonix' ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix '''(https://www.whonix.org) is an operating system that aims at protecting our anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. Whonix’s website offers a wide documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== Tails ====&lt;br /&gt;
&lt;br /&gt;
'''Tails''', or '''The Amnesic Incognito Live System''', a free and open-source Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections. When we launch Tails, we have a complete operating system that comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, we can access the internet, communicate, and do all we need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless we ask it to do so.&lt;br /&gt;
&lt;br /&gt;
==== Qubes OS ====&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' – https://www.qubes-os.org – is a free and open-source security-oriented operating system based on '''Fedora''', a Linux distribution, and '''Xen''', a virtual machine that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things we do on our computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, we can do everything on a single physical computer without having to worry that one successful cyberattack harms our whole system, potentially revealing all the connections among our several identities.&lt;br /&gt;
&lt;br /&gt;
==== What to choose ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described – Tails, Whonix and Qubes OS – allow us to use a completely separate operating system for managing our alternate identities, and can be quite useful to make sure that we don’t reveal our true identity while we use the anonymous one(s).&lt;br /&gt;
&lt;br /&gt;
Using '''Tails''' is pretty easy, and if what we need to do with our alternate persona needs a focus on ''anonymization'', then it may be worthwhile to overcome the initial obstacle. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. But if on the other hand we need ''persistence'' and we want to keep some files or actions we have created we need to enable this option when we start the system. Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what we need is both ''anonymity'' and ''security by isolation'' and we have a good machine – https://www.whonix.org/wiki/System_Requirements – where we can run Virtualbox and installing '''Whonix''', according to the number of our alternative identities it seems a good solution that caters to all our needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if we want to keep all our activities inside our own computer without having to install anything else and if what we are trying to do is to effectively ''separate'' our identities rather than anonymize our activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if we feel that we really need to protect ourselves against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protects us from every threat, and we shouldn’t look at them as a magic potion that will make us invulnerable. Nevertheless, by using any of them, according to our needs and resources, we will raise the level of effort that an attacker will need to harm us, thus making an attack less likely. For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&amp;lt;nowiki/&amp;gt;&amp;lt;nowiki/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1348</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1348"/>
				<updated>2015-05-28T10:19:09Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: /* Persistent Pseudonymity */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
== Understanding digital shadows ==&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, it has also become a space where people who question or challenge dominant discourses - especially where those deal with gender and sexual orientation - are silenced, harassed and threatened. &lt;br /&gt;
&lt;br /&gt;
If you are active on the internet as women, human rights defenders, trans* or queer persons, and/or feminists, you'll probably want to make sure your privacy and security are protected as much as possible. &lt;br /&gt;
&lt;br /&gt;
A good place to start is by assessing the traces you are leaving behind on the internet, by getting to know your digital shadow and understanding how you organise your social domains and networks across your online and physical activities. &lt;br /&gt;
&lt;br /&gt;
The traces you leave online can tell very accurate stories about you; who you are, were you live and hang out; what you are interested in and who your friends and collaborators are. This information can expose you to several threats, including online harassment - particularly where the traces you leave behind are publicly available. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' you can use to take more control over your digital shadows - to increase your privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing your activity online.  &lt;br /&gt;
Some examples of these strategies and tools include controlling the amount of data you give away by consciously stripping valuable information from content and metadata; trying the art of self-doxing; and thinking about ways to play with and break up your online identity.&lt;br /&gt;
&lt;br /&gt;
Your digital shadow is the story data tells about you. This digital shadow is created by trillions of bits of data, left behind in the digital world when you connect to the internet, your mobile phones and your other online services. These digital shadows ultimately have a life of their own. They can be affected by others and can change in unpredictable ways. They grow continuously, and can be permanent, encompassing both your past and present activities. &lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' &lt;br /&gt;
The devices and the software you use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data. These bits of data can include your name, location, contacts, pictures, messages, tweets and likes, but also the brand of your computer, length of your phone calls and information about which websites you visit. These data traces can be put out there by yourself as well as by other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' &lt;br /&gt;
In some cases you '''actively '''share data – for example when you share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about you, by tagging you in pictures, mentioning you in tweets or simply by communicating with you. In other cases, you give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
&lt;br /&gt;
Your browsing habits and IP address are shared when you visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites you visit, and the information shared is collected for a wide range of purposes, from website analytics to advertising. Your mobile phone apps also collect data on you without your active knowledge or consent – for example, the photos you take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow you as you move from one service to another - from your internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in your readers to publishing pictures from the latest protest you covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of your messages, blogs, tweets and phone calls; it is your pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables your email to be delivered, files on your computer to be found and mobile communication to work. Metadata can include your email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the technological infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognised by computers.&lt;br /&gt;
&lt;br /&gt;
==== Who collects data? ====   &lt;br /&gt;
&lt;br /&gt;
You might wonder about the importance of one picture, one message, or one call. You might think there is so much data out there that nobody knows what to do with it, or cares that much about it. &lt;br /&gt;
&lt;br /&gt;
However, there are in reality a number of parties interested in this data - including companies, governments and individuals - and data collection and data analysis is by now very sophisticated. The data traces you leave behind online are constantly being collected, analysed and sorted by various parties to create profiles on you; and every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by these companies, governments and individuals for a variety of purposes. Profiles can be bought and sold;  data can be used to control, suppress or silence; it can be used to create harassment strategies. &lt;br /&gt;
&lt;br /&gt;
Data can be used to gain insight into who you are, what you do, where you have been and with whom you have been interacting. This information can then be used to make predictions on what you might do or where you might be in future. For example, if someone knows that you are an outspoken blogger on gender issues in country x, they know that you will probably be present at a conference on blogging and women held in that country. &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to your digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. &lt;br /&gt;
&lt;br /&gt;
You can't know exactly what is happening to our digital shadow, and that itself is a problem. Fortunately, there are many tools and tactics you can use to manage your digital shadows and to limit their ramifications in terms of profiling, control and surveillance. This will be discussed in the rest of this section. &lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
To move towards getting some control over your digital shadow, a good place to start is to see what it looks like (as far as is possible)&lt;br /&gt;
&lt;br /&gt;
* '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – is a tool launched by Tactical Tech that allows you to see what traces you are leaving online, and it offers a lot of tips on how to protect your privacy. &lt;br /&gt;
* Identifying and materialising social networks across your online and physical activities: John Fass, researcher and designer at the Royal College of Art, offers some activities for visualising your social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* A tool called '''OpenPaths.cc''' allows you to see through the eyes of your mobile phone. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone you can change the permissions for each app under its privacy setting. LINK?? &lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
The good news is that you can partly control what content and metadata you give away. When you publish content on the web, it is always a good idea to ask yourself if what you are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to your personal life, the names you mention or the images you upload may contribute to a picture about who you are, what you are doing, where you are doing it and so on. This could be used by people who wish to target you. &lt;br /&gt;
&lt;br /&gt;
This does not mean that you should silence yourself – by taking some basic measures, you can limit your risks by increasing the level of the effort that would be required to attack you or your contacts.&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like your IP address''', thereby increasing your anonymity online.&lt;br /&gt;
&lt;br /&gt;
* '''Use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about your life''', you can use private profiles that can only be accessed by selected contacts. When using those on commercial social media, you should be aware of the regular changes to the privacy policies of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web, you should ask yourself if the information you spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices. https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or '''Adblock Plus''', as well as by monitoring your privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not using your real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or you can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing metada from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
==== Self-Doxing ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet and constitute a type of social engineering technique. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find his or her flaws.&lt;br /&gt;
&amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;). Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser. Useful tips on self-doxing tools and techniques can be found here: &lt;br /&gt;
* https://lilithlela.cyberguerrilla.org/?page_id=93870  &lt;br /&gt;
* https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* Ubisoft’s '''Digital Shadow''' is a Facebook app which illustrates what third parties can know about you through your Facebook profile: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== Mapping our social domains ====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”. Everyone belongs to several '''social domains''' - your work or advocacy networks, your family networks, friends, and sports teams. Some networks may feel more secure than others. For example, you may tend to have a more secure communication practices for your work or advocacy activities, but less secure practices for interacting with friends on a social networking platform. &lt;br /&gt;
&lt;br /&gt;
If you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in a social networking platform that you like a particular kind of game, an attacker who wants to investigate your work or advocacy activities might trick you into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if your work identity and your gaming profile can be connected to the same person; and this is why separating your social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
To separate your social domains, it's helpful to first map them out and identify which ones could expose you most. You can do this by thinking about your different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
For instance, Polish computer security researcher Joanna Rutkowska has developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain, including her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the encrypted communication with her partner.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain includes the totally untrusted areas which don’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
You can find more details about her scheme here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
==== Deleting identities ====&lt;br /&gt;
&lt;br /&gt;
If you decide to separate your social domains by creating multiple identities, you should decide whether to delete or keep the identity or identities that you already have.  To do this, you can start by investigating the traces of your existing identity or identities. (For methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;). If you opt for deleting existing accounts, you can visit the following places:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitates the process of deleting social media profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once you have identified your different social domains and the digital activities and contacts that go with them, what you need to do is decide if you want to differentiate your identities accordingly, or if you'd rather stick to your official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
You may want to keep your work connected to your legal or &amp;quot;real&amp;quot; identity, or think that your activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social media, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific context the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once you have '''assessed our risk''', you can then consider different strategies for separating your identities online.  For more on assessing risk visit: https://ssd.eff.org/en/module/introduction-threat-modeling&lt;br /&gt;
&lt;br /&gt;
'''Strategies''' for maintaining separate identities can range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding (http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name) talks about her decision to start writing under her real name, dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously Vani, a human rights activist, writes]: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”.&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where you don't need to gain other people's trust, when there are few or no people you can trust, or when you don't want to expose others in your life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance, you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you, as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When you adopt anonymity as a strategy you may use pseudonyms, but these should not be used across different networks or social domains, and some may only be used once and then discarded. Because of this, anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. For more information on how to be anonymous online, see the security recommendations at the beginning of this manual and '''Anonymizing tools''' in Step0 in the wiki.&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. There are [[https://www.eff.org/deeplinks/2011/07/case-pseudonyms|myriad reasons why individuals may wish to use a name other than the one they were born with]]. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent harassment and discrimination or they may use a name that’s easier to pronounce or spell in a given culture. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot; applying a real name policy which typically means using your legal name or the name by which you are commonly known. This policy has caused many users to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that we can be reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is [https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community using a name-shaped pseudonym].&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers '''visibility''', which allows to network with others, and by pinning your voice to a particular name you can develop an '''online reputation'''. This depends on others to decide whether you are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to your legal identity, or not. The choice to connect your online reputation to your &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity.  &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice we make, what is important is that we keep our domains effectively separated. No matter how many domains we identify in our digital life, and how many corresponding identities we create, on the internet every identity - even the one bearing our real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example Tor or TAILS)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonym could be linked to our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify us across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if we are also using our real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' We may think that deleting certain sensitive data from social networks and web services may be enough to protect ourselves, but metadata cannot be deleted as easily.  And using just one identity through our whole life - in all our work and personal domains - creates a bulk of information that makes it easier to profile us. &lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of our social domains. We might also choose to use our real identity in some areas, and our new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When we create a new identity, we should select the contacts for each one carefully, and avoid sharing contacts with other identities we use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* Our various identities should not linked to each other, or to our real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number.&lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be useful, as they can be discarded easily if compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be created for new acquaintances when appropriate as introductory profiles to get to know somebody before we include them in our more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgment on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If we want to use commercial social networks, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that we use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once we have decided on a name, a surname, and a username for our virtual persona, we should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if we wish to develop our own reputation, we don’t want to be confused with someone else, especially if they don’t share our views of the world!&lt;br /&gt;
&lt;br /&gt;
Then we need to create story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role.  We can invent a new story if we feel particularly inspired or base our story on a “known” person’s story, a superhero, a fictional character from our favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when we create an identity we should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== Credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If we keep all our normal identifying traits - such as our gender, job, attitude or the way we write - it might be possible for someone to connect the dots and connect our pseudonymous personas with our real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': Our persona should have a job that is different from ours, but not so different that we don’t know anything about that field: for example, they shouldn’t be a surgeon if we don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select our persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': This could be identified through a &amp;quot;stylometric analysis&amp;quot; that make it possible to identify the author of a particular text. To change this, we can start by using a spell-checker in our word processor to check for consistent typos and we could also think about adopting a different writing attitude. We could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': A good rule of thumb is to give our persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, we are able to weather the strikes and even have some fun in the process. &lt;br /&gt;
&lt;br /&gt;
In any case, we should always remember that on the internet, each one of our identities - even the one connected to our real name - is a “virtual” identity, and it is always better to decide what character traits we want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for our “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for our identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Once we have created several personas, it's important keep them separate in both our physical and digital lives. While keeping notes on our identities might help ensure that we remember our story, there are technical measures we can take to make sure that our profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social network accounts''' for each of our identities. A good method is to always use different apps for each account/identity and, if possible, to separate our identities per device or operating system (see '''6. A different machine for each identity'''). &lt;br /&gt;
To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles  . For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains we need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all we need is a '''disposable email address''' that we only need to use for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if we decide to have just one identity online, using disposable email addresses prevents sites from building up a history of our activities and ensures that if that account gets compromised we can simply delete it and create a new one, keeping our digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are:''' '''https://anonbox.net'''&amp;lt;nowiki/&amp;gt;''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': ''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to our main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised we can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill our main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org).&lt;br /&gt;
&lt;br /&gt;
==== Commercial social platforms ====&lt;br /&gt;
&lt;br /&gt;
Whatever social networking platform we decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
Also be very careful about the''' profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for us in that social network, regardless of our privacy settings.&lt;br /&gt;
&lt;br /&gt;
Make sure your contacts do not overlap with your other identities, and to make sure your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when we interact with the platform using a GPS-enabled phone, but the network our computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
If we access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide our trails is to publish from our various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read: &lt;br /&gt;
* https://www.facebook.com/help/389849807718635 &lt;br /&gt;
* Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
It can be a good idea to follow, from our pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance our real identity from our pseudonymous identities, we can also write (and hashtag on Twitter) posts under our pseudonymous profiles about events that we are not attending, especially if they are taking place far away from us. It can also be fun to publish and then delete posts that look like we have exposed our identity, so as to further confuse anyone who may try to unmask us.&lt;br /&gt;
&lt;br /&gt;
==== Alternative social platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if our aim is to publicise as widely as possible an event we are organizing or a project we are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close our accounts if they find that our contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If we add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to our data, the best solution is to limit the use of commercial social networking platforms to specific projects we want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)], '''N-1''' 8https://n-1.cc/) and '''Crabgrass '''(https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so we way wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, we should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (eg related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, How is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can we choose to share our videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of our activity and information?&lt;br /&gt;
&lt;br /&gt;
==== Creating a blog or website ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com).  Based on it, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org/ http://noblogs.org) and Nadir’s '''BlackBlogs '''– (http://blackblogs.org/ http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see &amp;lt;nowiki/&amp;gt;https://www.autistici.org/en/links.html &amp;lt;nowiki/&amp;gt;and &amp;lt;nowiki/&amp;gt;https://blackblogs.org/policy &amp;lt;nowiki/&amp;gt;respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
If we want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, we can create our own website. For this we need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If we want to use our own '''domain''' name, bypassing payments and identifications may get difficult unless we use Bitcoin or another pseudonymous payment system. The personal data we will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, we can register our domain with the data of an association and use a prepaid credit card that is not connected to our own data (if available in our country). Alternatively, we can use a registrar like Gandi.net ([https://www.gandi.net/ https://www.gandi.net]) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting us; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic, approach is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that we want to secure.&lt;br /&gt;
&lt;br /&gt;
If we use the same operating system for our several identities, no matter how carefully we separate our profiles we can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile we have assigned to our 'real' identity, or get infected by a malware that allows our attacker to monitor everything we do online, with all our identities. Both risks can be limited by using a virtual machine for each of our domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on our physical computer. We can think of a VM as a ''computer within a computer''. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For our purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== Whonix' ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix '''(https://www.whonix.org) is an operating system that aims at protecting our anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. Whonix’s website offers a wide documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== Tails ====&lt;br /&gt;
&lt;br /&gt;
'''Tails''', or '''The Amnesic Incognito Live System''', a free and open-source Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections. When we launch Tails, we have a complete operating system that comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, we can access the internet, communicate, and do all we need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless we ask it to do so.&lt;br /&gt;
&lt;br /&gt;
==== Qubes OS ====&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' – https://www.qubes-os.org – is a free and open-source security-oriented operating system based on '''Fedora''', a Linux distribution, and '''Xen''', a virtual machine that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things we do on our computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, we can do everything on a single physical computer without having to worry that one successful cyberattack harms our whole system, potentially revealing all the connections among our several identities.&lt;br /&gt;
&lt;br /&gt;
==== What to choose ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described – Tails, Whonix and Qubes OS – allow us to use a completely separate operating system for managing our alternate identities, and can be quite useful to make sure that we don’t reveal our true identity while we use the anonymous one(s).&lt;br /&gt;
&lt;br /&gt;
Using '''Tails''' is pretty easy, and if what we need to do with our alternate persona needs a focus on ''anonymization'', then it may be worthwhile to overcome the initial obstacle. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. But if on the other hand we need ''persistence'' and we want to keep some files or actions we have created we need to enable this option when we start the system. Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what we need is both ''anonymity'' and ''security by isolation'' and we have a good machine – https://www.whonix.org/wiki/System_Requirements – where we can run Virtualbox and installing '''Whonix''', according to the number of our alternative identities it seems a good solution that caters to all our needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if we want to keep all our activities inside our own computer without having to install anything else and if what we are trying to do is to effectively ''separate'' our identities rather than anonymize our activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if we feel that we really need to protect ourselves against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protects us from every threat, and we shouldn’t look at them as a magic potion that will make us invulnerable. Nevertheless, by using any of them, according to our needs and resources, we will raise the level of effort that an attacker will need to harm us, thus making an attack less likely. For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&amp;lt;nowiki/&amp;gt;&amp;lt;nowiki/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1347</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1347"/>
				<updated>2015-05-28T10:11:46Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
== Understanding digital shadows ==&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, it has also become a space where people who question or challenge dominant discourses - especially where those deal with gender and sexual orientation - are silenced, harassed and threatened. &lt;br /&gt;
&lt;br /&gt;
If you are active on the internet as women, human rights defenders, trans* or queer persons, and/or feminists, you'll probably want to make sure your privacy and security are protected as much as possible. &lt;br /&gt;
&lt;br /&gt;
A good place to start is by assessing the traces you are leaving behind on the internet, by getting to know your digital shadow and understanding how you organise your social domains and networks across your online and physical activities. &lt;br /&gt;
&lt;br /&gt;
The traces you leave online can tell very accurate stories about you; who you are, were you live and hang out; what you are interested in and who your friends and collaborators are. This information can expose you to several threats, including online harassment - particularly where the traces you leave behind are publicly available. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' you can use to take more control over your digital shadows - to increase your privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing your activity online.  &lt;br /&gt;
Some examples of these strategies and tools include controlling the amount of data you give away by consciously stripping valuable information from content and metadata; trying the art of self-doxing; and thinking about ways to play with and break up your online identity.&lt;br /&gt;
&lt;br /&gt;
Your digital shadow is the story data tells about you. This digital shadow is created by trillions of bits of data, left behind in the digital world when you connect to the internet, your mobile phones and your other online services. These digital shadows ultimately have a life of their own. They can be affected by others and can change in unpredictable ways. They grow continuously, and can be permanent, encompassing both your past and present activities. &lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' &lt;br /&gt;
The devices and the software you use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data. These bits of data can include your name, location, contacts, pictures, messages, tweets and likes, but also the brand of your computer, length of your phone calls and information about which websites you visit. These data traces can be put out there by yourself as well as by other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' &lt;br /&gt;
In some cases you '''actively '''share data – for example when you share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about you, by tagging you in pictures, mentioning you in tweets or simply by communicating with you. In other cases, you give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
&lt;br /&gt;
Your browsing habits and IP address are shared when you visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites you visit, and the information shared is collected for a wide range of purposes, from website analytics to advertising. Your mobile phone apps also collect data on you without your active knowledge or consent – for example, the photos you take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow you as you move from one service to another - from your internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in your readers to publishing pictures from the latest protest you covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of your messages, blogs, tweets and phone calls; it is your pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables your email to be delivered, files on your computer to be found and mobile communication to work. Metadata can include your email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the technological infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognised by computers.&lt;br /&gt;
&lt;br /&gt;
==== Who collects data? ====   &lt;br /&gt;
&lt;br /&gt;
You might wonder about the importance of one picture, one message, or one call. You might think there is so much data out there that nobody knows what to do with it, or cares that much about it. &lt;br /&gt;
&lt;br /&gt;
However, there are in reality a number of parties interested in this data - including companies, governments and individuals - and data collection and data analysis is by now very sophisticated. The data traces you leave behind online are constantly being collected, analysed and sorted by various parties to create profiles on you; and every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by these companies, governments and individuals for a variety of purposes. Profiles can be bought and sold;  data can be used to control, suppress or silence; it can be used to create harassment strategies. &lt;br /&gt;
&lt;br /&gt;
Data can be used to gain insight into who you are, what you do, where you have been and with whom you have been interacting. This information can then be used to make predictions on what you might do or where you might be in future. For example, if someone knows that you are an outspoken blogger on gender issues in country x, they know that you will probably be present at a conference on blogging and women held in that country. &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to your digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. &lt;br /&gt;
&lt;br /&gt;
You can't know exactly what is happening to our digital shadow, and that itself is a problem. Fortunately, there are many tools and tactics you can use to manage your digital shadows and to limit their ramifications in terms of profiling, control and surveillance. This will be discussed in the rest of this section. &lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
To move towards getting some control over your digital shadow, a good place to start is to see what it looks like (as far as is possible)&lt;br /&gt;
&lt;br /&gt;
* '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – is a tool launched by Tactical Tech that allows you to see what traces you are leaving online, and it offers a lot of tips on how to protect your privacy. &lt;br /&gt;
* Identifying and materialising social networks across your online and physical activities: John Fass, researcher and designer at the Royal College of Art, offers some activities for visualising your social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* A tool called '''OpenPaths.cc''' allows you to see through the eyes of your mobile phone. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone you can change the permissions for each app under its privacy setting. LINK?? &lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
The good news is that you can partly control what content and metadata you give away. When you publish content on the web, it is always a good idea to ask yourself if what you are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to your personal life, the names you mention or the images you upload may contribute to a picture about who you are, what you are doing, where you are doing it and so on. This could be used by people who wish to target you. &lt;br /&gt;
&lt;br /&gt;
This does not mean that you should silence yourself – by taking some basic measures, you can limit your risks by increasing the level of the effort that would be required to attack you or your contacts.&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like your IP address''', thereby increasing your anonymity online.&lt;br /&gt;
&lt;br /&gt;
* '''Use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about your life''', you can use private profiles that can only be accessed by selected contacts. When using those on commercial social media, you should be aware of the regular changes to the privacy policies of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web, you should ask yourself if the information you spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices. https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or '''Adblock Plus''', as well as by monitoring your privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not using your real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or you can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing metada from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
==== Self-Doxing ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet and constitute a type of social engineering technique. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find his or her flaws.&lt;br /&gt;
&amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;). Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser. Useful tips on self-doxing tools and techniques can be found here: &lt;br /&gt;
* https://lilithlela.cyberguerrilla.org/?page_id=93870  &lt;br /&gt;
* https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* Ubisoft’s '''Digital Shadow''' is a Facebook app which illustrates what third parties can know about you through your Facebook profile: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== Mapping our social domains ====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”. Everyone belongs to several '''social domains''' - your work or advocacy networks, your family networks, friends, and sports teams. Some networks may feel more secure than others. For example, you may tend to have a more secure communication practices for your work or advocacy activities, but less secure practices for interacting with friends on a social networking platform. &lt;br /&gt;
&lt;br /&gt;
If you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in a social networking platform that you like a particular kind of game, an attacker who wants to investigate your work or advocacy activities might trick you into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if your work identity and your gaming profile can be connected to the same person; and this is why separating your social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
To separate your social domains, it's helpful to first map them out and identify which ones could expose you most. You can do this by thinking about your different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
For instance, Polish computer security researcher Joanna Rutkowska has developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain, including her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the encrypted communication with her partner.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain includes the totally untrusted areas which don’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
You can find more details about her scheme here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
==== Deleting identities ====&lt;br /&gt;
&lt;br /&gt;
If you decide to separate your social domains by creating multiple identities, you should decide whether to delete or keep the identity or identities that you already have.  To do this, you can start by investigating the traces of your existing identity or identities. (For methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;). If you opt for deleting existing accounts, you can visit the following places:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitates the process of deleting social media profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once you have identified your different social domains and the digital activities and contacts that go with them, what you need to do is decide if you want to differentiate your identities accordingly, or if you'd rather stick to your official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
You may want to keep your work connected to your legal or &amp;quot;real&amp;quot; identity, or think that your activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social media, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific context the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once you have '''assessed our risk''', you can then consider different strategies for separating your identities online.  For more on assessing risk visit: https://ssd.eff.org/en/module/introduction-threat-modeling&lt;br /&gt;
&lt;br /&gt;
'''Strategies''' for maintaining separate identities can range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding (http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name) talks about her decision to start writing under her real name, dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously Vani, a human rights activist, writes]: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”.&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where you don't need to gain other people's trust, when there are few or no people you can trust, or when you don't want to expose others in your life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance, you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you, as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When you adopt anonymity as a strategy you may use pseudonyms, but these should not be used across different networks or social domains, and some may only be used once and then discarded. Because of this, anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. For more information on how to be anonymous online, see the security recommendations at the beginning of this manual and '''Anonymizing tools''' in Step0 in the wiki.&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. There are [[https://www.eff.org/deeplinks/2011/07/case-pseudonyms|myriad reasons why individuals may wish to use a name other than the one they were born with]]. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent harassment and discrimination or they may use a name that’s easier to pronounce or spell in a given culture. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot; applying a real name policy which typically means using your legal name or the name by which you are commonly known. This policy has caused many user to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that we can be reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is [https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community using a name-shaped pseudonym].&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers us '''visibility''' which allows us to network with others, and by pinning our voice to a particular name we can develop an '''online reputation'''. This depends on others to decide whether we are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to our legal identity, or not. The choice to connect our online reputation to our &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity.  &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice we make, what is important is that we keep our domains effectively separated. No matter how many domains we identify in our digital life, and how many corresponding identities we create, on the internet every identity - even the one bearing our real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example Tor or TAILS)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonym could be linked to our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify us across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if we are also using our real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' We may think that deleting certain sensitive data from social networks and web services may be enough to protect ourselves, but metadata cannot be deleted as easily.  And using just one identity through our whole life - in all our work and personal domains - creates a bulk of information that makes it easier to profile us. &lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of our social domains. We might also choose to use our real identity in some areas, and our new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When we create a new identity, we should select the contacts for each one carefully, and avoid sharing contacts with other identities we use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* Our various identities should not linked to each other, or to our real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number.&lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be useful, as they can be discarded easily if compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be created for new acquaintances when appropriate as introductory profiles to get to know somebody before we include them in our more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgment on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If we want to use commercial social networks, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that we use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once we have decided on a name, a surname, and a username for our virtual persona, we should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if we wish to develop our own reputation, we don’t want to be confused with someone else, especially if they don’t share our views of the world!&lt;br /&gt;
&lt;br /&gt;
Then we need to create story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role.  We can invent a new story if we feel particularly inspired or base our story on a “known” person’s story, a superhero, a fictional character from our favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when we create an identity we should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== Credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If we keep all our normal identifying traits - such as our gender, job, attitude or the way we write - it might be possible for someone to connect the dots and connect our pseudonymous personas with our real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': Our persona should have a job that is different from ours, but not so different that we don’t know anything about that field: for example, they shouldn’t be a surgeon if we don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select our persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': This could be identified through a &amp;quot;stylometric analysis&amp;quot; that make it possible to identify the author of a particular text. To change this, we can start by using a spell-checker in our word processor to check for consistent typos and we could also think about adopting a different writing attitude. We could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': A good rule of thumb is to give our persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, we are able to weather the strikes and even have some fun in the process. &lt;br /&gt;
&lt;br /&gt;
In any case, we should always remember that on the internet, each one of our identities - even the one connected to our real name - is a “virtual” identity, and it is always better to decide what character traits we want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for our “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for our identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Once we have created several personas, it's important keep them separate in both our physical and digital lives. While keeping notes on our identities might help ensure that we remember our story, there are technical measures we can take to make sure that our profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social network accounts''' for each of our identities. A good method is to always use different apps for each account/identity and, if possible, to separate our identities per device or operating system (see '''6. A different machine for each identity'''). &lt;br /&gt;
To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles  . For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains we need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all we need is a '''disposable email address''' that we only need to use for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if we decide to have just one identity online, using disposable email addresses prevents sites from building up a history of our activities and ensures that if that account gets compromised we can simply delete it and create a new one, keeping our digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are:''' '''https://anonbox.net'''&amp;lt;nowiki/&amp;gt;''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': ''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to our main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised we can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill our main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org).&lt;br /&gt;
&lt;br /&gt;
==== Commercial social platforms ====&lt;br /&gt;
&lt;br /&gt;
Whatever social networking platform we decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
Also be very careful about the''' profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for us in that social network, regardless of our privacy settings.&lt;br /&gt;
&lt;br /&gt;
Make sure your contacts do not overlap with your other identities, and to make sure your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when we interact with the platform using a GPS-enabled phone, but the network our computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
If we access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide our trails is to publish from our various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read: &lt;br /&gt;
* https://www.facebook.com/help/389849807718635 &lt;br /&gt;
* Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
It can be a good idea to follow, from our pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance our real identity from our pseudonymous identities, we can also write (and hashtag on Twitter) posts under our pseudonymous profiles about events that we are not attending, especially if they are taking place far away from us. It can also be fun to publish and then delete posts that look like we have exposed our identity, so as to further confuse anyone who may try to unmask us.&lt;br /&gt;
&lt;br /&gt;
==== Alternative social platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if our aim is to publicise as widely as possible an event we are organizing or a project we are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close our accounts if they find that our contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If we add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to our data, the best solution is to limit the use of commercial social networking platforms to specific projects we want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)], '''N-1''' 8https://n-1.cc/) and '''Crabgrass '''(https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so we way wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, we should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (eg related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, How is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can we choose to share our videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of our activity and information?&lt;br /&gt;
&lt;br /&gt;
==== Creating a blog or website ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com).  Based on it, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org/ http://noblogs.org) and Nadir’s '''BlackBlogs '''– (http://blackblogs.org/ http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see &amp;lt;nowiki/&amp;gt;https://www.autistici.org/en/links.html &amp;lt;nowiki/&amp;gt;and &amp;lt;nowiki/&amp;gt;https://blackblogs.org/policy &amp;lt;nowiki/&amp;gt;respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
If we want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, we can create our own website. For this we need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If we want to use our own '''domain''' name, bypassing payments and identifications may get difficult unless we use Bitcoin or another pseudonymous payment system. The personal data we will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, we can register our domain with the data of an association and use a prepaid credit card that is not connected to our own data (if available in our country). Alternatively, we can use a registrar like Gandi.net ([https://www.gandi.net/ https://www.gandi.net]) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting us; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic, approach is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that we want to secure.&lt;br /&gt;
&lt;br /&gt;
If we use the same operating system for our several identities, no matter how carefully we separate our profiles we can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile we have assigned to our 'real' identity, or get infected by a malware that allows our attacker to monitor everything we do online, with all our identities. Both risks can be limited by using a virtual machine for each of our domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on our physical computer. We can think of a VM as a ''computer within a computer''. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For our purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== Whonix' ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix '''(https://www.whonix.org) is an operating system that aims at protecting our anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. Whonix’s website offers a wide documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== Tails ====&lt;br /&gt;
&lt;br /&gt;
'''Tails''', or '''The Amnesic Incognito Live System''', a free and open-source Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections. When we launch Tails, we have a complete operating system that comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, we can access the internet, communicate, and do all we need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless we ask it to do so.&lt;br /&gt;
&lt;br /&gt;
==== Qubes OS ====&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' – https://www.qubes-os.org – is a free and open-source security-oriented operating system based on '''Fedora''', a Linux distribution, and '''Xen''', a virtual machine that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things we do on our computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, we can do everything on a single physical computer without having to worry that one successful cyberattack harms our whole system, potentially revealing all the connections among our several identities.&lt;br /&gt;
&lt;br /&gt;
==== What to choose ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described – Tails, Whonix and Qubes OS – allow us to use a completely separate operating system for managing our alternate identities, and can be quite useful to make sure that we don’t reveal our true identity while we use the anonymous one(s).&lt;br /&gt;
&lt;br /&gt;
Using '''Tails''' is pretty easy, and if what we need to do with our alternate persona needs a focus on ''anonymization'', then it may be worthwhile to overcome the initial obstacle. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. But if on the other hand we need ''persistence'' and we want to keep some files or actions we have created we need to enable this option when we start the system. Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what we need is both ''anonymity'' and ''security by isolation'' and we have a good machine – https://www.whonix.org/wiki/System_Requirements – where we can run Virtualbox and installing '''Whonix''', according to the number of our alternative identities it seems a good solution that caters to all our needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if we want to keep all our activities inside our own computer without having to install anything else and if what we are trying to do is to effectively ''separate'' our identities rather than anonymize our activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if we feel that we really need to protect ourselves against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protects us from every threat, and we shouldn’t look at them as a magic potion that will make us invulnerable. Nevertheless, by using any of them, according to our needs and resources, we will raise the level of effort that an attacker will need to harm us, thus making an attack less likely. For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&amp;lt;nowiki/&amp;gt;&amp;lt;nowiki/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1345</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1345"/>
				<updated>2015-05-28T10:02:56Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
== Understanding digital shadows ==&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, it has also become a space where people who question or challenge dominant discourses - especially where those deal with gender and sexual orientation - are silenced, harassed and threatened. &lt;br /&gt;
&lt;br /&gt;
If you are active on the internet as women, human rights defenders, trans* or queer persons, and/or feminists, you'll probably want to make sure your privacy and security are protected as much as possible. &lt;br /&gt;
&lt;br /&gt;
A good place to start is by assessing the traces you are leaving behind on the internet, by getting to know your digital shadow and understanding how you organise your social domains and networks across your online and physical activities. &lt;br /&gt;
&lt;br /&gt;
The traces you leave online can tell very accurate stories about you; who you are, were you live and hang out; what you are interested in and who your friends and collaborators are. This information can expose you to several threats, including online harassment - particularly where the traces you leave behind are publicly available. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' you can use to take more control over your digital shadows - to increase your privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing your activity online.  &lt;br /&gt;
Some examples of these strategies and tools include controlling the amount of data you give away by consciously stripping valuable information from content and metadata; trying the art of self-doxing; and thinking about ways to play with and break up your online identity.&lt;br /&gt;
&lt;br /&gt;
Your digital shadow is the story data tells about you. This digital shadow is created by trillions of bits of data, left behind in the digital world when you connect to the internet, your mobile phones and your other online services. These digital shadows ultimately have a life of their own. They can be affected by others and can change in unpredictable ways. They grow continuously, and can be permanent, encompassing both your past and present activities. &lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' &lt;br /&gt;
The devices and the software you use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data. These bits of data can include your name, location, contacts, pictures, messages, tweets and likes, but also the brand of your computer, length of your phone calls and information about which websites you visit. These data traces can be put out there by yourself as well as by other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' &lt;br /&gt;
In some cases you '''actively '''share data – for example when you share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about you, by tagging you in pictures, mentioning you in tweets or simply by communicating with you. In other cases, you give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
&lt;br /&gt;
Your browsing habits and IP address are shared when you visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites you visit, and the information shared is collected for a wide range of purposes, from website analytics to advertising. Your mobile phone apps also collect data on you without your active knowledge or consent – for example, the photos you take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow you as you move from one service to another - from your internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in your readers to publishing pictures from the latest protest you covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of your messages, blogs, tweets and phone calls; it is your pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables your email to be delivered, files on your computer to be found and mobile communication to work. Metadata can include your email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the technological infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognised by computers.&lt;br /&gt;
&lt;br /&gt;
==== Who collects data? ====   &lt;br /&gt;
&lt;br /&gt;
You might wonder about the importance of one picture, one message, or one call. You might think there is so much data out there that nobody knows what to do with it, or cares that much about it. &lt;br /&gt;
&lt;br /&gt;
However, there are in reality a number of parties interested in this data - including companies, governments and individuals - and data collection and data analysis is by now very sophisticated. The data traces you leave behind online are constantly being collected, analysed and sorted by various parties to create profiles on you; and every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by these companies, governments and individuals for a variety of purposes. Profiles can be bought and sold;  data can be used to control, suppress or silence; it can be used to create harassment strategies. &lt;br /&gt;
&lt;br /&gt;
Data can be used to gain insight into who you are, what you do, where you have been and with whom you have been interacting. This information can then be used to make predictions on what you might do or where you might be in future. For example, if someone knows that you are an outspoken blogger on gender issues in country x, they know that you will probably be present at a conference on blogging and women held in that country. &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to your digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. &lt;br /&gt;
&lt;br /&gt;
You can't know exactly what is happening to our digital shadow, and that itself is a problem. Fortunately, there are many tools and tactics you can use to manage your digital shadows and to limit their ramifications in terms of profiling, control and surveillance. This will be discussed in the rest of this section. &lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
To move towards getting some control over your digital shadow, a good place to start is to see what it looks like (as far as is possible)&lt;br /&gt;
&lt;br /&gt;
* '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – is a tool launched by Tactical Tech that allows you to see what traces you are leaving online, and it offers a lot of tips on how to protect your privacy. &lt;br /&gt;
* Identifying and materialising social networks across your online and physical activities: John Fass, researcher and designer at the Royal College of Art, offers some activities for visualising your social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* A tool called '''OpenPaths.cc''' allows you to see through the eyes of your mobile phone. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone you can change the permissions for each app under its privacy setting. LINK?? &lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
The good news is that you can partly control what content and metadata you give away. When you publish content on the web, it is always a good idea to ask yourself if what you are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to your personal life, the names you mention or the images you upload may contribute to a picture about who you are, what you are doing, where you are doing it and so on. This could be used by people who wish to target you. &lt;br /&gt;
&lt;br /&gt;
This does not mean that you should silence yourself – by taking some basic measures, you can limit your risks by increasing the level of the effort that would be required to attack you or your contacts.&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like your IP address''', thereby increasing your anonymity online.&lt;br /&gt;
&lt;br /&gt;
* '''Use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about your life''', you can use private profiles that can only be accessed by selected contacts. When using those on commercial social media, you should be aware of the regular changes to the privacy policies of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web, you should ask yourself if the information you spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices. https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or '''Adblock Plus''', as well as by monitoring your privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not using your real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or you can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing metada from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
==== Self-Doxing ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet and constitute a type of social engineering technique. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find his or her flaws.&lt;br /&gt;
&amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;). Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser. Useful tips on self-doxing tools and techniques can be found here: &lt;br /&gt;
* https://lilithlela.cyberguerrilla.org/?page_id=93870  &lt;br /&gt;
* https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* Ubisoft’s '''Digital Shadow''' is a Facebook app which illustrates what third parties can know about you through your Facebook profile: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== Mapping our social domains ====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”. Everyone belongs to several '''social domains''' - your work or advocacy networks, your family networks, friends, and sports teams. Some networks may feel more secure than others. For example, you may tend to have a more secure communication practices for your work or advocacy activities, but less secure practices for interacting with friends on a social networking platform. &lt;br /&gt;
&lt;br /&gt;
If you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in a social networking platform that you like a particular kind of game, an attacker who wants to investigate your work or advocacy activities might trick you into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if your work identity and your gaming profile can be connected to the same person; and this is why separating your social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
To separate your social domains, it's helpful to first map them out and identify which ones could expose you most. You can do this by thinking about your different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
For instance, Polish computer security researcher Joanna Rutkowska has developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain, including her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the encrypted communication with her partner.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain includes the totally untrusted areas which don’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
You can find more details about her scheme here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
==== Deleting identities ====&lt;br /&gt;
&lt;br /&gt;
If you decide to separate your social domains by creating multiple identities, you should decide whether to delete or keep the identity or identities that you already have.  To do this, you can start by investigating the traces of your existing identity or identities. (For methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;). If you opt for deleting existing accounts, you can visit the following places:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitates the process of deleting social media profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once we have identified our different social domains and the digital activities and contacts that go with them, what we need to do is decide if we want to differentiate our identities accordingly, or if we'd rather stick to our official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
We may want to keep our work connected to our legal or &amp;quot;real&amp;quot; identity, or think that our activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social networks, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific context the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once we have '''assessed our risk,''' we can then consider different strategies for separating our identities online.  For more on assessing risk visit: https://ssd.eff.org/en/module/introduction-threat-modeling  &lt;br /&gt;
'''Strategies''' for maintaining separate identities can range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding [http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name talks about her decision to start writing under her real name], dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously Vani, a human rights activist, writes]: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”.&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where we don't need to gain other people's trust, when there are few or no people we can trust, or when we don't want to expose others in our life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When we adopt anonymity as a strategy we may use pseudonyms, but these should not used across different networks or social domains, and some may only be used once and then discarded. Because of this anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. For more information on how to be anonymous online, see '''Anonymizing tools'''.&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. There are [[https://www.eff.org/deeplinks/2011/07/case-pseudonyms|myriad reasons why individuals may wish to use a name other than the one they were born with]]. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent harassment and discrimination or they may use a name that’s easier to pronounce or spell in a given culture. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot; applying a real name policy which typically means using your legal name or the name by which you are commonly known. This policy has caused many user to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that we can be reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is [https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community using a name-shaped pseudonym].&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers us '''visibility''' which allows us to network with others, and by pinning our voice to a particular name we can develop an '''online reputation'''. This depends on others to decide whether we are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to our legal identity, or not. The choice to connect our online reputation to our &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity.  &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice we make, what is important is that we keep our domains effectively separated. No matter how many domains we identify in our digital life, and how many corresponding identities we create, on the internet every identity - even the one bearing our real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example Tor or TAILS)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonym could be linked to our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify us across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if we are also using our real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' We may think that deleting certain sensitive data from social networks and web services may be enough to protect ourselves, but metadata cannot be deleted as easily.  And using just one identity through our whole life - in all our work and personal domains - creates a bulk of information that makes it easier to profile us. &lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of our social domains. We might also choose to use our real identity in some areas, and our new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When we create a new identity, we should select the contacts for each one carefully, and avoid sharing contacts with other identities we use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* Our various identities should not linked to each other, or to our real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number.&lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be useful, as they can be discarded easily if compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be created for new acquaintances when appropriate as introductory profiles to get to know somebody before we include them in our more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgment on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If we want to use commercial social networks, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that we use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once we have decided on a name, a surname, and a username for our virtual persona, we should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if we wish to develop our own reputation, we don’t want to be confused with someone else, especially if they don’t share our views of the world!&lt;br /&gt;
&lt;br /&gt;
Then we need to create story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role.  We can invent a new story if we feel particularly inspired or base our story on a “known” person’s story, a superhero, a fictional character from our favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when we create an identity we should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== Credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If we keep all our normal identifying traits - such as our gender, job, attitude or the way we write - it might be possible for someone to connect the dots and connect our pseudonymous personas with our real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': Our persona should have a job that is different from ours, but not so different that we don’t know anything about that field: for example, they shouldn’t be a surgeon if we don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select our persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': This could be identified through a &amp;quot;stylometric analysis&amp;quot; that make it possible to identify the author of a particular text. To change this, we can start by using a spell-checker in our word processor to check for consistent typos and we could also think about adopting a different writing attitude. We could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': A good rule of thumb is to give our persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, we are able to weather the strikes and even have some fun in the process. &lt;br /&gt;
&lt;br /&gt;
In any case, we should always remember that on the internet, each one of our identities - even the one connected to our real name - is a “virtual” identity, and it is always better to decide what character traits we want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for our “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for our identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Once we have created several personas, it's important keep them separate in both our physical and digital lives. While keeping notes on our identities might help ensure that we remember our story, there are technical measures we can take to make sure that our profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social network accounts''' for each of our identities. A good method is to always use different apps for each account/identity and, if possible, to separate our identities per device or operating system (see '''6. A different machine for each identity'''). &lt;br /&gt;
To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles  . For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains we need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all we need is a '''disposable email address''' that we only need to use for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if we decide to have just one identity online, using disposable email addresses prevents sites from building up a history of our activities and ensures that if that account gets compromised we can simply delete it and create a new one, keeping our digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are:''' '''https://anonbox.net'''&amp;lt;nowiki/&amp;gt;''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': ''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to our main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised we can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill our main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org).&lt;br /&gt;
&lt;br /&gt;
==== Commercial social platforms ====&lt;br /&gt;
&lt;br /&gt;
Whatever social networking platform we decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
Also be very careful about the''' profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for us in that social network, regardless of our privacy settings.&lt;br /&gt;
&lt;br /&gt;
Make sure your contacts do not overlap with your other identities, and to make sure your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when we interact with the platform using a GPS-enabled phone, but the network our computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
If we access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide our trails is to publish from our various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read: &lt;br /&gt;
* https://www.facebook.com/help/389849807718635 &lt;br /&gt;
* Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
It can be a good idea to follow, from our pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance our real identity from our pseudonymous identities, we can also write (and hashtag on Twitter) posts under our pseudonymous profiles about events that we are not attending, especially if they are taking place far away from us. It can also be fun to publish and then delete posts that look like we have exposed our identity, so as to further confuse anyone who may try to unmask us.&lt;br /&gt;
&lt;br /&gt;
==== Alternative social platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if our aim is to publicise as widely as possible an event we are organizing or a project we are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close our accounts if they find that our contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If we add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to our data, the best solution is to limit the use of commercial social networking platforms to specific projects we want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)], '''N-1''' 8https://n-1.cc/) and '''Crabgrass '''(https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so we way wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, we should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (eg related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, How is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can we choose to share our videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of our activity and information?&lt;br /&gt;
&lt;br /&gt;
==== Creating a blog or website ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com).  Based on it, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org/ http://noblogs.org) and Nadir’s '''BlackBlogs '''– (http://blackblogs.org/ http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see &amp;lt;nowiki/&amp;gt;https://www.autistici.org/en/links.html &amp;lt;nowiki/&amp;gt;and &amp;lt;nowiki/&amp;gt;https://blackblogs.org/policy &amp;lt;nowiki/&amp;gt;respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
If we want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, we can create our own website. For this we need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If we want to use our own '''domain''' name, bypassing payments and identifications may get difficult unless we use Bitcoin or another pseudonymous payment system. The personal data we will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, we can register our domain with the data of an association and use a prepaid credit card that is not connected to our own data (if available in our country). Alternatively, we can use a registrar like Gandi.net ([https://www.gandi.net/ https://www.gandi.net]) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting us; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic, approach is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that we want to secure.&lt;br /&gt;
&lt;br /&gt;
If we use the same operating system for our several identities, no matter how carefully we separate our profiles we can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile we have assigned to our 'real' identity, or get infected by a malware that allows our attacker to monitor everything we do online, with all our identities. Both risks can be limited by using a virtual machine for each of our domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on our physical computer. We can think of a VM as a ''computer within a computer''. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For our purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== Whonix' ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix '''(https://www.whonix.org) is an operating system that aims at protecting our anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. Whonix’s website offers a wide documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== Tails ====&lt;br /&gt;
&lt;br /&gt;
'''Tails''', or '''The Amnesic Incognito Live System''', a free and open-source Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections. When we launch Tails, we have a complete operating system that comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, we can access the internet, communicate, and do all we need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless we ask it to do so.&lt;br /&gt;
&lt;br /&gt;
==== Qubes OS ====&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' – https://www.qubes-os.org – is a free and open-source security-oriented operating system based on '''Fedora''', a Linux distribution, and '''Xen''', a virtual machine that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things we do on our computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, we can do everything on a single physical computer without having to worry that one successful cyberattack harms our whole system, potentially revealing all the connections among our several identities.&lt;br /&gt;
&lt;br /&gt;
==== What to choose ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described – Tails, Whonix and Qubes OS – allow us to use a completely separate operating system for managing our alternate identities, and can be quite useful to make sure that we don’t reveal our true identity while we use the anonymous one(s).&lt;br /&gt;
&lt;br /&gt;
Using '''Tails''' is pretty easy, and if what we need to do with our alternate persona needs a focus on ''anonymization'', then it may be worthwhile to overcome the initial obstacle. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. But if on the other hand we need ''persistence'' and we want to keep some files or actions we have created we need to enable this option when we start the system. Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what we need is both ''anonymity'' and ''security by isolation'' and we have a good machine – https://www.whonix.org/wiki/System_Requirements – where we can run Virtualbox and installing '''Whonix''', according to the number of our alternative identities it seems a good solution that caters to all our needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if we want to keep all our activities inside our own computer without having to install anything else and if what we are trying to do is to effectively ''separate'' our identities rather than anonymize our activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if we feel that we really need to protect ourselves against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protects us from every threat, and we shouldn’t look at them as a magic potion that will make us invulnerable. Nevertheless, by using any of them, according to our needs and resources, we will raise the level of effort that an attacker will need to harm us, thus making an attack less likely. For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&amp;lt;nowiki/&amp;gt;&amp;lt;nowiki/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1344</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1344"/>
				<updated>2015-05-28T10:01:33Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
== Understanding digital shadows ==&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, it has also become a space where people who question or challenge dominant discourses - especially where those deal with gender and sexual orientation - are silenced, harassed and threatened. &lt;br /&gt;
&lt;br /&gt;
If you are active on the internet as women, human rights defenders, trans* or queer persons, and/or feminists, you'll probably want to make sure your privacy and security are protected as much as possible. &lt;br /&gt;
&lt;br /&gt;
A good place to start is by assessing the traces you are leaving behind on the internet, by getting to know your digital shadow and understanding how you organise your social domains and networks across your online and physical activities. &lt;br /&gt;
&lt;br /&gt;
The traces you leave online can tell very accurate stories about you; who you are, were you live and hang out; what you are interested in and who your friends and collaborators are. This information can expose you to several threats, including online harassment - particularly where the traces you leave behind are publicly available. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' you can use to take more control over your digital shadows - to increase your privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing your activity online.  &lt;br /&gt;
Some examples of these strategies and tools include controlling the amount of data you give away by consciously stripping valuable information from content and metadata; trying the art of self-doxing; and thinking about ways to play with and break up your online identity.&lt;br /&gt;
&lt;br /&gt;
Your digital shadow is the story data tells about you. This digital shadow is created by trillions of bits of data, left behind in the digital world when you connect to the internet, your mobile phones and your other online services. These digital shadows ultimately have a life of their own. They can be affected by others and can change in unpredictable ways. They grow continuously, and can be permanent, encompassing both your past and present activities. &lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' &lt;br /&gt;
The devices and the software you use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data. These bits of data can include your name, location, contacts, pictures, messages, tweets and likes, but also the brand of your computer, length of your phone calls and information about which websites you visit. These data traces can be put out there by yourself as well as by other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' &lt;br /&gt;
In some cases you '''actively '''share data – for example when you share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about you, by tagging you in pictures, mentioning you in tweets or simply by communicating with you. In other cases, you give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
&lt;br /&gt;
Your browsing habits and IP address are shared when you visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites you visit, and the information shared is collected for a wide range of purposes, from website analytics to advertising. Your mobile phone apps also collect data on you without your active knowledge or consent – for example, the photos you take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow you as you move from one service to another - from your internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in your readers to publishing pictures from the latest protest you covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of your messages, blogs, tweets and phone calls; it is your pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables your email to be delivered, files on your computer to be found and mobile communication to work. Metadata can include your email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the technological infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognised by computers.&lt;br /&gt;
&lt;br /&gt;
==== Who collects data? ====   &lt;br /&gt;
&lt;br /&gt;
You might wonder about the importance of one picture, one message, or one call. You might think there is so much data out there that nobody knows what to do with it, or cares that much about it. &lt;br /&gt;
&lt;br /&gt;
However, there are in reality a number of parties interested in this data - including companies, governments and individuals - and data collection and data analysis is by now very sophisticated. The data traces you leave behind online are constantly being collected, analysed and sorted by various parties to create profiles on you; and every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by these companies, governments and individuals for a variety of purposes. Profiles can be bought and sold;  data can be used to control, suppress or silence; it can be used to create harassment strategies. &lt;br /&gt;
&lt;br /&gt;
Data can be used to gain insight into who you are, what you do, where you have been and with whom you have been interacting. This information can then be used to make predictions on what you might do or where you might be in future. For example, if someone knows that you are an outspoken blogger on gender issues in country x, they know that you will probably be present at a conference on blogging and women held in that country. &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to your digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. &lt;br /&gt;
&lt;br /&gt;
You can't know exactly what is happening to our digital shadow, and that itself is a problem. Fortunately, there are many tools and tactics you can use to manage your digital shadows and to limit their ramifications in terms of profiling, control and surveillance. This will be discussed in the rest of this section. &lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
To move towards getting some control over your digital shadow, a good place to start is to see what it looks like (as far as is possible)&lt;br /&gt;
&lt;br /&gt;
* '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – is a tool launched by Tactical Tech that allows you to see what traces you are leaving online, and it offers a lot of tips on how to protect your privacy. &lt;br /&gt;
* Identifying and materialising social networks across your online and physical activities: John Fass, researcher and designer at the Royal College of Art, offers some activities for visualising your social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* A tool called '''OpenPaths.cc''' allows you to see through the eyes of your mobile phone. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone you can change the permissions for each app under its privacy setting. LINK?? &lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
The good news is that you can partly control what content and metadata you give away. When you publish content on the web, it is always a good idea to ask yourself if what you are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to your personal life, the names you mention or the images you upload may contribute to a picture about who you are, what you are doing, where you are doing it and so on. This could be used by people who wish to target you. &lt;br /&gt;
&lt;br /&gt;
This does not mean that you should silence yourself – by taking some basic measures, you can limit your risks by increasing the level of the effort that would be required to attack you or your contacts.&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like your IP address''', thereby increasing your anonymity online.&lt;br /&gt;
&lt;br /&gt;
* '''Use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about your life''', you can use private profiles that can only be accessed by selected contacts. When using those on commercial social media, you should be aware of the regular changes to the privacy policies of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web, you should ask yourself if the information you spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices. https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or '''Adblock Plus''', as well as by monitoring your privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not using your real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or you can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing metada from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
==== Self-Doxing ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet and constitute a type of social engineering technique. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find his or her flaws.&lt;br /&gt;
&amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;). Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser. Useful tips on self-doxing tools and techniques can be found here: &lt;br /&gt;
* https://lilithlela.cyberguerrilla.org/?page_id=93870  &lt;br /&gt;
* https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* Ubisoft’s '''Digital Shadow''' is a Facebook app which illustrates what third parties can know about you through your Facebook profile: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== Mapping our social domains ====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”. Everyone belongs to several '''social domains''' - your work or advocacy networks, your family networks, friends, and sports teams. Some networks may feel more secure than others. For example, you may tend to have a more secure communication practices for your work or advocacy activities, but less secure practices for interacting with friends on a social networking platform. &lt;br /&gt;
&lt;br /&gt;
If you use a single identity in all your domains, or if you always use your real name online, it becomes easier to gather information about you and to identify your vulnerabilities. For example, if you reveal in a social networking platform that you like a particular kind of game, an attacker who wants to investigate your work or advocacy activities might trick you into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if your work identity and your gaming profile can be connected to the same person; and this is why separating your social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
To separate your social domains, it's helpful to first map them out and identify which ones could expose you most. You can do this by thinking about your different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
For instance, Polish computer security researcher Joanna Rutkowska has developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain, including her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the encrypted communication with her partner.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain includes the totally untrusted areas which don’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
You can find more details about her scheme here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
==== Deleting identities ====&lt;br /&gt;
&lt;br /&gt;
If we decide to separate our social domains by creating multiple identities, we should decide whether to delete or keep the identity or identities that we already have.  To do this, we can start by investigating the traces of our existing identity or identities. (For methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;). If we opt for deleting existing accounts, we can visit the following places:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitate the process of deleting social network profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once we have identified our different social domains and the digital activities and contacts that go with them, what we need to do is decide if we want to differentiate our identities accordingly, or if we'd rather stick to our official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
We may want to keep our work connected to our legal or &amp;quot;real&amp;quot; identity, or think that our activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social networks, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific context the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once we have '''assessed our risk,''' we can then consider different strategies for separating our identities online.  For more on assessing risk visit: https://ssd.eff.org/en/module/introduction-threat-modeling  &lt;br /&gt;
'''Strategies''' for maintaining separate identities can range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding [http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name talks about her decision to start writing under her real name], dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously Vani, a human rights activist, writes]: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”.&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where we don't need to gain other people's trust, when there are few or no people we can trust, or when we don't want to expose others in our life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When we adopt anonymity as a strategy we may use pseudonyms, but these should not used across different networks or social domains, and some may only be used once and then discarded. Because of this anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. For more information on how to be anonymous online, see '''Anonymizing tools'''.&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. There are [[https://www.eff.org/deeplinks/2011/07/case-pseudonyms|myriad reasons why individuals may wish to use a name other than the one they were born with]]. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent harassment and discrimination or they may use a name that’s easier to pronounce or spell in a given culture. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot; applying a real name policy which typically means using your legal name or the name by which you are commonly known. This policy has caused many user to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that we can be reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is [https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community using a name-shaped pseudonym].&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers us '''visibility''' which allows us to network with others, and by pinning our voice to a particular name we can develop an '''online reputation'''. This depends on others to decide whether we are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to our legal identity, or not. The choice to connect our online reputation to our &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity.  &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice we make, what is important is that we keep our domains effectively separated. No matter how many domains we identify in our digital life, and how many corresponding identities we create, on the internet every identity - even the one bearing our real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example Tor or TAILS)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonym could be linked to our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify us across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if we are also using our real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' We may think that deleting certain sensitive data from social networks and web services may be enough to protect ourselves, but metadata cannot be deleted as easily.  And using just one identity through our whole life - in all our work and personal domains - creates a bulk of information that makes it easier to profile us. &lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of our social domains. We might also choose to use our real identity in some areas, and our new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When we create a new identity, we should select the contacts for each one carefully, and avoid sharing contacts with other identities we use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* Our various identities should not linked to each other, or to our real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number.&lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be useful, as they can be discarded easily if compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be created for new acquaintances when appropriate as introductory profiles to get to know somebody before we include them in our more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgment on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If we want to use commercial social networks, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that we use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once we have decided on a name, a surname, and a username for our virtual persona, we should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if we wish to develop our own reputation, we don’t want to be confused with someone else, especially if they don’t share our views of the world!&lt;br /&gt;
&lt;br /&gt;
Then we need to create story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role.  We can invent a new story if we feel particularly inspired or base our story on a “known” person’s story, a superhero, a fictional character from our favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when we create an identity we should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== Credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If we keep all our normal identifying traits - such as our gender, job, attitude or the way we write - it might be possible for someone to connect the dots and connect our pseudonymous personas with our real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': Our persona should have a job that is different from ours, but not so different that we don’t know anything about that field: for example, they shouldn’t be a surgeon if we don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select our persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': This could be identified through a &amp;quot;stylometric analysis&amp;quot; that make it possible to identify the author of a particular text. To change this, we can start by using a spell-checker in our word processor to check for consistent typos and we could also think about adopting a different writing attitude. We could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': A good rule of thumb is to give our persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, we are able to weather the strikes and even have some fun in the process. &lt;br /&gt;
&lt;br /&gt;
In any case, we should always remember that on the internet, each one of our identities - even the one connected to our real name - is a “virtual” identity, and it is always better to decide what character traits we want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for our “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for our identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Once we have created several personas, it's important keep them separate in both our physical and digital lives. While keeping notes on our identities might help ensure that we remember our story, there are technical measures we can take to make sure that our profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social network accounts''' for each of our identities. A good method is to always use different apps for each account/identity and, if possible, to separate our identities per device or operating system (see '''6. A different machine for each identity'''). &lt;br /&gt;
To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles  . For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains we need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all we need is a '''disposable email address''' that we only need to use for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if we decide to have just one identity online, using disposable email addresses prevents sites from building up a history of our activities and ensures that if that account gets compromised we can simply delete it and create a new one, keeping our digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are:''' '''https://anonbox.net'''&amp;lt;nowiki/&amp;gt;''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': ''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to our main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised we can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill our main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org).&lt;br /&gt;
&lt;br /&gt;
==== Commercial social platforms ====&lt;br /&gt;
&lt;br /&gt;
Whatever social networking platform we decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
Also be very careful about the''' profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for us in that social network, regardless of our privacy settings.&lt;br /&gt;
&lt;br /&gt;
Make sure your contacts do not overlap with your other identities, and to make sure your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when we interact with the platform using a GPS-enabled phone, but the network our computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
If we access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide our trails is to publish from our various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read: &lt;br /&gt;
* https://www.facebook.com/help/389849807718635 &lt;br /&gt;
* Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
It can be a good idea to follow, from our pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance our real identity from our pseudonymous identities, we can also write (and hashtag on Twitter) posts under our pseudonymous profiles about events that we are not attending, especially if they are taking place far away from us. It can also be fun to publish and then delete posts that look like we have exposed our identity, so as to further confuse anyone who may try to unmask us.&lt;br /&gt;
&lt;br /&gt;
==== Alternative social platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if our aim is to publicise as widely as possible an event we are organizing or a project we are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close our accounts if they find that our contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If we add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to our data, the best solution is to limit the use of commercial social networking platforms to specific projects we want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)], '''N-1''' 8https://n-1.cc/) and '''Crabgrass '''(https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so we way wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, we should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (eg related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, How is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can we choose to share our videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of our activity and information?&lt;br /&gt;
&lt;br /&gt;
==== Creating a blog or website ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com).  Based on it, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org/ http://noblogs.org) and Nadir’s '''BlackBlogs '''– (http://blackblogs.org/ http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see &amp;lt;nowiki/&amp;gt;https://www.autistici.org/en/links.html &amp;lt;nowiki/&amp;gt;and &amp;lt;nowiki/&amp;gt;https://blackblogs.org/policy &amp;lt;nowiki/&amp;gt;respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
If we want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, we can create our own website. For this we need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If we want to use our own '''domain''' name, bypassing payments and identifications may get difficult unless we use Bitcoin or another pseudonymous payment system. The personal data we will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, we can register our domain with the data of an association and use a prepaid credit card that is not connected to our own data (if available in our country). Alternatively, we can use a registrar like Gandi.net ([https://www.gandi.net/ https://www.gandi.net]) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting us; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic, approach is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that we want to secure.&lt;br /&gt;
&lt;br /&gt;
If we use the same operating system for our several identities, no matter how carefully we separate our profiles we can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile we have assigned to our 'real' identity, or get infected by a malware that allows our attacker to monitor everything we do online, with all our identities. Both risks can be limited by using a virtual machine for each of our domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on our physical computer. We can think of a VM as a ''computer within a computer''. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For our purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== Whonix' ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix '''(https://www.whonix.org) is an operating system that aims at protecting our anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. Whonix’s website offers a wide documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== Tails ====&lt;br /&gt;
&lt;br /&gt;
'''Tails''', or '''The Amnesic Incognito Live System''', a free and open-source Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections. When we launch Tails, we have a complete operating system that comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, we can access the internet, communicate, and do all we need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless we ask it to do so.&lt;br /&gt;
&lt;br /&gt;
==== Qubes OS ====&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' – https://www.qubes-os.org – is a free and open-source security-oriented operating system based on '''Fedora''', a Linux distribution, and '''Xen''', a virtual machine that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things we do on our computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, we can do everything on a single physical computer without having to worry that one successful cyberattack harms our whole system, potentially revealing all the connections among our several identities.&lt;br /&gt;
&lt;br /&gt;
==== What to choose ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described – Tails, Whonix and Qubes OS – allow us to use a completely separate operating system for managing our alternate identities, and can be quite useful to make sure that we don’t reveal our true identity while we use the anonymous one(s).&lt;br /&gt;
&lt;br /&gt;
Using '''Tails''' is pretty easy, and if what we need to do with our alternate persona needs a focus on ''anonymization'', then it may be worthwhile to overcome the initial obstacle. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. But if on the other hand we need ''persistence'' and we want to keep some files or actions we have created we need to enable this option when we start the system. Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what we need is both ''anonymity'' and ''security by isolation'' and we have a good machine – https://www.whonix.org/wiki/System_Requirements – where we can run Virtualbox and installing '''Whonix''', according to the number of our alternative identities it seems a good solution that caters to all our needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if we want to keep all our activities inside our own computer without having to install anything else and if what we are trying to do is to effectively ''separate'' our identities rather than anonymize our activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if we feel that we really need to protect ourselves against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protects us from every threat, and we shouldn’t look at them as a magic potion that will make us invulnerable. Nevertheless, by using any of them, according to our needs and resources, we will raise the level of effort that an attacker will need to harm us, thus making an attack less likely. For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&amp;lt;nowiki/&amp;gt;&amp;lt;nowiki/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1343</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1343"/>
				<updated>2015-05-28T09:56:47Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
== Understanding digital shadows ==&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, it has also become a space where people who question or challenge dominant discourses - especially where those deal with gender and sexual orientation - are silenced, harassed and threatened. &lt;br /&gt;
&lt;br /&gt;
If you are active on the internet as women, human rights defenders, trans* or queer persons, and/or feminists, you'll probably want to make sure your privacy and security are protected as much as possible. &lt;br /&gt;
&lt;br /&gt;
A good place to start is by assessing the traces you are leaving behind on the internet, by getting to know your digital shadow and understanding how you organise your social domains and networks across your online and physical activities. &lt;br /&gt;
&lt;br /&gt;
The traces you leave online can tell very accurate stories about you; who you are, were you live and hang out; what you are interested in and who your friends and collaborators are. This information can expose you to several threats, including online harassment - particularly where the traces you leave behind are publicly available. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' you can use to take more control over your digital shadows - to increase your privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing your activity online.  &lt;br /&gt;
Some examples of these strategies and tools include controlling the amount of data you give away by consciously stripping valuable information from content and metadata; trying the art of self-doxing; and thinking about ways to play with and break up your online identity.&lt;br /&gt;
&lt;br /&gt;
Your digital shadow is the story data tells about you. This digital shadow is created by trillions of bits of data, left behind in the digital world when you connect to the internet, your mobile phones and your other online services. These digital shadows ultimately have a life of their own. They can be affected by others and can change in unpredictable ways. They grow continuously, and can be permanent, encompassing both your past and present activities. &lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' &lt;br /&gt;
The devices and the software you use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data. These bits of data can include your name, location, contacts, pictures, messages, tweets and likes, but also the brand of your computer, length of your phone calls and information about which websites you visit. These data traces can be put out there by yourself as well as by other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' &lt;br /&gt;
In some cases you '''actively '''share data – for example when you share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about you, by tagging you in pictures, mentioning you in tweets or simply by communicating with you. In other cases, you give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
&lt;br /&gt;
Your browsing habits and IP address are shared when you visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites you visit, and the information shared is collected for a wide range of purposes, from website analytics to advertising. Your mobile phone apps also collect data on you without your active knowledge or consent – for example, the photos you take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow you as you move from one service to another - from your internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in your readers to publishing pictures from the latest protest you covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of your messages, blogs, tweets and phone calls; it is your pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables your email to be delivered, files on your computer to be found and mobile communication to work. Metadata can include your email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the technological infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognised by computers.&lt;br /&gt;
&lt;br /&gt;
==== Who collects data? ====   &lt;br /&gt;
&lt;br /&gt;
You might wonder about the importance of one picture, one message, or one call. You might think there is so much data out there that nobody knows what to do with it, or cares that much about it. &lt;br /&gt;
&lt;br /&gt;
However, there are in reality a number of parties interested in this data - including companies, governments and individuals - and data collection and data analysis is by now very sophisticated. The data traces you leave behind online are constantly being collected, analysed and sorted by various parties to create profiles on you; and every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by these companies, governments and individuals for a variety of purposes. Profiles can be bought and sold;  data can be used to control, suppress or silence; it can be used to create harassment strategies. &lt;br /&gt;
&lt;br /&gt;
Data can be used to gain insight into who you are, what you do, where you have been and with whom you have been interacting. This information can then be used to make predictions on what you might do or where you might be in future. For example, if someone knows that you are an outspoken blogger on gender issues in country x, they know that you will probably be present at a conference on blogging and women held in that country. &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to your digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. &lt;br /&gt;
&lt;br /&gt;
You can't know exactly what is happening to our digital shadow, and that itself is a problem. Fortunately, there are many tools and tactics you can use to manage your digital shadows and to limit their ramifications in terms of profiling, control and surveillance. This will be discussed in the rest of this section. &lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
To move towards getting some control over your digital shadow, a good place to start is to see what it looks like (as far as is possible)&lt;br /&gt;
&lt;br /&gt;
* '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – is a tool launched by Tactical Tech that allows you to see what traces you are leaving online, and it offers a lot of tips on how to protect your privacy. &lt;br /&gt;
* Identifying and materialising social networks across your online and physical activities: John Fass, researcher and designer at the Royal College of Art, offers some activities for visualising your social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* A tool called '''OpenPaths.cc''' allows you to see through the eyes of your mobile phone. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone you can change the permissions for each app under its privacy setting. LINK?? &lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
The good news is that you can partly control what content and metadata you give away. When you publish content on the web, it is always a good idea to ask yourself if what you are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to your personal life, the names you mention or the images you upload may contribute to a picture about who you are, what you are doing, where you are doing it and so on. This could be used by people who wish to target you. &lt;br /&gt;
&lt;br /&gt;
This does not mean that you should silence yourself – by taking some basic measures, you can limit your risks by increasing the level of the effort that would be required to attack you or your contacts.&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like your IP address''', thereby increasing your anonymity online.&lt;br /&gt;
&lt;br /&gt;
* '''Use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about your life''', you can use private profiles that can only be accessed by selected contacts. When using those on commercial social media, you should be aware of the regular changes to the privacy policies of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web, you should ask yourself if the information you spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices. https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or '''Adblock Plus''', as well as by monitoring your privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not using your real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or you can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing metada from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
==== Self-Doxing ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet and constitute a type of social engineering technique. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find his or her flaws.&lt;br /&gt;
&amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;). Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser. Useful tips on self-doxing tools and techniques can be found here: &lt;br /&gt;
* https://lilithlela.cyberguerrilla.org/?page_id=93870  &lt;br /&gt;
* https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* Ubisoft’s '''Digital Shadow''' is a Facebook app which illustrates what third parties can know about you through your Facebook profile: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== Mapping our social domains ====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”. Each of us belongs to several '''social domains''' - our work or advocacy networks, our family networks, friends, and sports teams. Some networks may be feel more secure than others. For example, we may tend to have a more secure communication practices for our work or advocacy activities, but less secure practices for interacting with friends on a social network. &lt;br /&gt;
&lt;br /&gt;
If we use a single identity in all our domains, or if we always use our real name online, it becomes easier to gather information about us and to identify our vulnerabilities. For example, if we reveal in a social network that we like a particular kind of game, an attacker who wants to investigate our work or advocacy activities might trick us into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if our work identity and our gaming profile can be connected to the same person; and this is why separating our social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
To separate our social domains, it's helpful to first map them out and identify which ones could expose us most. We can do this by thinking about our different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
For instance, polish computer security researcher Joanna Rutkowska has developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain includes her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the communication with her partner.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain includes the totally untrusted and which doesn’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
You can find more information about her scheme here: &lt;br /&gt;
&lt;br /&gt;
* Joanna Rutkowska’s article on security domains can be found here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
==== Deleting identities ====&lt;br /&gt;
&lt;br /&gt;
If we decide to separate our social domains by creating multiple identities, we should decide whether to delete or keep the identity or identities that we already have.  To do this, we can start by investigating the traces of our existing identity or identities. (For methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;). If we opt for deleting existing accounts, we can visit the following places:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitate the process of deleting social network profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once we have identified our different social domains and the digital activities and contacts that go with them, what we need to do is decide if we want to differentiate our identities accordingly, or if we'd rather stick to our official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
We may want to keep our work connected to our legal or &amp;quot;real&amp;quot; identity, or think that our activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social networks, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific context the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once we have '''assessed our risk,''' we can then consider different strategies for separating our identities online.  For more on assessing risk visit: https://ssd.eff.org/en/module/introduction-threat-modeling  &lt;br /&gt;
'''Strategies''' for maintaining separate identities can range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding [http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name talks about her decision to start writing under her real name], dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously Vani, a human rights activist, writes]: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”.&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where we don't need to gain other people's trust, when there are few or no people we can trust, or when we don't want to expose others in our life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When we adopt anonymity as a strategy we may use pseudonyms, but these should not used across different networks or social domains, and some may only be used once and then discarded. Because of this anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. For more information on how to be anonymous online, see '''Anonymizing tools'''.&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. There are [[https://www.eff.org/deeplinks/2011/07/case-pseudonyms|myriad reasons why individuals may wish to use a name other than the one they were born with]]. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent harassment and discrimination or they may use a name that’s easier to pronounce or spell in a given culture. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot; applying a real name policy which typically means using your legal name or the name by which you are commonly known. This policy has caused many user to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that we can be reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is [https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community using a name-shaped pseudonym].&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers us '''visibility''' which allows us to network with others, and by pinning our voice to a particular name we can develop an '''online reputation'''. This depends on others to decide whether we are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to our legal identity, or not. The choice to connect our online reputation to our &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity.  &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice we make, what is important is that we keep our domains effectively separated. No matter how many domains we identify in our digital life, and how many corresponding identities we create, on the internet every identity - even the one bearing our real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example Tor or TAILS)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonym could be linked to our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify us across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if we are also using our real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' We may think that deleting certain sensitive data from social networks and web services may be enough to protect ourselves, but metadata cannot be deleted as easily.  And using just one identity through our whole life - in all our work and personal domains - creates a bulk of information that makes it easier to profile us. &lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of our social domains. We might also choose to use our real identity in some areas, and our new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When we create a new identity, we should select the contacts for each one carefully, and avoid sharing contacts with other identities we use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* Our various identities should not linked to each other, or to our real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number.&lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be useful, as they can be discarded easily if compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be created for new acquaintances when appropriate as introductory profiles to get to know somebody before we include them in our more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgment on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If we want to use commercial social networks, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that we use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once we have decided on a name, a surname, and a username for our virtual persona, we should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if we wish to develop our own reputation, we don’t want to be confused with someone else, especially if they don’t share our views of the world!&lt;br /&gt;
&lt;br /&gt;
Then we need to create story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role.  We can invent a new story if we feel particularly inspired or base our story on a “known” person’s story, a superhero, a fictional character from our favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when we create an identity we should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== Credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If we keep all our normal identifying traits - such as our gender, job, attitude or the way we write - it might be possible for someone to connect the dots and connect our pseudonymous personas with our real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': Our persona should have a job that is different from ours, but not so different that we don’t know anything about that field: for example, they shouldn’t be a surgeon if we don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select our persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': This could be identified through a &amp;quot;stylometric analysis&amp;quot; that make it possible to identify the author of a particular text. To change this, we can start by using a spell-checker in our word processor to check for consistent typos and we could also think about adopting a different writing attitude. We could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': A good rule of thumb is to give our persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, we are able to weather the strikes and even have some fun in the process. &lt;br /&gt;
&lt;br /&gt;
In any case, we should always remember that on the internet, each one of our identities - even the one connected to our real name - is a “virtual” identity, and it is always better to decide what character traits we want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for our “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for our identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Once we have created several personas, it's important keep them separate in both our physical and digital lives. While keeping notes on our identities might help ensure that we remember our story, there are technical measures we can take to make sure that our profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social network accounts''' for each of our identities. A good method is to always use different apps for each account/identity and, if possible, to separate our identities per device or operating system (see '''6. A different machine for each identity'''). &lt;br /&gt;
To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles  . For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains we need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all we need is a '''disposable email address''' that we only need to use for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if we decide to have just one identity online, using disposable email addresses prevents sites from building up a history of our activities and ensures that if that account gets compromised we can simply delete it and create a new one, keeping our digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are:''' '''https://anonbox.net'''&amp;lt;nowiki/&amp;gt;''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': ''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to our main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised we can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill our main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org).&lt;br /&gt;
&lt;br /&gt;
==== Commercial social platforms ====&lt;br /&gt;
&lt;br /&gt;
Whatever social networking platform we decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
Also be very careful about the''' profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for us in that social network, regardless of our privacy settings.&lt;br /&gt;
&lt;br /&gt;
Make sure your contacts do not overlap with your other identities, and to make sure your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when we interact with the platform using a GPS-enabled phone, but the network our computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
If we access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide our trails is to publish from our various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read: &lt;br /&gt;
* https://www.facebook.com/help/389849807718635 &lt;br /&gt;
* Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
It can be a good idea to follow, from our pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance our real identity from our pseudonymous identities, we can also write (and hashtag on Twitter) posts under our pseudonymous profiles about events that we are not attending, especially if they are taking place far away from us. It can also be fun to publish and then delete posts that look like we have exposed our identity, so as to further confuse anyone who may try to unmask us.&lt;br /&gt;
&lt;br /&gt;
==== Alternative social platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if our aim is to publicise as widely as possible an event we are organizing or a project we are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close our accounts if they find that our contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If we add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to our data, the best solution is to limit the use of commercial social networking platforms to specific projects we want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)], '''N-1''' 8https://n-1.cc/) and '''Crabgrass '''(https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so we way wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, we should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (eg related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, How is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can we choose to share our videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of our activity and information?&lt;br /&gt;
&lt;br /&gt;
==== Creating a blog or website ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com).  Based on it, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org/ http://noblogs.org) and Nadir’s '''BlackBlogs '''– (http://blackblogs.org/ http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see &amp;lt;nowiki/&amp;gt;https://www.autistici.org/en/links.html &amp;lt;nowiki/&amp;gt;and &amp;lt;nowiki/&amp;gt;https://blackblogs.org/policy &amp;lt;nowiki/&amp;gt;respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
If we want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, we can create our own website. For this we need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If we want to use our own '''domain''' name, bypassing payments and identifications may get difficult unless we use Bitcoin or another pseudonymous payment system. The personal data we will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, we can register our domain with the data of an association and use a prepaid credit card that is not connected to our own data (if available in our country). Alternatively, we can use a registrar like Gandi.net ([https://www.gandi.net/ https://www.gandi.net]) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting us; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic, approach is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that we want to secure.&lt;br /&gt;
&lt;br /&gt;
If we use the same operating system for our several identities, no matter how carefully we separate our profiles we can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile we have assigned to our 'real' identity, or get infected by a malware that allows our attacker to monitor everything we do online, with all our identities. Both risks can be limited by using a virtual machine for each of our domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on our physical computer. We can think of a VM as a ''computer within a computer''. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For our purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== Whonix' ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix '''(https://www.whonix.org) is an operating system that aims at protecting our anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. Whonix’s website offers a wide documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== Tails ====&lt;br /&gt;
&lt;br /&gt;
'''Tails''', or '''The Amnesic Incognito Live System''', a free and open-source Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections. When we launch Tails, we have a complete operating system that comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, we can access the internet, communicate, and do all we need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless we ask it to do so.&lt;br /&gt;
&lt;br /&gt;
==== Qubes OS ====&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' – https://www.qubes-os.org – is a free and open-source security-oriented operating system based on '''Fedora''', a Linux distribution, and '''Xen''', a virtual machine that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things we do on our computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, we can do everything on a single physical computer without having to worry that one successful cyberattack harms our whole system, potentially revealing all the connections among our several identities.&lt;br /&gt;
&lt;br /&gt;
==== What to choose ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described – Tails, Whonix and Qubes OS – allow us to use a completely separate operating system for managing our alternate identities, and can be quite useful to make sure that we don’t reveal our true identity while we use the anonymous one(s).&lt;br /&gt;
&lt;br /&gt;
Using '''Tails''' is pretty easy, and if what we need to do with our alternate persona needs a focus on ''anonymization'', then it may be worthwhile to overcome the initial obstacle. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. But if on the other hand we need ''persistence'' and we want to keep some files or actions we have created we need to enable this option when we start the system. Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what we need is both ''anonymity'' and ''security by isolation'' and we have a good machine – https://www.whonix.org/wiki/System_Requirements – where we can run Virtualbox and installing '''Whonix''', according to the number of our alternative identities it seems a good solution that caters to all our needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if we want to keep all our activities inside our own computer without having to install anything else and if what we are trying to do is to effectively ''separate'' our identities rather than anonymize our activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if we feel that we really need to protect ourselves against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protects us from every threat, and we shouldn’t look at them as a magic potion that will make us invulnerable. Nevertheless, by using any of them, according to our needs and resources, we will raise the level of effort that an attacker will need to harm us, thus making an attack less likely. For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&amp;lt;nowiki/&amp;gt;&amp;lt;nowiki/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1341</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1341"/>
				<updated>2015-05-28T09:28:33Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
== Understanding digital shadows ==&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, it has also become a space where people who question or challenge dominant discourses - especially where those deal with gender and sexual orientation - are silenced, harassed and threatened. &lt;br /&gt;
&lt;br /&gt;
If you are active on the internet as women, human rights defenders, trans* or queer person, and/or feminist, you'll probably want to make sure your privacy and security are protected as much as possible. &lt;br /&gt;
&lt;br /&gt;
A good place to start is by assessing the traces you are leaving behind on the internet, by getting to know your digital shadow and understanding how you organise your social domains and networks across your online and physical activities. &lt;br /&gt;
&lt;br /&gt;
The traces you leave online can tell very accurate stories about you; who you are, were you live and hang out; what you are interested in and who your friends and collaborators are. This information can expose you to several threats, including online harassment - particularly where the traces you leave behind are publicly available. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' you can use to take more control over your digital shadows - to increase your privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing your activity online.  &lt;br /&gt;
Some examples of these strategies and tools include controlling the amount of data you give away by consciously stripping valuable information from content and metadata; trying the art of self-doxing; and thinking about ways to play with and break up your online identity.&lt;br /&gt;
&lt;br /&gt;
Your digital shadow is the story data tells about you. This digital shadow is created by trillions of bits of data, left behind in the digital world when you connect to the internet, your mobile phones and our other online services. These digital shadows ultimately have a life of their own. They can be affected by others and can change in unpredictable ways. They grow continuously, and can be permanent, encompassing both your past and present activities. &lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' &lt;br /&gt;
The devices and the software you use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data. These bits of data can include your name, location, contacts, pictures, messages, tweets and likes, but also the brand of your computer, length of your phone calls and information about which websites you visit. These data traces can be put out there by yourself as well as by other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' &lt;br /&gt;
In some cases you '''actively '''share data – for example when you share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about you, by tagging you in pictures, mentioning you in tweets or simply by communicating with you. In other cases, you give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
&lt;br /&gt;
Your browsing habits and IP address are shared when you visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites you visit, and the information shared is collected for a wide range of purposes, from website analytics to advertising. Your mobile phone apps also collect data on you without your active knowledge or consent – for example, the photos you take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow you as you move from one service to another - from your internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in your readers to publishing pictures from the latest protest you covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of your messages, blogs, tweets and phone calls; it is your pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables your email to be delivered, files on your computer to be found and mobile communication to work. Metadata can include your email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the technological infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognised by computers.&lt;br /&gt;
&lt;br /&gt;
==== Who collects data? ====   &lt;br /&gt;
&lt;br /&gt;
We might wonder about the importance of one picture, one message, one call or think there is so much data out there that nobody knows what to do with it. However, data collection and data analysis has become very sophisticated. The data traces you leave are  collected, analysed and sorted by various parties to create digital shadows, or profiles. Every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by companies, governments and individuals for a variety of purposes. It can be bought and sold; it can be used to control; or it can be used to create harassment strategies. Our digital shadows or profiles can be used to gain insight into who we are, what we do, where we have been and with whom we have been interacting. By aggregating data, these can then be used to make predictions on what we might do or where we might be in future. For example, if someone knows that we are an outspoken blogger on gender issues in country x, they know that we will probably be present at a conference on blogging and women held in that country. &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to our digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. We can't know exactly what is happening to our digital shadow, and that itself is a problem. Fortunately, there are many tools and tactics we can use to manage our digital shadows and to limit their ramifications in terms of profiling, control and surveillance. This will be discussed in the rest of this section. &lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
Because anyone can potentially access to our digital shadow, we cannot know precisely what happens to our digital shadow and that itself is a problem. But there are tools and tactics to manage our digital shadow and to limit its ramifications in terms of  profiling and surveillance. Some good places to start are:&lt;br /&gt;
&lt;br /&gt;
* Exploring our individual digital shadow with '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – a tool launched by Tactical Tech that offers a lot of tips on how to protect our privacy and control our digital shadow&lt;br /&gt;
* Identifying and materialising social networks across our online and physical activities: John Fass, researcher and designer at the Royal College of Art, has created some activities to materialise our social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* Seeing through the eyes of our mobile phone by installing a tool called '''openpath.cc'''. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone we can change the permissions for each app under its privacy setting.&lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
The good news is that we can partly control what content and metadata we give away. When we publish content on the web, it is always a good idea to ask ourselves if what we are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to our personal lives, the names we mention or the images we upload may contribute to a picture about who we are, what we are doing, where we are doing it and so on. This could be used by people who wish to target us. &lt;br /&gt;
&lt;br /&gt;
This does not mean that we should silence ourselves – by taking some basic measures, we can limit our risks by increasing the level of the effort that would be required to attack us or our contacts.&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like our IP address''', thereby increasing our anonymity online.&lt;br /&gt;
&lt;br /&gt;
* '''Use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about our life''', we can use private profiles that can only be accessed by selected contacts. When using those on commercial social media, we should be aware of the regular changes to the privacy policies of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web, we should ask ourselves if the information we spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices.  https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or Adblock Plus, as well as by monitoring our privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not usingy our real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or we can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing metada from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
==== Self-Doxing ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet and constitute a type of social engineering technique. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find his or her flaws.&lt;br /&gt;
&amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;). Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser. Useful tips on self-doxing tools and techniques can be found here: &lt;br /&gt;
* https://lilithlela.cyberguerrilla.org/?page_id=93870  &lt;br /&gt;
* https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* Ubisoft’s '''Digital Shadow''' is a Facebook app which illustrates what third parties can know about us through our Facebook profiles: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== Mapping our social domains ====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”. Each of us belongs to several '''social domains''' - our work or advocacy networks, our family networks, friends, and sports teams. Some networks may be feel more secure than others. For example, we may tend to have a more secure communication practices for our work or advocacy activities, but less secure practices for interacting with friends on a social network. &lt;br /&gt;
&lt;br /&gt;
If we use a single identity in all our domains, or if we always use our real name online, it becomes easier to gather information about us and to identify our vulnerabilities. For example, if we reveal in a social network that we like a particular kind of game, an attacker who wants to investigate our work or advocacy activities might trick us into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if our work identity and our gaming profile can be connected to the same person; and this is why separating our social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
To separate our social domains, it's helpful to first map them out and identify which ones could expose us most. We can do this by thinking about our different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
For instance, polish computer security researcher Joanna Rutkowska has developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain includes her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the communication with her partner.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain includes the totally untrusted and which doesn’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
You can find more information about her scheme here: &lt;br /&gt;
&lt;br /&gt;
* Joanna Rutkowska’s article on security domains can be found here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
==== Deleting identities ====&lt;br /&gt;
&lt;br /&gt;
If we decide to separate our social domains by creating multiple identities, we should decide whether to delete or keep the identity or identities that we already have.  To do this, we can start by investigating the traces of our existing identity or identities. (For methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;). If we opt for deleting existing accounts, we can visit the following places:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitate the process of deleting social network profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once we have identified our different social domains and the digital activities and contacts that go with them, what we need to do is decide if we want to differentiate our identities accordingly, or if we'd rather stick to our official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
We may want to keep our work connected to our legal or &amp;quot;real&amp;quot; identity, or think that our activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social networks, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific context the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once we have '''assessed our risk,''' we can then consider different strategies for separating our identities online.  For more on assessing risk visit: https://ssd.eff.org/en/module/introduction-threat-modeling  &lt;br /&gt;
'''Strategies''' for maintaining separate identities can range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding [http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name talks about her decision to start writing under her real name], dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously Vani, a human rights activist, writes]: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”.&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where we don't need to gain other people's trust, when there are few or no people we can trust, or when we don't want to expose others in our life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When we adopt anonymity as a strategy we may use pseudonyms, but these should not used across different networks or social domains, and some may only be used once and then discarded. Because of this anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. For more information on how to be anonymous online, see '''Anonymizing tools'''.&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. There are [[https://www.eff.org/deeplinks/2011/07/case-pseudonyms|myriad reasons why individuals may wish to use a name other than the one they were born with]]. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent harassment and discrimination or they may use a name that’s easier to pronounce or spell in a given culture. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot; applying a real name policy which typically means using your legal name or the name by which you are commonly known. This policy has caused many user to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that we can be reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is [https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community using a name-shaped pseudonym].&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers us '''visibility''' which allows us to network with others, and by pinning our voice to a particular name we can develop an '''online reputation'''. This depends on others to decide whether we are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to our legal identity, or not. The choice to connect our online reputation to our &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity.  &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice we make, what is important is that we keep our domains effectively separated. No matter how many domains we identify in our digital life, and how many corresponding identities we create, on the internet every identity - even the one bearing our real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example Tor or TAILS)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonym could be linked to our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify us across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if we are also using our real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' We may think that deleting certain sensitive data from social networks and web services may be enough to protect ourselves, but metadata cannot be deleted as easily.  And using just one identity through our whole life - in all our work and personal domains - creates a bulk of information that makes it easier to profile us. &lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of our social domains. We might also choose to use our real identity in some areas, and our new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When we create a new identity, we should select the contacts for each one carefully, and avoid sharing contacts with other identities we use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* Our various identities should not linked to each other, or to our real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number.&lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be useful, as they can be discarded easily if compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be created for new acquaintances when appropriate as introductory profiles to get to know somebody before we include them in our more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgment on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If we want to use commercial social networks, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that we use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once we have decided on a name, a surname, and a username for our virtual persona, we should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if we wish to develop our own reputation, we don’t want to be confused with someone else, especially if they don’t share our views of the world!&lt;br /&gt;
&lt;br /&gt;
Then we need to create story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role.  We can invent a new story if we feel particularly inspired or base our story on a “known” person’s story, a superhero, a fictional character from our favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when we create an identity we should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== Credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If we keep all our normal identifying traits - such as our gender, job, attitude or the way we write - it might be possible for someone to connect the dots and connect our pseudonymous personas with our real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': Our persona should have a job that is different from ours, but not so different that we don’t know anything about that field: for example, they shouldn’t be a surgeon if we don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select our persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': This could be identified through a &amp;quot;stylometric analysis&amp;quot; that make it possible to identify the author of a particular text. To change this, we can start by using a spell-checker in our word processor to check for consistent typos and we could also think about adopting a different writing attitude. We could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': A good rule of thumb is to give our persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, we are able to weather the strikes and even have some fun in the process. &lt;br /&gt;
&lt;br /&gt;
In any case, we should always remember that on the internet, each one of our identities - even the one connected to our real name - is a “virtual” identity, and it is always better to decide what character traits we want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for our “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for our identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Once we have created several personas, it's important keep them separate in both our physical and digital lives. While keeping notes on our identities might help ensure that we remember our story, there are technical measures we can take to make sure that our profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social network accounts''' for each of our identities. A good method is to always use different apps for each account/identity and, if possible, to separate our identities per device or operating system (see '''6. A different machine for each identity'''). &lt;br /&gt;
To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles  . For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains we need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all we need is a '''disposable email address''' that we only need to use for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if we decide to have just one identity online, using disposable email addresses prevents sites from building up a history of our activities and ensures that if that account gets compromised we can simply delete it and create a new one, keeping our digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are:''' '''https://anonbox.net'''&amp;lt;nowiki/&amp;gt;''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': ''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to our main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised we can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill our main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org).&lt;br /&gt;
&lt;br /&gt;
==== Commercial social platforms ====&lt;br /&gt;
&lt;br /&gt;
Whatever social networking platform we decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
Also be very careful about the''' profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for us in that social network, regardless of our privacy settings.&lt;br /&gt;
&lt;br /&gt;
Make sure your contacts do not overlap with your other identities, and to make sure your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when we interact with the platform using a GPS-enabled phone, but the network our computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
If we access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide our trails is to publish from our various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read: &lt;br /&gt;
* https://www.facebook.com/help/389849807718635 &lt;br /&gt;
* Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
It can be a good idea to follow, from our pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance our real identity from our pseudonymous identities, we can also write (and hashtag on Twitter) posts under our pseudonymous profiles about events that we are not attending, especially if they are taking place far away from us. It can also be fun to publish and then delete posts that look like we have exposed our identity, so as to further confuse anyone who may try to unmask us.&lt;br /&gt;
&lt;br /&gt;
==== Alternative social platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if our aim is to publicise as widely as possible an event we are organizing or a project we are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close our accounts if they find that our contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If we add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to our data, the best solution is to limit the use of commercial social networking platforms to specific projects we want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)], '''N-1''' 8https://n-1.cc/) and '''Crabgrass '''(https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so we way wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, we should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (eg related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, How is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can we choose to share our videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of our activity and information?&lt;br /&gt;
&lt;br /&gt;
==== Creating a blog or website ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com).  Based on it, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org/ http://noblogs.org) and Nadir’s '''BlackBlogs '''– (http://blackblogs.org/ http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see &amp;lt;nowiki/&amp;gt;https://www.autistici.org/en/links.html &amp;lt;nowiki/&amp;gt;and &amp;lt;nowiki/&amp;gt;https://blackblogs.org/policy &amp;lt;nowiki/&amp;gt;respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
If we want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, we can create our own website. For this we need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If we want to use our own '''domain''' name, bypassing payments and identifications may get difficult unless we use Bitcoin or another pseudonymous payment system. The personal data we will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, we can register our domain with the data of an association and use a prepaid credit card that is not connected to our own data (if available in our country). Alternatively, we can use a registrar like Gandi.net ([https://www.gandi.net/ https://www.gandi.net]) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting us; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic, approach is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that we want to secure.&lt;br /&gt;
&lt;br /&gt;
If we use the same operating system for our several identities, no matter how carefully we separate our profiles we can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile we have assigned to our 'real' identity, or get infected by a malware that allows our attacker to monitor everything we do online, with all our identities. Both risks can be limited by using a virtual machine for each of our domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on our physical computer. We can think of a VM as a ''computer within a computer''. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For our purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== Whonix' ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix '''(https://www.whonix.org) is an operating system that aims at protecting our anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. Whonix’s website offers a wide documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== Tails ====&lt;br /&gt;
&lt;br /&gt;
'''Tails''', or '''The Amnesic Incognito Live System''', a free and open-source Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections. When we launch Tails, we have a complete operating system that comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, we can access the internet, communicate, and do all we need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless we ask it to do so.&lt;br /&gt;
&lt;br /&gt;
==== Qubes OS ====&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' – https://www.qubes-os.org – is a free and open-source security-oriented operating system based on '''Fedora''', a Linux distribution, and '''Xen''', a virtual machine that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things we do on our computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, we can do everything on a single physical computer without having to worry that one successful cyberattack harms our whole system, potentially revealing all the connections among our several identities.&lt;br /&gt;
&lt;br /&gt;
==== What to choose ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described – Tails, Whonix and Qubes OS – allow us to use a completely separate operating system for managing our alternate identities, and can be quite useful to make sure that we don’t reveal our true identity while we use the anonymous one(s).&lt;br /&gt;
&lt;br /&gt;
Using '''Tails''' is pretty easy, and if what we need to do with our alternate persona needs a focus on ''anonymization'', then it may be worthwhile to overcome the initial obstacle. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. But if on the other hand we need ''persistence'' and we want to keep some files or actions we have created we need to enable this option when we start the system. Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what we need is both ''anonymity'' and ''security by isolation'' and we have a good machine – https://www.whonix.org/wiki/System_Requirements – where we can run Virtualbox and installing '''Whonix''', according to the number of our alternative identities it seems a good solution that caters to all our needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if we want to keep all our activities inside our own computer without having to install anything else and if what we are trying to do is to effectively ''separate'' our identities rather than anonymize our activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if we feel that we really need to protect ourselves against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protects us from every threat, and we shouldn’t look at them as a magic potion that will make us invulnerable. Nevertheless, by using any of them, according to our needs and resources, we will raise the level of effort that an attacker will need to harm us, thus making an attack less likely. For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&amp;lt;nowiki/&amp;gt;&amp;lt;nowiki/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1335</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1335"/>
				<updated>2015-05-28T09:08:52Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
== Understanding digital shadows ==&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, it has also become a space where people who question or challenge dominant discourses - especially where those deal with gender and sexual orientation - are silenced, harassed and threatened. &lt;br /&gt;
&lt;br /&gt;
If we are active on the internet as a women, human rights defenders, trans* or queer person, and/or feminist, we'll probably want to make sure our privacy and security are protected as much as possible. &lt;br /&gt;
&lt;br /&gt;
A good place to start is by assessing the traces we are leaving behind us on the internet; by getting to know our digital shadows and understanding how we organise our social domains and networks across our online and physical activities. &lt;br /&gt;
&lt;br /&gt;
The traces we leave online can tell very accurate stories about us; who we are, were we live and hang out; what we are interested in and who our friends and collaborators are. This information can expose us to several threats, including online harassment - particularly where the traces we leave behind are publicly available. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' we can use to take more control control our digital shadows - to increase our privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing our activity online.  &lt;br /&gt;
Some examples of these strategies and tools include controlling the amount of data we give away by consciously stripping valuable information from content and metadata; trying the art of self doxing; and thinking about ways to play with and break up our online identity.&lt;br /&gt;
&lt;br /&gt;
Our digital shadows are the stories data tells about us. These digital shadows are created by trillions of bits of data, left behind in the digital world when we connect to the internet, our mobile phones and our other online services. These digital shadows ultimately have a life of their own. They can be affected by others and can change in unpredictable ways. They grow continuously, and can be permanent, encompassing both our past and present activities. &lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' &lt;br /&gt;
The devices and the software we use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data about us. These bits of data can include our name, location, contacts, pictures, messages, tweets and likes, but also the brand of our computer, length of our phone calls and information about which websites we visit. These data traces can be put out there by ourselves as well as other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' &lt;br /&gt;
In some cases we '''actively '''share data – for example when we share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about us, by tagging us in pictures, mentioning us in tweets or simply by communicating with us. In other cases, we give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
Our browsing habits and IP address are shared when we visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites we visit, and the information shared is collected for a wide range of purposes,  from website analytics to advertising. Our mobile phone apps also collect data on us without our active knowledge or consent – for example, the photos we take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow us as we move from one service to another - from our internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in our readers to publishing pictures from the latest protest we have covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of our messages, blogs, tweets and phone calls; it is our pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables our email to be delivered, help find files on our computer and permit mobile communication. Metadata can be our email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognized by computers.&lt;br /&gt;
&lt;br /&gt;
==== Who collects data? ====   &lt;br /&gt;
&lt;br /&gt;
We might wonder about the importance of one picture, one message, one call or think there is so much data out there that nobody knows what to do with it. However, data collection and data analysis has become very sophisticated. The data traces you leave are  collected, analysed and sorted by various parties to create digital shadows, or profiles. Every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by companies, governments and individuals for a variety of purposes. It can be bought and sold; it can be used to control; or it can be used to create harassment strategies. Our digital shadows or profiles can be used to gain insight into who we are, what we do, where we have been and with whom we have been interacting. By aggregating data, these can then be used to make predictions on what we might do or where we might be in future. For example, if someone knows that we are an outspoken blogger on gender issues in country x, they know that we will probably be present at a conference on blogging and women held in that country. &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to our digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. We can't know exactly what is happening to our digital shadow, and that itself is a problem. Fortunately, there are many tools and tactics we can use to manage our digital shadows and to limit their ramifications in terms of profiling, control and surveillance. This will be discussed in the rest of this section. &lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
Because anyone can potentially access to our digital shadow, we cannot know precisely what happens to our digital shadow and that itself is a problem. But there are tools and tactics to manage our digital shadow and to limit its ramifications in terms of  profiling and surveillance. Some good places to start are:&lt;br /&gt;
&lt;br /&gt;
* Exploring our individual digital shadow with '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – a tool launched by Tactical Tech that offers a lot of tips on how to protect our privacy and control our digital shadow&lt;br /&gt;
* Identifying and materialising social networks across our online and physical activities: John Fass, researcher and designer at the Royal College of Art, has created some activities to materialise our social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* Seeing through the eyes of our mobile phone by installing a tool called '''openpath.cc'''. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone we can change the permissions for each app under its privacy setting.&lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
The good news is that we can partly control what content and metadata we give away. When we publish content on the web, it is always a good idea to ask ourselves if what we are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to our personal lives, the names we mention or the images we upload may contribute to a picture about who we are, what we are doing, where we are doing it and so on. This could be used by people who wish to target us. &lt;br /&gt;
&lt;br /&gt;
This does not mean that we should silence ourselves – by taking some basic measures, we can limit our risks by increasing the level of the effort that would be required to attack us or our contacts.&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like our IP address''', thereby increasing our anonymity online.&lt;br /&gt;
&lt;br /&gt;
* '''Use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about our life''', we can use private profiles that can only be accessed by selected contacts. When using those on commercial social media, we should be aware of the regular changes to the privacy policies of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web, we should ask ourselves if the information we spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices.  https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or Adblock Plus, as well as by monitoring our privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not usingy our real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or we can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing metada from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
==== Self-Doxing ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet and constitute a type of social engineering technique. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find his or her flaws.&lt;br /&gt;
&amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;). Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser. Useful tips on self-doxing tools and techniques can be found here: &lt;br /&gt;
* https://lilithlela.cyberguerrilla.org/?page_id=93870  &lt;br /&gt;
* https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* Ubisoft’s '''Digital Shadow''' is a Facebook app which illustrates what third parties can know about us through our Facebook profiles: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== Mapping our social domains ====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”. Each of us belongs to several '''social domains''' - our work or advocacy networks, our family networks, friends, and sports teams. Some networks may be feel more secure than others. For example, we may tend to have a more secure communication practices for our work or advocacy activities, but less secure practices for interacting with friends on a social network. &lt;br /&gt;
&lt;br /&gt;
If we use a single identity in all our domains, or if we always use our real name online, it becomes easier to gather information about us and to identify our vulnerabilities. For example, if we reveal in a social network that we like a particular kind of game, an attacker who wants to investigate our work or advocacy activities might trick us into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if our work identity and our gaming profile can be connected to the same person; and this is why separating our social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
To separate our social domains, it's helpful to first map them out and identify which ones could expose us most. We can do this by thinking about our different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
For instance, polish computer security researcher Joanna Rutkowska has developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain includes her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the communication with her partner.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain includes the totally untrusted and which doesn’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
You can find more information about her scheme here: &lt;br /&gt;
&lt;br /&gt;
* Joanna Rutkowska’s article on security domains can be found here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
==== Deleting identities ====&lt;br /&gt;
&lt;br /&gt;
If we decide to separate our social domains by creating multiple identities, we should decide whether to delete or keep the identity or identities that we already have.  To do this, we can start by investigating the traces of our existing identity or identities. (For methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;). If we opt for deleting existing accounts, we can visit the following places:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitate the process of deleting social network profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once we have identified our different social domains and the digital activities and contacts that go with them, what we need to do is decide if we want to differentiate our identities accordingly, or if we'd rather stick to our official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
We may want to keep our work connected to our legal or &amp;quot;real&amp;quot; identity, or think that our activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social networks, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific context the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once we have '''assessed our risk,''' we can then consider different strategies for separating our identities online.  For more on assessing risk visit: https://ssd.eff.org/en/module/introduction-threat-modeling  &lt;br /&gt;
'''Strategies''' for maintaining separate identities can range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding [http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name talks about her decision to start writing under her real name], dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously Vani, a human rights activist, writes]: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”.&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where we don't need to gain other people's trust, when there are few or no people we can trust, or when we don't want to expose others in our life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When we adopt anonymity as a strategy we may use pseudonyms, but these should not used across different networks or social domains, and some may only be used once and then discarded. Because of this anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. For more information on how to be anonymous online, see '''Anonymizing tools'''.&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. There are [[https://www.eff.org/deeplinks/2011/07/case-pseudonyms|myriad reasons why individuals may wish to use a name other than the one they were born with]]. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent harassment and discrimination or they may use a name that’s easier to pronounce or spell in a given culture. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot; applying a real name policy which typically means using your legal name or the name by which you are commonly known. This policy has caused many user to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that we can be reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is [https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community using a name-shaped pseudonym].&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers us '''visibility''' which allows us to network with others, and by pinning our voice to a particular name we can develop an '''online reputation'''. This depends on others to decide whether we are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to our legal identity, or not. The choice to connect our online reputation to our &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity.  &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice we make, what is important is that we keep our domains effectively separated. No matter how many domains we identify in our digital life, and how many corresponding identities we create, on the internet every identity - even the one bearing our real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example Tor or TAILS)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonym could be linked to our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify us across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if we are also using our real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' We may think that deleting certain sensitive data from social networks and web services may be enough to protect ourselves, but metadata cannot be deleted as easily.  And using just one identity through our whole life - in all our work and personal domains - creates a bulk of information that makes it easier to profile us. &lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of our social domains. We might also choose to use our real identity in some areas, and our new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When we create a new identity, we should select the contacts for each one carefully, and avoid sharing contacts with other identities we use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* Our various identities should not linked to each other, or to our real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number.&lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be useful, as they can be discarded easily if compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be created for new acquaintances when appropriate as introductory profiles to get to know somebody before we include them in our more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgment on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If we want to use commercial social networks, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that we use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once we have decided on a name, a surname, and a username for our virtual persona, we should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if we wish to develop our own reputation, we don’t want to be confused with someone else, especially if they don’t share our views of the world!&lt;br /&gt;
&lt;br /&gt;
Then we need to create story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role.  We can invent a new story if we feel particularly inspired or base our story on a “known” person’s story, a superhero, a fictional character from our favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when we create an identity we should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== Credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If we keep all our normal identifying traits - such as our gender, job, attitude or the way we write - it might be possible for someone to connect the dots and connect our pseudonymous personas with our real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': Our persona should have a job that is different from ours, but not so different that we don’t know anything about that field: for example, they shouldn’t be a surgeon if we don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select our persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': This could be identified through a &amp;quot;stylometric analysis&amp;quot; that make it possible to identify the author of a particular text. To change this, we can start by using a spell-checker in our word processor to check for consistent typos and we could also think about adopting a different writing attitude. We could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': A good rule of thumb is to give our persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, we are able to weather the strikes and even have some fun in the process. &lt;br /&gt;
&lt;br /&gt;
In any case, we should always remember that on the internet, each one of our identities - even the one connected to our real name - is a “virtual” identity, and it is always better to decide what character traits we want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for our “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for our identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Once we have created several personas, it's important keep them separate in both our physical and digital lives. While keeping notes on our identities might help ensure that we remember our story, there are technical measures we can take to make sure that our profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social network accounts''' for each of our identities. A good method is to always use different apps for each account/identity and, if possible, to separate our identities per device or operating system (see '''6. A different machine for each identity'''). &lt;br /&gt;
To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles  . For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains we need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all we need is a '''disposable email address''' that we only need to use for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if we decide to have just one identity online, using disposable email addresses prevents sites from building up a history of our activities and ensures that if that account gets compromised we can simply delete it and create a new one, keeping our digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are:''' '''https://anonbox.net'''&amp;lt;nowiki/&amp;gt;''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': ''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to our main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised we can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill our main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org).&lt;br /&gt;
&lt;br /&gt;
==== Commercial social platforms ====&lt;br /&gt;
&lt;br /&gt;
Whatever social networking platform we decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
Also be very careful about the''' profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for us in that social network, regardless of our privacy settings.&lt;br /&gt;
&lt;br /&gt;
Make sure your contacts do not overlap with your other identities, and to make sure your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when we interact with the platform using a GPS-enabled phone, but the network our computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
If we access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide our trails is to publish from our various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read: &lt;br /&gt;
* https://www.facebook.com/help/389849807718635 &lt;br /&gt;
* Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
It can be a good idea to follow, from our pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance our real identity from our pseudonymous identities, we can also write (and hashtag on Twitter) posts under our pseudonymous profiles about events that we are not attending, especially if they are taking place far away from us. It can also be fun to publish and then delete posts that look like we have exposed our identity, so as to further confuse anyone who may try to unmask us.&lt;br /&gt;
&lt;br /&gt;
==== Alternative social platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if our aim is to publicise as widely as possible an event we are organizing or a project we are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close our accounts if they find that our contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If we add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to our data, the best solution is to limit the use of commercial social networking platforms to specific projects we want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)], '''N-1''' 8https://n-1.cc/) and '''Crabgrass '''(https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so we way wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, we should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (eg related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, How is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can we choose to share our videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of our activity and information?&lt;br /&gt;
&lt;br /&gt;
==== Creating a blog or website ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com).  Based on it, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org/ http://noblogs.org) and Nadir’s '''BlackBlogs '''– (http://blackblogs.org/ http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see &amp;lt;nowiki/&amp;gt;https://www.autistici.org/en/links.html &amp;lt;nowiki/&amp;gt;and &amp;lt;nowiki/&amp;gt;https://blackblogs.org/policy &amp;lt;nowiki/&amp;gt;respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
If we want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, we can create our own website. For this we need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If we want to use our own '''domain''' name, bypassing payments and identifications may get difficult unless we use Bitcoin or another pseudonymous payment system. The personal data we will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, we can register our domain with the data of an association and use a prepaid credit card that is not connected to our own data (if available in our country). Alternatively, we can use a registrar like Gandi.net ([https://www.gandi.net/ https://www.gandi.net]) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting us; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic, approach is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that we want to secure.&lt;br /&gt;
&lt;br /&gt;
If we use the same operating system for our several identities, no matter how carefully we separate our profiles we can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile we have assigned to our 'real' identity, or get infected by a malware that allows our attacker to monitor everything we do online, with all our identities. Both risks can be limited by using a virtual machine for each of our domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on our physical computer. We can think of a VM as a ''computer within a computer''. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For our purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== Whonix' ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix '''(https://www.whonix.org) is an operating system that aims at protecting our anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. Whonix’s website offers a wide documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== Tails ====&lt;br /&gt;
&lt;br /&gt;
'''Tails''', or '''The Amnesic Incognito Live System''', a free and open-source Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections. When we launch Tails, we have a complete operating system that comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, we can access the internet, communicate, and do all we need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless we ask it to do so.&lt;br /&gt;
&lt;br /&gt;
==== Qubes OS ====&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' – https://www.qubes-os.org – is a free and open-source security-oriented operating system based on '''Fedora''', a Linux distribution, and '''Xen''', a virtual machine that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things we do on our computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, we can do everything on a single physical computer without having to worry that one successful cyberattack harms our whole system, potentially revealing all the connections among our several identities.&lt;br /&gt;
&lt;br /&gt;
==== What to choose ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described – Tails, Whonix and Qubes OS – allow us to use a completely separate operating system for managing our alternate identities, and can be quite useful to make sure that we don’t reveal our true identity while we use the anonymous one(s).&lt;br /&gt;
&lt;br /&gt;
Using '''Tails''' is pretty easy, and if what we need to do with our alternate persona needs a focus on ''anonymization'', then it may be worthwhile to overcome the initial obstacle. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. But if on the other hand we need ''persistence'' and we want to keep some files or actions we have created we need to enable this option when we start the system. Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what we need is both ''anonymity'' and ''security by isolation'' and we have a good machine – https://www.whonix.org/wiki/System_Requirements – where we can run Virtualbox and installing '''Whonix''', according to the number of our alternative identities it seems a good solution that caters to all our needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if we want to keep all our activities inside our own computer without having to install anything else and if what we are trying to do is to effectively ''separate'' our identities rather than anonymize our activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if we feel that we really need to protect ourselves against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protects us from every threat, and we shouldn’t look at them as a magic potion that will make us invulnerable. Nevertheless, by using any of them, according to our needs and resources, we will raise the level of effort that an attacker will need to harm us, thus making an attack less likely. For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&amp;lt;nowiki/&amp;gt;&amp;lt;nowiki/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1326</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1326"/>
				<updated>2015-05-28T08:49:49Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: edited final part&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
== Understanding digital shadows ==&lt;br /&gt;
&lt;br /&gt;
The internet is an amazing space to explore, learn, speak up, listen and communicate with people across the world. Unfortunately, it has also become a contentious space. There is a pushback against people who speak against, question or challenge dominant discourses, especially if those deal with gender and sexual orientations. When planning to be active on the internet as a vocal women, a woman human rights defender, a trans* person and/or a feminist, it’s a good idea to start from an assessment of the traces we leave behind us on the Internet, our digital shadow and the social domains that are spread across our online and physical activities. These two aspects can tell very accurate stories about us; who we are, were we live and hang out, what we are interested in and who our friends are.&lt;br /&gt;
&lt;br /&gt;
This can expose us to several threats. In particular, it is the publicly available traces we leave behind that expose us to online harassment. However, there are also many '''strategies''' and '''tools''' we can use to shape or control our digital shadows, to increase our privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing our activity online.  &lt;br /&gt;
&lt;br /&gt;
Some examples of these include controlling the amount of data we give away by consciously stripping valuable information from content and metadata; trying the art of self doxing; and thinking about ways to play with and break up our online identity.&lt;br /&gt;
&lt;br /&gt;
Our digital shadows can be defined as the stories data tells about us. These digital shadows are created by trillions of bits of data, digital traces we leave everyday when we connect to the Internet, our mobile phone and online services. Our digital shadows have a life of their own, are affected by others and change in unpredictable ways. Our digital shadows grow continuously, can be permanent permanent and we have little control over them. These traces are a spectre of our past and present activities, which melt together in a permanent and ever-changing profile.&lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' &lt;br /&gt;
The devices and the software we use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data about us. These bits of data can include our name, location, contacts, pictures, messages, tweets and likes, but also the brand of our computer, length of our phone calls and information about which websites we visit. These data traces can be put out there by ourselves as well as other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' &lt;br /&gt;
In some cases we '''actively '''share data – for example when we share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about us, by tagging us in pictures, mentioning us in tweets or simply by communicating with us. In other cases, we give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
Our browsing habits and IP address are shared when we visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites we visit, and the information shared is collected for a wide range of purposes,  from website analytics to advertising. Our mobile phone apps also collect data on us without our active knowledge or consent – for example, the photos we take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow us as we move from one service to another - from our internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in our readers to publishing pictures from the latest protest we have covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of our messages, blogs, tweets and phone calls; it is our pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables our email to be delivered, help find files on our computer and permit mobile communication. Metadata can be our email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognized by computers.&lt;br /&gt;
&lt;br /&gt;
==== Who collects data? ====   &lt;br /&gt;
&lt;br /&gt;
We might wonder about the importance of one picture, one message, one call or think there is so much data out there that nobody knows what to do with it. However, data collection and data analysis has become very sophisticated. The data traces you leave are  collected, analysed and sorted by various parties to create digital shadows, or profiles. Every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by companies, governments and individuals for a variety of purposes. It can be bought and sold; it can be used to control; or it can be used to create harassment strategies. Our digital shadows or profiles can be used to gain insight into who we are, what we do, where we have been and with whom we have been interacting. By aggregating data, these can then be used to make predictions on what we might do or where we might be in future. For example, if someone knows that we are an outspoken blogger on gender issues in country x, they know that we will probably be present at a conference on blogging and women held in that country. &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to our digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. We can't know exactly what is happening to our digital shadow, and that itself is a problem. Fortunately, there are many tools and tactics we can use to manage our digital shadows and to limit their ramifications in terms of profiling, control and surveillance. This will be discussed in the rest of this section. &lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
Because anyone can potentially access to our digital shadow, we cannot know precisely what happens to our digital shadow and that itself is a problem. But there are tools and tactics to manage our digital shadow and to limit its ramifications in terms of  profiling and surveillance. Some good places to start are:&lt;br /&gt;
&lt;br /&gt;
* Exploring our individual digital shadow with '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – a tool launched by Tactical Tech that offers a lot of tips on how to protect our privacy and control our digital shadow&lt;br /&gt;
* Identifying and materialising social networks across our online and physical activities: John Fass, researcher and designer at the Royal College of Art, has created some activities to materialise our social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* Seeing through the eyes of our mobile phone by installing a tool called '''openpath.cc'''. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone we can change the permissions for each app under its privacy setting.&lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
The good news is that we can partly control what content and metadata we give away. When we publish content on the web, it is always a good idea to ask ourselves if what we are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to our personal lives, the names we mention or the images we upload may contribute to a picture about who we are, what we are doing, where we are doing it and so on. This could be used by people who wish to target us. &lt;br /&gt;
&lt;br /&gt;
This does not mean that we should silence ourselves – by taking some basic measures, we can limit our risks by increasing the level of the effort that would be required to attack us or our contacts.&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like our IP address''', thereby increasing our anonymity online.&lt;br /&gt;
&lt;br /&gt;
* '''Use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about our life''', we can use private profiles that can only be accessed by selected contacts. When using those on commercial social media, we should be aware of the regular changes to the privacy policies of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web, we should ask ourselves if the information we spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices.  https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or Adblock Plus, as well as by monitoring our privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not usingy our real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or we can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing metada from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
==== Self-Doxing ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet and constitute a type of social engineering technique. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find his or her flaws.&lt;br /&gt;
&amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;). Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser. Useful tips on self-doxing tools and techniques can be found here: &lt;br /&gt;
* https://lilithlela.cyberguerrilla.org/?page_id=93870  &lt;br /&gt;
* https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* Ubisoft’s '''Digital Shadow''' is a Facebook app which illustrates what third parties can know about us through our Facebook profiles: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== Mapping our social domains ====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”. Each of us belongs to several '''social domains''' - our work or advocacy networks, our family networks, friends, and sports teams. Some networks may be feel more secure than others. For example, we may tend to have a more secure communication practices for our work or advocacy activities, but less secure practices for interacting with friends on a social network. &lt;br /&gt;
&lt;br /&gt;
If we use a single identity in all our domains, or if we always use our real name online, it becomes easier to gather information about us and to identify our vulnerabilities. For example, if we reveal in a social network that we like a particular kind of game, an attacker who wants to investigate our work or advocacy activities might trick us into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if our work identity and our gaming profile can be connected to the same person; and this is why separating our social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
To separate our social domains, it's helpful to first map them out and identify which ones could expose us most. We can do this by thinking about our different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
For instance, polish computer security researcher Joanna Rutkowska has developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain includes her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the communication with her partner.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain includes the totally untrusted and which doesn’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
You can find more information about her scheme here: &lt;br /&gt;
&lt;br /&gt;
* Joanna Rutkowska’s article on security domains can be found here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
==== Deleting identities ====&lt;br /&gt;
&lt;br /&gt;
If we decide to separate our social domains by creating multiple identities, we should decide whether to delete or keep the identity or identities that we already have.  To do this, we can start by investigating the traces of our existing identity or identities. (For methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;). If we opt for deleting existing accounts, we can visit the following places:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitate the process of deleting social network profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once we have identified our different social domains and the digital activities and contacts that go with them, what we need to do is decide if we want to differentiate our identities accordingly, or if we'd rather stick to our official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
We may want to keep our work connected to our legal or &amp;quot;real&amp;quot; identity, or think that our activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social networks, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific context the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once we have '''assessed our risk,''' we can then consider different strategies for separating our identities online.  For more on assessing risk visit: https://ssd.eff.org/en/module/introduction-threat-modeling  &lt;br /&gt;
'''Strategies''' for maintaining separate identities can range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding [http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name talks about her decision to start writing under her real name], dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously Vani, a human rights activist, writes]: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”.&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where we don't need to gain other people's trust, when there are few or no people we can trust, or when we don't want to expose others in our life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When we adopt anonymity as a strategy we may use pseudonyms, but these should not used across different networks or social domains, and some may only be used once and then discarded. Because of this anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. For more information on how to be anonymous online, see '''Anonymizing tools'''.&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. There are [[https://www.eff.org/deeplinks/2011/07/case-pseudonyms|myriad reasons why individuals may wish to use a name other than the one they were born with]]. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent harassment and discrimination or they may use a name that’s easier to pronounce or spell in a given culture. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot; applying a real name policy which typically means using your legal name or the name by which you are commonly known. This policy has caused many user to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that we can be reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is [https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community using a name-shaped pseudonym].&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers us '''visibility''' which allows us to network with others, and by pinning our voice to a particular name we can develop an '''online reputation'''. This depends on others to decide whether we are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to our legal identity, or not. The choice to connect our online reputation to our &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity.  &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice we make, what is important is that we keep our domains effectively separated. No matter how many domains we identify in our digital life, and how many corresponding identities we create, on the internet every identity - even the one bearing our real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example Tor or TAILS)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonym could be linked to our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify us across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if we are also using our real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
==== Creating new identities ====&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' We may think that deleting certain sensitive data from social networks and web services may be enough to protect ourselves, but metadata cannot be deleted as easily.  And using just one identity through our whole life - in all our work and personal domains - creates a bulk of information that makes it easier to profile us. &lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of our social domains. We might also choose to use our real identity in some areas, and our new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When we create a new identity, we should select the contacts for each one carefully, and avoid sharing contacts with other identities we use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* Our various identities should not linked to each other, or to our real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number.&lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be useful, as they can be discarded easily if compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be created for new acquaintances when appropriate as introductory profiles to get to know somebody before we include them in our more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgment on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If we want to use commercial social networks, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that we use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once we have decided on a name, a surname, and a username for our virtual persona, we should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if we wish to develop our own reputation, we don’t want to be confused with someone else, especially if they don’t share our views of the world!&lt;br /&gt;
&lt;br /&gt;
Then we need to create story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role.  We can invent a new story if we feel particularly inspired or base our story on a “known” person’s story, a superhero, a fictional character from our favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when we create an identity we should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== Creating a credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If we keep all our normal identifying traits - such as our gender, job, attitude or the way we write - it might be possible for someone to connect the dots and connect our pseudonymous personas with our real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': Our persona should have a job that is different from ours, but not so different that we don’t know anything about that field: for example, they shouldn’t be a surgeon if we don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select our persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': This could be identified through a &amp;quot;stylometric analysis&amp;quot; that make it possible to identify the author of a particular text. To change this, we can start by using a spell-checker in our word processor to check for consistent typos and we could also think about adopting a different writing attitude. We could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': A good rule of thumb is to give our persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, we are able to weather the strikes and even have some fun in the process. &lt;br /&gt;
&lt;br /&gt;
In any case, we should always remember that on the internet, each one of our identities - even the one connected to our real name - is a “virtual” identity, and it is always better to decide what character traits we want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for our “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for our identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Once we have created several personas, it's important keep them separate in both our physical and digital lives. While keeping notes on our identities might help ensure that we remember our story, there are technical measures we can take to make sure that our profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social network accounts''' for each of our identities. A good method is to always use different apps for each account/identity and, if possible, to separate our identities per device or operating system (see '''6. A different machine for each identity'''). &lt;br /&gt;
To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles  . For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
=== Managing collective online identities ===&lt;br /&gt;
&lt;br /&gt;
While the collaboration of many individuals can help create a rich collective identity, managing a collective project may have some security and technological challenges we should keep in mind.&lt;br /&gt;
&lt;br /&gt;
Since a single weak link in a security chain can break the entire system, our security and anonymity depend on the precautions each member of our group takes. We may decide that we don’t want to be absolutely anonymous; that our close friends can know about our collective activities. The degree of security we may want to attain for our group depends on the possible threats we face and on our adversaries’ power and skills.&lt;br /&gt;
&lt;br /&gt;
Nonetheless, there are some important things we don't want want to lose, like the password to our collective mailbox or to our group’s social networking accounts. If we decide that we are going to share those passwords with the whole group, each member needs to be trained on how to store a password securely.&lt;br /&gt;
&lt;br /&gt;
To minimise this kind of risk, we should try to use services that provide for different accounts and passwords whenever possible. For example, instead of using a single mailbox, we may create a mailing list that all the group members subscribe to. If we allow non-subscribed people to write to it, each group member will be able to read that e-mail in their own mailbox rather than in a collective one with a dangerously shared password. Similarly, if coordination really needs to happen through Facebook, it is much better to share information in a dedicated group rather than do everything within a collective account. &lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains we need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all we need is a '''disposable email address''' that we only need to use for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if we decide to have just one identity online, using disposable email addresses prevents sites from building up a history of our activities and ensures that if that account gets compromised we can simply delete it and create a new one, keeping our digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are:''' '''https://anonbox.net'''&amp;lt;nowiki/&amp;gt;''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': ''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to our main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised we can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill our main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org).&lt;br /&gt;
&lt;br /&gt;
==== Commercial social platforms ====&lt;br /&gt;
&lt;br /&gt;
Whatever social networking platform we decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
Also be very careful about the''' profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for us in that social network, regardless of our privacy settings.&lt;br /&gt;
&lt;br /&gt;
Make sure your contacts do not overlap with your other identities, and to make sure your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when we interact with the platform using a GPS-enabled phone, but the network our computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
If we access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide our trails is to publish from our various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read: &lt;br /&gt;
* https://www.facebook.com/help/389849807718635 &lt;br /&gt;
* Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
It can be a good idea to follow, from our pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance our real identity from our pseudonymous identities, we can also write (and hashtag on Twitter) posts under our pseudonymous profiles about events that we are not attending, especially if they are taking place far away from us. It can also be fun to publish and then delete posts that look like we have exposed our identity, so as to further confuse anyone who may try to unmask us.&lt;br /&gt;
&lt;br /&gt;
==== Alternative social platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if our aim is to publicise as widely as possible an event we are organizing or a project we are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close our accounts if they find that our contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If we add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to our data, the best solution is to limit the use of commercial social networking platforms to specific projects we want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)], '''N-1''' 8https://n-1.cc/) and '''Crabgrass '''(https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so we way wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, we should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (eg related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, How is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can we choose to share our videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of our activity and information?&lt;br /&gt;
&lt;br /&gt;
==== Creating a blog or website ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com).  Based on it, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org/ http://noblogs.org) and Nadir’s '''BlackBlogs '''– (http://blackblogs.org/ http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see &amp;lt;nowiki/&amp;gt;https://www.autistici.org/en/links.html &amp;lt;nowiki/&amp;gt;and &amp;lt;nowiki/&amp;gt;https://blackblogs.org/policy &amp;lt;nowiki/&amp;gt;respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
If we want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, we can create our own website. For this we need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If we want to use our own '''domain''' name, bypassing payments and identifications may get difficult unless we use Bitcoin or another pseudonymous payment system. The personal data we will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, we can register our domain with the data of an association and use a prepaid credit card that is not connected to our own data (if available in our country). Alternatively, we can use a registrar like Gandi.net ([https://www.gandi.net/ https://www.gandi.net]) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== A different machine for each identity ==&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting us; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic, approach is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that we want to secure.&lt;br /&gt;
&lt;br /&gt;
If we use the same operating system for our several identities, no matter how carefully we separate our profiles we can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile we have assigned to our 'real' identity, or get infected by a malware that allows our attacker to monitor everything we do online, with all our identities. Both risks can be limited by using a virtual machine for each of our domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on our physical computer. We can think of a VM as a ''computer within a computer''. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For our purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== Whonix' ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix '''(https://www.whonix.org) is an operating system that aims at protecting our anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. Whonix’s website offers a wide documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== Tails ====&lt;br /&gt;
&lt;br /&gt;
'''Tails''', or '''The Amnesic Incognito Live System''', a free and open-source Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections. When we launch Tails, we have a complete operating system that comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, we can access the internet, communicate, and do all we need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless we ask it to do so.&lt;br /&gt;
&lt;br /&gt;
==== Qubes OS ====&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' – https://www.qubes-os.org – is a free and open-source security-oriented operating system based on '''Fedora''', a Linux distribution, and '''Xen''', a virtual machine that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things we do on our computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, we can do everything on a single physical computer without having to worry that one successful cyberattack harms our whole system, potentially revealing all the connections among our several identities.&lt;br /&gt;
&lt;br /&gt;
==== What to choose ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described – Tails, Whonix and Qubes OS – allow us to use a completely separate operating system for managing our alternate identities, and can be quite useful to make sure that we don’t reveal our true identity while we use the anonymous one(s).&lt;br /&gt;
&lt;br /&gt;
Using '''Tails''' is pretty easy, and if what we need to do with our alternate persona needs a focus on ''anonymization'', then it may be worthwhile to overcome the initial obstacle. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. But if on the other hand we need ''persistence'' and we want to keep some files or actions we have created we need to enable this option when we start the system. Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what we need is both ''anonymity'' and ''security by isolation'' and we have a good machine – https://www.whonix.org/wiki/System_Requirements – where we can run Virtualbox and installing '''Whonix''', according to the number of our alternative identities it seems a good solution that caters to all our needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if we want to keep all our activities inside our own computer without having to install anything else and if what we are trying to do is to effectively ''separate'' our identities rather than anonymize our activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if we feel that we really need to protect ourselves against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protects us from every threat, and we shouldn’t look at them as a magic potion that will make us invulnerable. Nevertheless, by using any of them, according to our needs and resources, we will raise the level of effort that an attacker will need to harm us, thus making an attack less likely. For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&amp;lt;nowiki/&amp;gt;&amp;lt;nowiki/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1325</id>
		<title>Complete manual</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Complete_manual&amp;diff=1325"/>
				<updated>2015-05-28T08:48:10Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: /* Managing several identities */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
== Understanding digital shadows ==&lt;br /&gt;
&lt;br /&gt;
The internet is an amazing space to explore, learn, speak up, listen and communicate with people across the world. Unfortunately, it has also become a contentious space. There is a pushback against people who speak against, question or challenge dominant discourses, especially if those deal with gender and sexual orientations. When planning to be active on the internet as a vocal women, a woman human rights defender, a trans* person and/or a feminist, it’s a good idea to start from an assessment of the traces we leave behind us on the Internet, our digital shadow and the social domains that are spread across our online and physical activities. These two aspects can tell very accurate stories about us; who we are, were we live and hang out, what we are interested in and who our friends are.&lt;br /&gt;
&lt;br /&gt;
This can expose us to several threats. In particular, it is the publicly available traces we leave behind that expose us to online harassment. However, there are also many '''strategies''' and '''tools''' we can use to shape or control our digital shadows, to increase our privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing our activity online.  &lt;br /&gt;
&lt;br /&gt;
Some examples of these include controlling the amount of data we give away by consciously stripping valuable information from content and metadata; trying the art of self doxing; and thinking about ways to play with and break up our online identity.&lt;br /&gt;
&lt;br /&gt;
Our digital shadows can be defined as the stories data tells about us. These digital shadows are created by trillions of bits of data, digital traces we leave everyday when we connect to the Internet, our mobile phone and online services. Our digital shadows have a life of their own, are affected by others and change in unpredictable ways. Our digital shadows grow continuously, can be permanent permanent and we have little control over them. These traces are a spectre of our past and present activities, which melt together in a permanent and ever-changing profile.&lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' &lt;br /&gt;
The devices and the software we use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data about us. These bits of data can include our name, location, contacts, pictures, messages, tweets and likes, but also the brand of our computer, length of our phone calls and information about which websites we visit. These data traces can be put out there by ourselves as well as other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' &lt;br /&gt;
In some cases we '''actively '''share data – for example when we share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about us, by tagging us in pictures, mentioning us in tweets or simply by communicating with us. In other cases, we give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
Our browsing habits and IP address are shared when we visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites we visit, and the information shared is collected for a wide range of purposes,  from website analytics to advertising. Our mobile phone apps also collect data on us without our active knowledge or consent – for example, the photos we take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow us as we move from one service to another - from our internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in our readers to publishing pictures from the latest protest we have covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' &lt;br /&gt;
Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of our messages, blogs, tweets and phone calls; it is our pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables our email to be delivered, help find files on our computer and permit mobile communication. Metadata can be our email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognized by computers.&lt;br /&gt;
&lt;br /&gt;
==== Who collects data? ====   &lt;br /&gt;
&lt;br /&gt;
We might wonder about the importance of one picture, one message, one call or think there is so much data out there that nobody knows what to do with it. However, data collection and data analysis has become very sophisticated. The data traces you leave are  collected, analysed and sorted by various parties to create digital shadows, or profiles. Every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by companies, governments and individuals for a variety of purposes. It can be bought and sold; it can be used to control; or it can be used to create harassment strategies. Our digital shadows or profiles can be used to gain insight into who we are, what we do, where we have been and with whom we have been interacting. By aggregating data, these can then be used to make predictions on what we might do or where we might be in future. For example, if someone knows that we are an outspoken blogger on gender issues in country x, they know that we will probably be present at a conference on blogging and women held in that country. &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to our digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. We can't know exactly what is happening to our digital shadow, and that itself is a problem. Fortunately, there are many tools and tactics we can use to manage our digital shadows and to limit their ramifications in terms of profiling, control and surveillance. This will be discussed in the rest of this section. &lt;br /&gt;
&lt;br /&gt;
==== Exploring ====&lt;br /&gt;
&lt;br /&gt;
Because anyone can potentially access to our digital shadow, we cannot know precisely what happens to our digital shadow and that itself is a problem. But there are tools and tactics to manage our digital shadow and to limit its ramifications in terms of  profiling and surveillance. Some good places to start are:&lt;br /&gt;
&lt;br /&gt;
* Exploring our individual digital shadow with '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – a tool launched by Tactical Tech that offers a lot of tips on how to protect our privacy and control our digital shadow&lt;br /&gt;
* Identifying and materialising social networks across our online and physical activities: John Fass, researcher and designer at the Royal College of Art, has created some activities to materialise our social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* Seeing through the eyes of our mobile phone by installing a tool called '''openpath.cc'''. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone we can change the permissions for each app under its privacy setting.&lt;br /&gt;
&lt;br /&gt;
==== Controlling ====&lt;br /&gt;
&lt;br /&gt;
The good news is that we can partly control what content and metadata we give away. When we publish content on the web, it is always a good idea to ask ourselves if what we are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to our personal lives, the names we mention or the images we upload may contribute to a picture about who we are, what we are doing, where we are doing it and so on. This could be used by people who wish to target us. &lt;br /&gt;
&lt;br /&gt;
This does not mean that we should silence ourselves – by taking some basic measures, we can limit our risks by increasing the level of the effort that would be required to attack us or our contacts.&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like our IP address''', thereby increasing our anonymity online.&lt;br /&gt;
&lt;br /&gt;
* '''Use strong and different passwords''' for each web service you use - if not, someone that intercepts your password could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about our life''', we can use private profiles that can only be accessed by selected contacts. When using those on commercial social media, we should be aware of the regular changes to the privacy policies of that platform. There have been cases where privacy settings have been changed, exposing pictures, content and conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web, we should ask ourselves if the information we spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to discuss shared agreements about posting information on public events.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices.  https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or Adblock Plus, as well as by monitoring our privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not usingy our real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or we can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing metada from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
==== Self-Doxing ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' describes tracing or gathering information about someone using sources that are freely available on the internet and constitute a type of social engineering technique. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. Doxing is premised on the idea that the more you know about your target, the easier it will be to find his or her flaws.&lt;br /&gt;
&amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, images, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists. But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;). Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser. Useful tips on self-doxing tools and techniques can be found here: &lt;br /&gt;
* https://lilithlela.cyberguerrilla.org/?page_id=93870  &lt;br /&gt;
* https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* Ubisoft’s '''Digital Shadow''' is a Facebook app which illustrates what third parties can know about us through our Facebook profiles: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== Mapping our social domains ====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”. Each of us belongs to several '''social domains''' - our work or advocacy networks, our family networks, friends, and sports teams. Some networks may be feel more secure than others. For example, we may tend to have a more secure communication practices for our work or advocacy activities, but less secure practices for interacting with friends on a social network. &lt;br /&gt;
&lt;br /&gt;
If we use a single identity in all our domains, or if we always use our real name online, it becomes easier to gather information about us and to identify our vulnerabilities. For example, if we reveal in a social network that we like a particular kind of game, an attacker who wants to investigate our work or advocacy activities might trick us into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if our work identity and our gaming profile can be connected to the same person; and this is why separating our social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
To separate our social domains, it's helpful to first map them out and identify which ones could expose us most. We can do this by thinking about our different activities and networks, and reflecting how sensitive each of these is in order to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
For instance, polish computer security researcher Joanna Rutkowska has developed a Linux distribution based on the concept of “security by isolation” called Qubes OS. In this system, each social domain is isolated in a separate virtual machine. The three basic domains Rutkowska identifies for herself are:&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain includes her work email, work PGP keys, reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the communication with her partner.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain includes the totally untrusted and which doesn’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
You can find more information about her scheme here: &lt;br /&gt;
&lt;br /&gt;
* Joanna Rutkowska’s article on security domains can be found here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
==== Deleting identities ====&lt;br /&gt;
&lt;br /&gt;
If we decide to separate our social domains by creating multiple identities, we should decide whether to delete or keep the identity or identities that we already have.  To do this, we can start by investigating the traces of our existing identity or identities. (For methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;). If we opt for deleting existing accounts, we can visit the following places:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitate the process of deleting social network profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
== Separating identities online ==&lt;br /&gt;
&lt;br /&gt;
Once we have identified our different social domains and the digital activities and contacts that go with them, what we need to do is decide if we want to differentiate our identities accordingly, or if we'd rather stick to our official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
We may want to keep our work connected to our legal or &amp;quot;real&amp;quot; identity, or think that our activism should be anonymous, but these are decisions that need to be thought about carefully. For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social networks, and her online activism identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider for each specific context the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known?&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known?&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once we have '''assessed our risk,''' we can then consider different strategies for separating our identities online.  For more on assessing risk visit: https://ssd.eff.org/en/module/introduction-threat-modeling  &lt;br /&gt;
'''Strategies''' for maintaining separate identities can range from full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;Real&amp;quot; names ====&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding [http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name talks about her decision to start writing under her real name], dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”.  Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is a dangerous one.&lt;br /&gt;
&lt;br /&gt;
==== Anonymity ====&lt;br /&gt;
&lt;br /&gt;
On anonymity, [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity%20speaks%20of%20their%20participation%20on%20social%20networks%20anonymously Vani, a human rights activist, writes]: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”.&lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in settings where we don't need to gain other people's trust, when there are few or no people we can trust, or when we don't want to expose others in our life to risks. When you are researching or participating in message boards about health issues, or when sharing sensitive information for instance you may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
But total anonymity can be difficult to maintain and also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely as anonymity can further isolates you as a blogger underlines: “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
When we adopt anonymity as a strategy we may use pseudonyms, but these should not used across different networks or social domains, and some may only be used once and then discarded. Because of this anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. For more information on how to be anonymous online, see '''Anonymizing tools'''.&lt;br /&gt;
&lt;br /&gt;
==== Persistent Pseudonymity ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves a fictitious name consistently over a period of time. In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. There are [[https://www.eff.org/deeplinks/2011/07/case-pseudonyms|myriad reasons why individuals may wish to use a name other than the one they were born with]]. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent harassment and discrimination or they may use a name that’s easier to pronounce or spell in a given culture. &lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity&amp;quot; applying a real name policy which typically means using your legal name or the name by which you are commonly known. This policy has caused many user to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that we can be reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is [https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community using a name-shaped pseudonym].&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers us '''visibility''' which allows us to network with others, and by pinning our voice to a particular name we can develop an '''online reputation'''. This depends on others to decide whether we are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to our legal identity, or not. The choice to connect our online reputation to our &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== Collective Identity ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. General Ludd, Captain Swing, the Guerrilla Girls, Luther Blissett, Anonymous - for centuries groups and like-minded people have participated anonymously in historic protest movements, or have created ground-breaking and provoking artworks or pranks under a collective pseudonym. Besides hiding the identities of the individuals involved, these collective personas have shrouded their feats in an aura of myth and almost magical power. Anonymity through collective identity can translate in a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity.  &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice we make, what is important is that we keep our domains effectively separated. No matter how many domains we identify in our digital life, and how many corresponding identities we create, on the internet every identity - even the one bearing our real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': It requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Intensive as it requires contacts caution. It might also require the use of anonymisation tools (for example Tor or TAILS)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonym could be linked to our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify us across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if we are also using our real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Possible exposure of our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
== Creating a new online identity ==&lt;br /&gt;
&lt;br /&gt;
==== Creating new identities ====&lt;br /&gt;
&lt;br /&gt;
''&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' We may think that deleting certain sensitive data from social networks and web services may be enough to protect ourselves, but metadata cannot be deleted as easily.  And using just one identity through our whole life - in all our work and personal domains - creates a bulk of information that makes it easier to profile us. &lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one, or several new ones for each of our social domains. We might also choose to use our real identity in some areas, and our new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When we create a new identity, we should select the contacts for each one carefully, and avoid sharing contacts with other identities we use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* Our various identities should not linked to each other, or to our real identity. Remember that some of these connections can be tenuous as for example when signing up for a new pseudonymous Gmail account using your real phone number.&lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be useful, as they can be discarded easily if compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable extra identities can be created for new acquaintances when appropriate as introductory profiles to get to know somebody before we include them in our more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== What’s in a name ? ====&lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgment on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If we want to use commercial social networks, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that we use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once we have decided on a name, a surname, and a username for our virtual persona, we should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if we wish to develop our own reputation, we don’t want to be confused with someone else, especially if they don’t share our views of the world!&lt;br /&gt;
&lt;br /&gt;
Then we need to create story for this virtual persona because if it comes with a story it makes it a lot easier to maintain the role.  We can invent a new story if we feel particularly inspired or base our story on a “known” person’s story, a superhero, a fictional character from our favourite novel, or adopt a “collective identity” like Anonymous/Anonymiss or the Guerrilla Girls. In any case when we create an identity we should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== Creating a credible persona ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If we keep all our normal identifying traits - such as our gender, job, attitude or the way we write - it might be possible for someone to connect the dots and connect our pseudonymous personas with our real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': Our persona should have a job that is different from ours, but not so different that we don’t know anything about that field: for example, they shouldn’t be a surgeon if we don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select our persona's skills and the main topics they focus on and write about. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': This could be identified through a &amp;quot;stylometric analysis&amp;quot; that make it possible to identify the author of a particular text. To change this, we can start by using a spell-checker in our word processor to check for consistent typos and we could also think about adopting a different writing attitude. We could adopt one simple rule for each persona, making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks. &lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': A good rule of thumb is to give our persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, we are able to weather the strikes and even have some fun in the process. &lt;br /&gt;
&lt;br /&gt;
In any case, we should always remember that on the internet, each one of our identities - even the one connected to our real name - is a “virtual” identity, and it is always better to decide what character traits we want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for our “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for our identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
== Managing several identities ==&lt;br /&gt;
&lt;br /&gt;
Once we have created several personas, it's important keep them separate in both our physical and digital lives. While keeping notes on our identities might help ensure that we remember our story, there are technical measures we can take to make sure that our profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social network accounts''' for each of our identities. A good method is to always use different apps for each account/identity and, if possible, to separate our identities per device or operating system (see '''6. A different machine for each identity'''). &lt;br /&gt;
To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles  . For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
=== Managing collective online identities ===&lt;br /&gt;
&lt;br /&gt;
While the collaboration of many individuals can help create a rich collective identity, managing a collective project may have some security and technological challenges we should keep in mind.&lt;br /&gt;
&lt;br /&gt;
Since a single weak link in a security chain can break the entire system, our security and anonymity depend on the precautions each member of our group takes. We may decide that we don’t want to be absolutely anonymous; that our close friends can know about our collective activities. The degree of security we may want to attain for our group depends on the possible threats we face and on our adversaries’ power and skills.&lt;br /&gt;
&lt;br /&gt;
Nonetheless, there are some important things we don't want want to lose, like the password to our collective mailbox or to our group’s social networking accounts. If we decide that we are going to share those passwords with the whole group, each member needs to be trained on how to store a password securely.&lt;br /&gt;
&lt;br /&gt;
To minimise this kind of risk, we should try to use services that provide for different accounts and passwords whenever possible. For example, instead of using a single mailbox, we may create a mailing list that all the group members subscribe to. If we allow non-subscribed people to write to it, each group member will be able to read that e-mail in their own mailbox rather than in a collective one with a dangerously shared password. Similarly, if coordination really needs to happen through Facebook, it is much better to share information in a dedicated group rather than do everything within a collective account. &lt;br /&gt;
&lt;br /&gt;
==== Disposable email addresses ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains we need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all we need is a '''disposable email address''' that we only need to use for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if we decide to have just one identity online, using disposable email addresses prevents sites from building up a history of our activities and ensures that if that account gets compromised we can simply delete it and create a new one, keeping our digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are:''' '''https://anonbox.net'''&amp;lt;nowiki/&amp;gt;''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': ''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to our main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised we can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill our main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org).&lt;br /&gt;
&lt;br /&gt;
==== Commercial social platforms ====&lt;br /&gt;
&lt;br /&gt;
Whatever social networking platform we decide to use, you should always read its terms of service to check if they suit your purposes. To get a summary of the terms of service of many social networking platforms (and other web services), go to the website Terms of Service; Didn’t Read (https://tosdr.org).&lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?) &lt;br /&gt;
&lt;br /&gt;
Also be very careful about the''' profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for us in that social network, regardless of our privacy settings.&lt;br /&gt;
&lt;br /&gt;
Make sure your contacts do not overlap with your other identities, and to make sure your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous personas with your real identity. If someone is looking to unmask one of these personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when we interact with the platform using a GPS-enabled phone, but the network our computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
If we access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage your social networking platforms - it is, however, a good idea to use a different one for each identity, to reduce the risk of giving away your real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide our trails is to publish from our various accounts at different times of the day. Some social networking platforms, like Facebook, allow users to schedule the publication time of their posts. To learn how to do this, read: &lt;br /&gt;
* https://www.facebook.com/help/389849807718635 &lt;br /&gt;
* Buffer (https://buffer.com) and Postcron (https://postcron.com) enable you to schedule a post on Twitter and other platforms. &lt;br /&gt;
&lt;br /&gt;
It can be a good idea to follow, from our pseudonymous profiles, other people who might reasonably be considered the real owners of that profile. To further distance our real identity from our pseudonymous identities, we can also write (and hashtag on Twitter) posts under our pseudonymous profiles about events that we are not attending, especially if they are taking place far away from us. It can also be fun to publish and then delete posts that look like we have exposed our identity, so as to further confuse anyone who may try to unmask us.&lt;br /&gt;
&lt;br /&gt;
==== Alternative social platforms ====&lt;br /&gt;
&lt;br /&gt;
Mainstream commercial social networking platforms like Facebook or Twitter can be extremely useful if our aim is to publicise as widely as possible an event we are organizing or a project we are launching. &lt;br /&gt;
&lt;br /&gt;
However, if you're using one of these platforms it is important to be aware that: &lt;br /&gt;
* these platforms have very strict terms of service that could justify their decision to close our accounts if they find that our contents go against their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
* users of these platforms are profiled, and information is sold to advertisers. If we add to this the ever-changing terms of service and the interactions with other apps and features that make it very difficult to understand clearly what actually happens to our data, the best solution is to limit the use of commercial social networking platforms to specific projects we want to publicise to a wide audience.&lt;br /&gt;
&lt;br /&gt;
There are also alternatives available - social networking platforms that give much more freedom to their users and don't profile them.&lt;br /&gt;
*  There are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)], '''N-1''' 8https://n-1.cc/) and '''Crabgrass '''(https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
* Other similar sites may be popular in different regions, so we way wish to explore other options. &lt;br /&gt;
&lt;br /&gt;
Before choosing to use a social networking platform, we should ask:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there any problems related to encryption (eg related to encryption certificates)?&lt;br /&gt;
* According to the platform's End User Licence Agreement, Privacy Policy and/or Data Use Policy, How is your content and personal data treated? With whom are they shared? &lt;br /&gt;
* What privacy options are provided for users? For example, can we choose to share our videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* Is the geographical location of the servers known? Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of our activity and information?&lt;br /&gt;
&lt;br /&gt;
==== Creating a blog or website ====&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' can be as easy as signing up to a blogging platform and choosing a name and a &amp;quot;theme&amp;quot; or visual template. There are several blogging platforms that are both user-friendly and free, including the open-source Wordpress (Wordpress.com).  Based on it, but with some tweaks for additional user privacy, are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs ''' (http://noblogs.org/ http://noblogs.org) and Nadir’s '''BlackBlogs '''– (http://blackblogs.org/ http://blackblogs.org). To create a blog on either of these platforms, all that is needed is to have an email account hosted on an autonomous server (see &amp;lt;nowiki/&amp;gt;https://www.autistici.org/en/links.html &amp;lt;nowiki/&amp;gt;and &amp;lt;nowiki/&amp;gt;https://blackblogs.org/policy &amp;lt;nowiki/&amp;gt;respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
If we want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, we can create our own website. For this we need to get some space in a server through a webhosting service. There are many services out there, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If we want to use our own '''domain''' name, bypassing payments and identifications may get difficult unless we use Bitcoin or another pseudonymous payment system. The personal data we will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command in a search engine (whois) or on several websites such as Gandi.net (https://www.gandi.net/whois). To avoid this, we can register our domain with the data of an association and use a prepaid credit card that is not connected to our own data (if available in our country). Alternatively, we can use a registrar like Gandi.net ([https://www.gandi.net/ https://www.gandi.net]) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
== Managing collective online identities ==&lt;br /&gt;
&lt;br /&gt;
While the collaboration of many individuals can help create a rich collective identity, managing a collective project may have some security and technological challenges we should keep in mind.&lt;br /&gt;
&lt;br /&gt;
Since a single weak link in a security chain can break the entire system, our security and anonymity depend on the precautions each member of our group takes. We may decide that we don’t want to be absolutely anonymous; that our close friends can know about our collective activities. The degree of security we may want to attain for our group depends on the possible threats we face and on our adversaries’ power and skills. &lt;br /&gt;
&lt;br /&gt;
Nonetheless, there are some important things we don't want want to lose, like the password to our collective mailbox or to our group’s social networking accounts. If we decide that we are going to share those passwords with the whole group, each member needs to be trained on how to store a password securely. &lt;br /&gt;
&lt;br /&gt;
To minimise this kind of risk, we should try to use services that provide for different accounts and passwords whenever possible. For example, instead of using a single mailbox, we may create a mailing list that all the group members subscribe to. If we allow non-subscribed people to write to it, each group member will be able to read that e-mail in their own mailbox rather than in a collective one with a dangerously shared password. Similarly, if coordination really needs to happen through Facebook, it is much better to share information in a dedicated group rather than do everything within a collective account.&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting us; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, one of the most realistic, approach is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that we want to secure.&lt;br /&gt;
&lt;br /&gt;
If we use the same operating system for our several identities, no matter how carefully we separate our profiles we can still make a human mistake by, for example, connecting to a pseudonymous account through the browser profile we have assigned to our 'real' identity, or get infected by a malware that allows our attacker to monitor everything we do online, with all our identities. Both risks can be limited by using a virtual machine for each of our domains, and by reserving yet another virtual machine to opening untrusted attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own operating system, which runs as software on our physical computer. We can think of a VM as a &amp;lt;em&amp;gt;computer within a computer&amp;lt;/em&amp;gt;. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For our purposes of anonymisation, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org). Using Virtualbox, you can create a virtual machine, and then run an operating system on it called Whonix.&lt;br /&gt;
&lt;br /&gt;
==== Whonix' ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix '''(https://www.whonix.org) is an operating system that aims at protecting our anonymity, privacy and security by helping you to use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. Whonix is a complete operating system designed to be used in a virtual machine. It is also free software, based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. Whonix’s website offers a wide documentation: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== Tails ====&lt;br /&gt;
&lt;br /&gt;
'''Tails''', or '''The Amnesic Incognito Live System''', a free and open-source Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections. When we launch Tails, we have a complete operating system that comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, we can access the internet, communicate, and do all we need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless we ask it to do so.&lt;br /&gt;
&lt;br /&gt;
==== Qubes OS ====&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' – https://www.qubes-os.org – is a free and open-source security-oriented operating system based on '''Fedora''', a Linux distribution, and '''Xen''', a virtual machine that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things we do on our computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, we can do everything on a single physical computer without having to worry that one successful cyberattack harms our whole system, potentially revealing all the connections among our several identities.&lt;br /&gt;
&lt;br /&gt;
==== What to choose ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described – Tails, Whonix and Qubes OS – allow us to use a completely separate operating system for managing our alternate identities, and can be quite useful to make sure that we don’t reveal our true identity while we use the anonymous one(s).&lt;br /&gt;
&lt;br /&gt;
Using '''Tails''' is pretty easy, and if what we need to do with our alternate persona needs a focus on ''anonymization'', then it may be worthwhile to overcome the initial obstacle. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. But if on the other hand we need ''persistence'' and we want to keep some files or actions we have created we need to enable this option when we start the system. Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what we need is both ''anonymity'' and ''security by isolation'' and we have a good machine – https://www.whonix.org/wiki/System_Requirements – where we can run Virtualbox and installing '''Whonix''', according to the number of our alternative identities it seems a good solution that caters to all our needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if we want to keep all our activities inside our own computer without having to install anything else and if what we are trying to do is to effectively ''separate'' our identities rather than anonymize our activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if we feel that we really need to protect ourselves against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protects us from every threat, and we shouldn’t look at them as a magic potion that will make us invulnerable. Nevertheless, by using any of them, according to our needs and resources, we will raise the level of effort that an attacker will need to harm us, thus making an attack less likely. For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&amp;lt;nowiki/&amp;gt;&amp;lt;nowiki/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Step_0&amp;diff=1286</id>
		<title>Step 0</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Step_0&amp;diff=1286"/>
				<updated>2015-05-27T18:27:34Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
'''recommendations for the printed version: http://etherpad.calafou/p/securitydisclaimer'''&lt;br /&gt;
&lt;br /&gt;
== Before you start: mapping your data and devices; securing your data; anonymising your connections ==&lt;br /&gt;
&lt;br /&gt;
This section provides you with notions, methodologies and tools to take care of your data and devices and have those taking care of you. Data and devices management requires to reflect on their hosting and leaving qualities and in how we can configure those to not mess around with our well-being. This section It also explains how to engage into more secure communication practices when you get connected. All the following tips and tricks are pre-requisites to better understand how to manage identity on-line and creating safe spaces.&lt;br /&gt;
'''EDIT'''&lt;br /&gt;
&lt;br /&gt;
This section will cover the starting points: what data do you produce and store? Where? How do you make sure your data is secure? And when you're connecting to the internet, how do you anonymise your connections? &lt;br /&gt;
&lt;br /&gt;
It's also important to think about you relationship with your technology - how can we base this relationship in self care?&lt;br /&gt;
&lt;br /&gt;
=== Mapping your data ===&lt;br /&gt;
&lt;br /&gt;
Before becoming a zen user and developer of technologies, and adopting better privacy and digital security practices, it's important to first know what you want to protect. One way of doing this is to map (using a table, map, drawing, etc) your production and management of data. &lt;br /&gt;
&lt;br /&gt;
*What kind of data do you produce and or manage? With whom?&lt;br /&gt;
&lt;br /&gt;
To begin mapping your data, first make a list of the data you create yourself. This can include personal and work-related documents, emails, images, videos, designs, tweets, blog posts, and so on. Then make a list  of the data you manage or store, which is produced by others. This can encompass information given to you by your colleagues, friends, relatives to files you download from websites, repositories, p2p networks, etc. Finally, identify which type of data you share with others, for instance if you share a social media profile or email account with a family member, partner, or colleagues. &lt;br /&gt;
&lt;br /&gt;
'''Where is this data stored?''' &lt;br /&gt;
&lt;br /&gt;
*Which devices hold your data? &lt;br /&gt;
-This can include your computer, external drives, and phone. &lt;br /&gt;
&lt;br /&gt;
*Which online platforms host your data? &lt;br /&gt;
- This can include emails, social media accounts, etc. Also bear in mind that some applications enable syncing of data between your different devices, or between your devices and online platforms, and it's important to know where and when this is happening.  &lt;br /&gt;
&lt;br /&gt;
*How do you organise your data?&lt;br /&gt;
- Do you keep your personal/professional/activist data separate?&lt;br /&gt;
&lt;br /&gt;
*How sensitive is your data? &lt;br /&gt;
- For each type of data you have listed in your data map, what would happen if this particular data suddenly disappeared? For instance, if your email account is closed down, if your computer or external hard drive is stolen or breaks down, if you accidentally erase a folder, etc?. &lt;br /&gt;
- What would happen if this data were seen and copied by a third party? &lt;br /&gt;
&lt;br /&gt;
Do the same mapping exercise for the data you hold on others. &lt;br /&gt;
&lt;br /&gt;
Once you've answered thesE questions, you'll be better able to make decisions about which data you want to regularly back up, and where these backups will be stored. You will also be better able to decide what to do with your data when traveling - What type of data do you need with you? What is too sensitive? What can you easily access online?&lt;br /&gt;
&lt;br /&gt;
How do you build trust in relation to your data and how you store it? &lt;br /&gt;
???&lt;br /&gt;
&lt;br /&gt;
When doing so, ask yourself who has access to this device or media platform (your family, colleagues, friends, or servers administrators and you do not know&lt;br /&gt;
????&lt;br /&gt;
&lt;br /&gt;
* Syncing (online/offline – apps permissions)&lt;br /&gt;
????&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Securing your connections and communication ===&lt;br /&gt;
&lt;br /&gt;
Once we've mapped our data, the next step is making sure it's secure. Especially where your data is stored online, good passwords are crucial. &lt;br /&gt;
&lt;br /&gt;
''' Creating and using strong passwords''' &lt;br /&gt;
&lt;br /&gt;
Managing passwords is also a crucial part of maintaining our information online. Using the same password over and over again is risky, as are passwords that connect us to our identit(ies). Since a password is only as secure as the least secure service where it has been used, it is good practice to maintain separate passwords for each of our accounts. For more information on the importance of strong passwords and how to store them, read Security in a Box's [https://securityinabox.org/en/guide/passwords%20 chapter on passwords]. &lt;br /&gt;
*Using a password manager&lt;br /&gt;
To keep multiple secure passwords, you can use a password manager. *KeePassX* is a cross-platform free and open-source password manager that is easy to use and creates files with passwords that can also be exported and used in other devices. It can generate random passwords and store them securely.  To learn how to use KeePassX, read this [https://securityinabox.org/en/guide/keepass/windows%20 how-to].&lt;br /&gt;
To learn how to use KeePassDroid, the correspondent tool for Android, read this [https://securityinabox.org/en/guide/keepassdroid/android how-to].&lt;br /&gt;
&lt;br /&gt;
*Creating strong passphrases using the diceware technique *&lt;br /&gt;
Some passwords — like the one we use to decrypt our KeePassX file or lock our devices —need to be easy to remember and strong at the same time. A good solution is to create passphrases that are formed by a random group of words that don’t make any sense together, separated by spaces. One way to do this is to use the Diceware techique (this requires six-sided dice and the [http://world.std.com/~reinhold/dicewarewordlist.pdf Diceware word list] [PDF].&lt;br /&gt;
&lt;br /&gt;
By rolling the dice five times, we will come up with a five-digit number that corresponds to a word on the Diceware word list; this word is the first word of our passphrase. If we repeat this at least six times, we can create a strong passphrase formed by six words that together make a strong, random passphrase. It can be memorized just as we did when we had to learn poems by heart at school and will be so long that it would take an average of 3500 years to crack it with brute force at a speed of one trillion guesses per second. &lt;br /&gt;
To learn more about the Diceware technique, read [https://firstlook.org/theintercept/2015/03/26/passphrases-can-memorize-attackers-cant-guess this article] published by Micah Lee in The Intercept.&lt;br /&gt;
To learn more about two-factor authentication and security questions, read EFF's [https://ssd.eff.org/en/module/creating-strong-passwords &amp;quot;Creating Strong Passwords&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
==== Using a secure connection ====&lt;br /&gt;
&lt;br /&gt;
Another very important measure we should take when going online, especially if we are transmitting personal data and passwords, is to always use a '''secure SSL connection''', which ensures that our data cannot be seen by anyone as they travel from our computer to the website we are visiting or to the service we are using. To do so, when we access a website we should type HTTPS instead of HTTP befor the url of the website we want to visitin. If we receive an error or the HTTPS is replaced by HTTP again, this means that the website is not offering a secure connection. To make sure that we always connect securely to websites when this option is offered, we can install [https://www.eff.org/https-everywhere '''HTTPS Everywhere'''], a Firefox, Chrome, and Opera extension developed by the Electronic Frontier Foundation that encrypts our communications with many major websites.&lt;br /&gt;
&lt;br /&gt;
Likewise, when we create an account with an online service (e.g. our mailbox or a chat network) that we will access through a specific client or app, we should check the features of the service to make sure that it offers a secure connection and configure our clients accordingly by activating the '''TLS/SSL''' option.&lt;br /&gt;
&lt;br /&gt;
==== Using a secure mail server ====&lt;br /&gt;
&lt;br /&gt;
Also the choice of the mail server we use for our contact mail address is important. While there are several secure servers that offer a good service – e.g. the Swiss commercial service [https://kolabnow.com Kolab Now] and the autonomous servers [http://riseup.net Riseup] (a site used by activists with a clear set of political principles) and [https://www.autistici.org Autistici/Inventati] – the main point is to find a service that offers a secure connection (HTTPS instead of HTTP) and that is compatible with our needs.&lt;br /&gt;
&lt;br /&gt;
=== Anonymising your connections ===&lt;br /&gt;
&lt;br /&gt;
When browsing the internet through a normal internet connection, there are several ways in which we give away data about ourselves - our IP address (the number that identifies our connection), for example, or which websites we are visiting. There are also several ways to intercept our communications, especially if we are connecting via a free Wi-Fi spot.&lt;br /&gt;
&lt;br /&gt;
'''Virtual Private Networks (VPN: accessing the web through an encrypted tunnel'''&lt;br /&gt;
To add a layer of protection, we can access the internet through a virtual private network (VPN) - an encrypted tunnel that hides all services, protocols, and contents. Using a VPN is not difficult: it basically requires downloading a compressed file, extracting it and changing our computer’s connection settings, but it is important to choose a secure one – better if located abroad – because a compromised VPN server could be accessed by an intermediary who could then analyse all our activities. Autonomous servers [https://help.riseup.net/en/vpn Riseup] and [https://vpn.autistici.org Autistici/Inventati] both offer a reliable VPN. &lt;br /&gt;
&lt;br /&gt;
But we should consider that from a technical standpoint VPNs have some limitations: &lt;br /&gt;
'''An insecure connection is still insecure''': Although a VPN will anonymise our location and protect us from surveillance from our ISP, once our data is securely routed through the VPN server, it will go out on the internet as it normally would. This means we should still use TLS/SSL when available (ie. (HTTPS to browse websites, pop-ssl/imaps/smtp-tls for mail exchange, and so on).&lt;br /&gt;
&lt;br /&gt;
'''VPNs are not a panacea''': although they accomplish a lot, they can’t fix everything. For example, they cannot increase our security if our computer is already compromised with viruses or spyware. If we give personal information to a website, there is little that a VPN can do to maintain our anonymity with that website or its partners. For more information, see Riseup’s [https://help.riseup.net/en/vpn/security-issues webpage on VPN anonymity]. &lt;br /&gt;
&lt;br /&gt;
'''The connection might get slower''': the VPN routes all our traffic through an encrypted connection to the server before it goes out onto the normal internet. This extra step can slow things down.  For more information on VPNs, visit [https://securityinabox.org/en/guide/anonymity-and-circumvention this page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Hiding your IP address using the Tor network'''&lt;br /&gt;
A key step to being anonymous online is to  hide your IP address.&lt;br /&gt;
On way to do this is to use a tool called Tor, an anonymity network that conceals both the location of our connection and what we do on the internet. By consistently using Tor, no one can link our IP (and therefore our alternative identity) to us, not even the mail server we use. For further information on how to use Tor, see the project's [https://www.torproject.org/ website].&lt;br /&gt;
&lt;br /&gt;
The [https://www.torproject.org/projects/torbrowser.html.en Tor Browser] is a software tool designed to increase the privacy and security of our Internet activities and habits. It masks our identity and our online browsing from many forms of internet surveillance. &lt;br /&gt;
&lt;br /&gt;
From the Tor Project: &lt;br /&gt;
&amp;quot;The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
The Tor Browser Bundle consists of the Tor software and a modified version of the Firefox web browser, which is designed to provide extra protection while using it. To stop scripts from running without us knowing and to force secure SSL connections whenever available, the browser bundle also includes NoScript and HTTPS-Everywhere add-ons. &lt;br /&gt;
&lt;br /&gt;
Tor protects our anonymity by routing communications through a distributed network of servers run by volunteers all over the world. Using Tor hides the sites we visit from potential onlookers, and hides our location/identity from those sites. The software is designed also to make sure servers in the Tor network don't know both our location and the sites we are visiting. &lt;br /&gt;
&lt;br /&gt;
Tor also takes steps to encrypt the communication to and through its network, but this measure cannot extend all the way to a website which is sending or receiving content over non-encrypted channels (i.e. not providing HTTPS access). Nevertheless, the advantage of using Tor when accessing such sites is that Tor can secure our communication up to the step between the last of the Tor servers and the non-secure site. This confines the chance to intercept the content to that last step. &lt;br /&gt;
&lt;br /&gt;
As with VPNs, there is a trade-off between anonymity and speed. Because Tor facilitates anonymous browsing by bouncing our traffic through volunteers’ computers and servers in various parts of the world, it will definitely be slower than using other web browsers on our computer. &lt;br /&gt;
&lt;br /&gt;
What we should remember when using the Tor Browser is that it makes us anonymous, but not private. Although our web requests are anonymous, if we are posting on Facebook or sending an email through Gmail, that activity is still identifiable as “us”. &lt;br /&gt;
&lt;br /&gt;
*NOT SURE WHAT TO DO ABOUT THIS SECTION - DOESN'T FIT HERE*&lt;br /&gt;
If we want to browse the web anonymously with more than one identity, we can do so by creating each time a new identity for our browser, so that a new set of random Tor proxy servers is selected and we appear to come from a new location to the web servers. To do this, we just need to click the onion icon in the upper left of our browser and to select “New identity” from the menu. The Tor Browser will briefly close, clearing our browsing history and cookies and then restart. After that, we can safely browse the internet with a different identity. &lt;br /&gt;
&lt;br /&gt;
For more information on Tor and instructions for Windows users, see Security in a box's [https://securityinabox.org/en/guide/anonymity-and-circumvention howto]. &lt;br /&gt;
For instructions for Mac OSX users, visit this [https://ssd.eff.org/en/module/how-use-tor-mac-os-x howto] by the EFF. &lt;br /&gt;
&lt;br /&gt;
=== Devices and Well being ===&lt;br /&gt;
A LOT OF THIS CAN BE CONDENSED AND DELETED.&lt;br /&gt;
REFERENCE THE LEVEL-UP RESOURCES!&lt;br /&gt;
&lt;br /&gt;
While working on computer, smart phones and other devices, we tend to forget our body. Our body freezes. Fingers, eyes and ears follow the rhythm of our clicks, scrolls and swipes. In almost motionless, staring at the screen, the user forgets the possibilities of movement, pause or improving posture and even is imposing on the body pains and discomforts. While some senses get paralyzed, our brain becomes intertwined with the machine: processing a lot of data and information, multi-tasking and executing creative, administrative challenges while managing our engagements and multiple identities... our neurological activity increases. There is a risk in becoming inseparable of our hardware technologies. Actually we can do almost everything with a machine: communicate, getting ourselves organized, informed, be entertained, play, have sex, ... To have a healthy relationship with our machines is hence a key for our well being. &lt;br /&gt;
“Around 2000, I made a video installation “Does Technology ever end or does it restart automatically?” it was the moment when there was fear that the machines' clock would crash on the number 2000 &amp;lt;Y2K problem, the Millennium bug&amp;gt;: display of dates and the automated ordering of dated records or real-time events would get twisted. The media media hysteria around the potential failure of our electronic and digital devices which were surrounding us, made me reset (reboot in another distro). In the ecstasy of integrating tech in my daily life, exploring avatars and audiovisual creation, design to communicate political struggles, my hand was hurting, and I couldn't click the mouse anymore. I had to change my daily routine, care about my body and cure myself. I couldn't hold my keys nor masturbate :), .. what was I going to do with my right hand.” &lt;br /&gt;
SHOW THE PAIN open mouth and lips as wide as possible simultaneously raising your eyebrows as high as possible, hold while counting to 5 repeat a few times &lt;br /&gt;
(A/ A,separation/séparation) (1) strategies of prevention SCHEDULE: Work out a regular pattern for your day, and stick to it. Your brain will relax a bit if it knows “what comes next”. Plan non-digital activities. &lt;br /&gt;
PROCESS: If you get an idea or think of something you need to do, write it down. Your brain is actually a bad early implementation of Calendar reminders, Email Notifications and Associative Tagging. Brain reminders aren’t timed, so they will pop up at the most inconvenient moments. By writing it down you literally tell your brain that it’s ok to let go of the thought. &lt;br /&gt;
WORKFLOW: Interrupt Driven Work is a hassle. You do some work from your todo, but mainly you keep getting interrupted by new email, IRC and instant messages and phonecalls. Ideally, turn off the immediate notification and just check your email/social media/IRC / … once or twice a day. &lt;br /&gt;
PROCESS: If you get an idea or think of something you need to do, write it down. Your brain is actually a bad early implementation of Calendar reminders, Email Notifications and Associative Tagging. Brain reminders aren’t timed, so they will pop up at the most inconvenient moments. By writing it down you literally tell your brain that it’s ok to let go of the thought. &lt;br /&gt;
CHARGING: Charge your devices in a place which is not easy reachable. Do some stretching while reaching them.Go a Bit Off the Grid and use alternative energies to charge your devices so we reinforce the relation between technology and nature. &lt;br /&gt;
DAYLIGHT: You need about to get some decent daylight (20-40 minutes daily) to reset your body clock. Sitting in front of the window and sunlight can be limiting your screen view. Going outside can increase your healthy look... you will look better on the screen after! The quality of light also influences your sleeping/dreaming. &lt;br /&gt;
SLEEPING: Let's not take our daemons and shells scripts into our state of dreaming. Not having your devices next to your bed works wonders for your sleep well and good morning rituals. &lt;br /&gt;
FOOD &amp;amp; DRINK: Water can safe plants! And if you drank to much, don't forget to go to the toilet once in a while. &lt;br /&gt;
(2) Exercises to disconnect &lt;br /&gt;
Create performative events for a human understanding of technology. Probably besides of becoming an icon or a symbol of a visual interface, I guess you have to be minimum 2 people: 0 en 1 to make the process into a social momentum. # Let's go analogue – physical.  ??&lt;br /&gt;
_ make props for all the hardware components in the computer &lt;br /&gt;
  (from cardboard, scrap, .. take your time to make them) &lt;br /&gt;
_ distribute props over the #actors, _ create a script to enact the process (scenario) &lt;br /&gt;
exemple scripts: Screensavers, sleep mode, hibernate, standby or off. In this performative event the switching on and shutting down of a computer is (re)enacted through a collective body. What is happening with our hardware and software when we go to sleep or other modi of existence. Link: &lt;br /&gt;
Home Is a Server In this performative event we install a webserver and understand about Wiki's and it's recepies on a virtual machine SSH? Doors to open, commands to learn to activate our space into a home while baking pancakes. Link: &lt;br /&gt;
Crypto Dance ! In this performative event security is at stake in a dance which introduces basic crypto like in bob and eve do a lambada. (need still to be developed by Hacking with care) &lt;br /&gt;
Strategies of care &lt;br /&gt;
Chair Strike installation at the Academy of fine Arts Vienna, PC-Lab, in the framework of Strike, she said, by GirlsOnHorses (Auer, Egermann, Straganz, Wieger). &lt;br /&gt;
By paying more attention to the body and ICT work experiences, 'WORKINGSTILLWORKING” developed a variety of micro-movements and creative habits, tactics, gestures and practices, consciously or unconsciously to break free from motionless postures, painful or stultifying. Together with HACKING WITH CARE, they published a zine: http://workingstill-stillworking.net/wp-content/uploads/2013/06/AttentionSomaticTheZine1.3.pdf, Attent!on som(t)a(c)tics: With the micro movements of our bodies when using our devices, we improvise and explore forms of embodied emancipation within a digital context. &lt;br /&gt;
describe your (intimate, pleasant, difficult or binding…) relationships with computers and propose ways of subjugating those routines. &lt;br /&gt;
http://hackingwithcare.in/wiki/doku.php/projects : Online Resources for psychological and physical well-being, health, self-care, caregiving, in general and in the specific contexts of activism and hacking. Material to explore and raise awareness on related political issues, among caregivers, hackers-who-care, and friends of a good fair world, with the purpose of inspiring alliances. Caring for one self can be a collective emancipatory process to produce a collective platform of liberating instructions, gestures, movement or poetry. &lt;br /&gt;
SOMATIC EXPLORATIONS AND LIBERATING EXCERSISES RE-EMBODYING RELATIONS TO OUR DAILY TECHNOLGIES: TRICKS OF SELF AWARENESS(3)(4)(5) ???strategies of curing ??? &lt;br /&gt;
We know adjustable chairs, but what about adjustable software to different cognitive capabilities. &lt;br /&gt;
disable auto-login check cognitive capacity Using short cuts Organize a Hands massage workshop Switch between commandline and graphical Interface … lalala, do do, reeeeeeee: Technology accelerates to find solutions of interfacing to the human body Technology can be used to persuade people into a behaviour change. We can change our behaviour in relation with technology. &lt;br /&gt;
State of inertia &amp;amp; Red Light Reflex Long hours hunched over your hardware can cause the muscles of the front of the body to contract while the body pulls inward. The Red Light reflex is a protective reflex found in all vertebrate animals and is a response to fear, anxiety, prolonged distress or negativity. Rounded shoulders, depressed chest and the head jutting forward can lead to chronic neck pain, jaw pain, hip pain, mid-back pain and shallow breathing. The inability to breathe deeply deprives your brain, blood and muscles of the oxygen they need to function properly. This in turn can cause fatigue, depression, anxiety, sleep problems and exacerbate allergies. &lt;br /&gt;
Repetitive Strain Injury (RSI) http://www.workrave.org/ Workrave is a program that assists in the recovery and prevention of Repetitive Strain Injury (RSI). The program frequently alerts you to take micro-pauses, rest breaks and restricts you to your daily limit. &lt;br /&gt;
(1) Annie Abrahams,separation/séparation http://collection.eliterature.org/2/works/abrahams_separation/separation/index.htm# (2) http://bluehackers.org/howto (3) http://workingstill-stillworking.net (4) Anne Goldenberg, Hacking with Care : Attention, bien-être et politique de l’ordinaire dans le milieu hacktiviste: http://dpi.studioxx.org/en/hacking-care-attention-bien-%C3%AAtre-et-politique-de-l%E2%80%99ordinaire-dans-le-milieu-hacktiviste (5) L'ERSE POSTURE https://www.youtube.com/watch?v=Va0ZLaZHQlU (6) http://networkcultures.org/blog/2007/04/23/linux-for-theatre-makers-embodiment-and-nix-modus-operandi/&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Step_0&amp;diff=1274</id>
		<title>Step 0</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Step_0&amp;diff=1274"/>
				<updated>2015-05-27T17:37:06Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: moved and cut part on secure mail&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
'''recommendations for the printed version: http://etherpad.calafou/p/securitydisclaimer'''&lt;br /&gt;
&lt;br /&gt;
== Before you start: mapping your data and devices; securing your data; anonymising your connections ==&lt;br /&gt;
&lt;br /&gt;
This section provides you with notions, methodologies and tools to take care of your data and devices and have those taking care of you. Data and devices management requires to reflect on their hosting and leaving qualities and in how we can configure those to not mess around with our well-being. This section It also explains how to engage into more secure communication practices when you get connected. All the following tips and tricks are pre-requisites to better understand how to manage identity on-line and creating safe spaces.&lt;br /&gt;
'''EDIT'''&lt;br /&gt;
&lt;br /&gt;
This section will cover the starting points: what data do you produce and store? Where? How do you make sure your data is secure? And when you're connecting to the internet, how do you anonymise your connections? &lt;br /&gt;
&lt;br /&gt;
It's also important to think about you relationship with your technology - how can we base this relationship in self care?&lt;br /&gt;
&lt;br /&gt;
=== Mapping your data ===&lt;br /&gt;
&lt;br /&gt;
Before becoming a zen user and developer of technologies, and adopting better privacy and digital security practices, it's important to first know what you want to protect. One way of doing this is to map (using a table, map, drawing, etc) your production and management of data. &lt;br /&gt;
&lt;br /&gt;
*What kind of data do you produce and or manage? With whom?&lt;br /&gt;
&lt;br /&gt;
To begin mapping your data, first make a list of the data you create yourself. This can include personal and work-related documents, emails, images, videos, designs, tweets, blog posts, and so on. Then make a list  of the data you manage or store, which is produced by others. This can encompass information given to you by your colleagues, friends, relatives to files you download from websites, repositories, p2p networks, etc. Finally, identify which type of data you share with others, for instance if you share a social media profile or email account with a family member, partner, or colleagues. &lt;br /&gt;
&lt;br /&gt;
'''Where is this data stored?''' &lt;br /&gt;
&lt;br /&gt;
*Which devices hold your data? &lt;br /&gt;
-This can include your computer, external drives, and phone. &lt;br /&gt;
&lt;br /&gt;
*Which online platforms host your data? &lt;br /&gt;
- This can include emails, social media accounts, etc. Also bear in mind that some applications enable syncing of data between your different devices, or between your devices and online platforms, and it's important to know where and when this is happening.  &lt;br /&gt;
&lt;br /&gt;
*How do you organise your data?&lt;br /&gt;
- Do you keep your personal/professional/activist data separate?&lt;br /&gt;
&lt;br /&gt;
*How sensitive is your data? &lt;br /&gt;
- For each type of data you have listed in your data map, what would happen if this particular data suddenly disappeared? For instance, if your email account is closed down, if your computer or external hard drive is stolen or breaks down, if you accidentally erase a folder, etc?. &lt;br /&gt;
- What would happen if this data were seen and copied by a third party? &lt;br /&gt;
&lt;br /&gt;
Do the same mapping exercise for the data you hold on others. &lt;br /&gt;
&lt;br /&gt;
Once you've answered thesE questions, you'll be better able to make decisions about which data you want to regularly back up, and where these backups will be stored. You will also be better able to decide what to do with your data when traveling - What type of data do you need with you? What is too sensitive? What can you easily access online?&lt;br /&gt;
&lt;br /&gt;
How do you build trust in relation to your data and how you store it? &lt;br /&gt;
???&lt;br /&gt;
&lt;br /&gt;
When doing so, ask yourself who has access to this device or media platform (your family, colleagues, friends, or servers administrators and you do not know&lt;br /&gt;
????&lt;br /&gt;
&lt;br /&gt;
* Syncing (online/offline – apps permissions)&lt;br /&gt;
????&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Securing your connections and communication ===&lt;br /&gt;
&lt;br /&gt;
Once we've mapped our data, the next step is making sure it's secure. Especially where your data is stored online, good passwords are crucial. &lt;br /&gt;
&lt;br /&gt;
''' Creating and using strong passwords''' &lt;br /&gt;
&lt;br /&gt;
Managing passwords is also a crucial part of maintaining our information online. Using the same password over and over again is risky, as are passwords that connect us to our identit(ies). Since a password is only as secure as the least secure service where it has been used, it is good practice to maintain separate passwords for each of our accounts. For more information on the importance of strong passwords and how to store them, read Security in a Box's [https://securityinabox.org/en/guide/passwords%20 chapter on passwords]. &lt;br /&gt;
*Using a password manager&lt;br /&gt;
To keep multiple secure passwords, you can use a password manager. *KeePassX* is a cross-platform free and open-source password manager that is easy to use and creates files with passwords that can also be exported and used in other devices. It can generate random passwords and store them securely.  To learn how to use KeePassX, read this [https://securityinabox.org/en/guide/keepass/windows%20 how-to].&lt;br /&gt;
To learn how to use KeePassDroid, the correspondent tool for Android, read this [https://securityinabox.org/en/guide/keepassdroid/android how-to].&lt;br /&gt;
&lt;br /&gt;
*Creating strong passphrases using the diceware technique *&lt;br /&gt;
Some passwords — like the one we use to decrypt our KeePassX file or lock our devices —need to be easy to remember and strong at the same time. A good solution is to create passphrases that are formed by a random group of words that don’t make any sense together, separated by spaces. One way to do this is to use the Diceware techique (this requires six-sided dice and the [http://world.std.com/~reinhold/dicewarewordlist.pdf Diceware word list] [PDF].&lt;br /&gt;
&lt;br /&gt;
By rolling the dice five times, we will come up with a five-digit number that corresponds to a word on the Diceware word list; this word is the first word of our passphrase. If we repeat this at least six times, we can create a strong passphrase formed by six words that together make a strong, random passphrase. It can be memorized just as we did when we had to learn poems by heart at school and will be so long that it would take an average of 3500 years to crack it with brute force at a speed of one trillion guesses per second. &lt;br /&gt;
To learn more about the Diceware technique, read [https://firstlook.org/theintercept/2015/03/26/passphrases-can-memorize-attackers-cant-guess this article] published by Micah Lee in The Intercept.&lt;br /&gt;
To learn more about two-factor authentication and security questions, read EFF's [https://ssd.eff.org/en/module/creating-strong-passwords &amp;quot;Creating Strong Passwords&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
==== Using a secure connection ====&lt;br /&gt;
&lt;br /&gt;
Another very important measure we should take when going online, especially if we are transmitting personal data and passwords, is to always use a '''secure SSL connection''', which ensures that our data cannot be seen by anyone as they travel from our computer to the website we are visiting or to the service we are using. To do so, when we access a website we should type HTTPS instead of HTTP befor the url of the website we want to visitin. If we receive an error or the HTTPS is replaced by HTTP again, this means that the website is not offering a secure connection. To make sure that we always connect securely to websites when this option is offered, we can install [https://www.eff.org/https-everywhere '''HTTPS Everywhere'''], a Firefox, Chrome, and Opera extension developed by the Electronic Frontier Foundation that encrypts our communications with many major websites.&lt;br /&gt;
&lt;br /&gt;
Likewise, when we create an account with an online service (e.g. our mailbox or a chat network) that we will access through a specific client or app, we should check the features of the service to make sure that it offers a secure connection and configure our clients accordingly by activating the '''TLS/SSL''' option.&lt;br /&gt;
&lt;br /&gt;
==== Using a secure mail server ====&lt;br /&gt;
&lt;br /&gt;
Also the choice of the mail server we use for our contact mail address is important. While there are several secure servers that offer a good service – e.g. the Swiss commercial service [https://kolabnow.com Kolab Now] and the autonomous servers [http://riseup.net Riseup] (a site used by activists with a clear set of political principles) and [https://www.autistici.org Autistici/Inventati] – the main point is to find a service that offers a secure connection (HTTPS instead of HTTP) and that is compatible with our needs.&lt;br /&gt;
&lt;br /&gt;
=== Anonymising your connections ===&lt;br /&gt;
&lt;br /&gt;
When browsing the internet through a normal internet connection, there are several ways in which we give away data about ourselves - our IP address (the number that identifies our connection), for example, or which websites we are visiting. There are also several ways to intercept our communications, especially if we are connecting via a free Wi-Fi spot.&lt;br /&gt;
&lt;br /&gt;
'''Virtual Private Networks (VPN: accessing the web through an encrypted tunnel'''&lt;br /&gt;
To add a layer of protection, we can access the internet through a virtual private network (VPN) - an encrypted tunnel that hides all services, protocols, and contents. Using a VPN is not difficult: it basically requires downloading a compressed file, extracting it and changing our computer’s connection settings, but it is important to choose a secure one – better if located abroad – because a compromised VPN server could be accessed by an intermediary who could then analyse all our activities. Autonomous servers [https://help.riseup.net/en/vpn Riseup] and [https://vpn.autistici.org Autistici/Inventati] both offer a reliable VPN. &lt;br /&gt;
&lt;br /&gt;
But we should consider that from a technical standpoint VPNs have some limitations: &lt;br /&gt;
'''An insecure connection is still insecure''': Although a VPN will anonymise our location and protect us from surveillance from our ISP, once our data is securely routed through the VPN server, it will go out on the internet as it normally would. This means we should still use TLS/SSL when available (ie. (HTTPS to browse websites, pop-ssl/imaps/smtp-tls for mail exchange, and so on).&lt;br /&gt;
&lt;br /&gt;
'''VPNs are not a panacea''': although they accomplish a lot, they can’t fix everything. For example, they cannot increase our security if our computer is already compromised with viruses or spyware. If we give personal information to a website, there is little that a VPN can do to maintain our anonymity with that website or its partners. For more information, see Riseup’s [https://help.riseup.net/en/vpn/security-issues webpage on VPN anonymity]. &lt;br /&gt;
&lt;br /&gt;
'''The connection might get slower''': the VPN routes all our traffic through an encrypted connection to the server before it goes out onto the normal internet. This extra step can slow things down.  For more information on VPNs, visit [https://securityinabox.org/en/guide/anonymity-and-circumvention this page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Hiding your IP address using the Tor network'''&lt;br /&gt;
A key step to being anonymous online is to  hide your IP address.&lt;br /&gt;
On way to do this is to use a tool called Tor, an anonymity network that conceals both the location of our connection and what we do on the internet. By consistently using Tor, no one can link our IP (and therefore our alternative identity) to us, not even the mail server we use. For further information on how to use Tor, see the project's [https://www.torproject.org/ website].&lt;br /&gt;
&lt;br /&gt;
The [https://www.torproject.org/projects/torbrowser.html.en Tor Browser] is a software tool designed to increase the privacy and security of our Internet activities and habits. It masks our identity and our online browsing from many forms of internet surveillance. &lt;br /&gt;
&lt;br /&gt;
From the Tor Project: &lt;br /&gt;
&amp;quot;The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
The Tor Browser Bundle consists of the Tor software and a modified version of the Firefox web browser, which is designed to provide extra protection while using it. To stop scripts from running without us knowing and to force secure SSL connections whenever available, the browser bundle also includes NoScript and HTTPS-Everywhere add-ons. &lt;br /&gt;
&lt;br /&gt;
Tor protects our anonymity by routing communications through a distributed network of servers run by volunteers all over the world. Using Tor hides the sites we visit from potential onlookers, and hides our location/identity from those sites. The software is designed also to make sure servers in the Tor network don't know both our location and the sites we are visiting. &lt;br /&gt;
&lt;br /&gt;
Tor also takes steps to encrypt the communication to and through its network, but this measure cannot extend all the way to a website which is sending or receiving content over non-encrypted channels (i.e. not providing HTTPS access). Nevertheless, the advantage of using Tor when accessing such sites is that Tor can secure our communication up to the step between the last of the Tor servers and the non-secure site. This confines the chance to intercept the content to that last step. &lt;br /&gt;
&lt;br /&gt;
As with VPNs, there is a trade-off between anonymity and speed. Because Tor facilitates anonymous browsing by bouncing our traffic through volunteers’ computers and servers in various parts of the world, it will definitely be slower than using other web browsers on our computer. &lt;br /&gt;
&lt;br /&gt;
What we should remember when using the Tor Browser is that it makes us anonymous, but not private. Although our web requests are anonymous, if we are posting on Facebook or sending an email through Gmail, that activity is still identifiable as “us”. &lt;br /&gt;
&lt;br /&gt;
*NOT SURE WHAT TO DO ABOUT THIS SECTION - DOESN'T FIT HERE*&lt;br /&gt;
If we want to browse the web anonymously with more than one identity, we can do so by creating each time a new identity for our browser, so that a new set of random Tor proxy servers is selected and we appear to come from a new location to the web servers. To do this, we just need to click the onion icon in the upper left of our browser and to select “New identity” from the menu. The Tor Browser will briefly close, clearing our browsing history and cookies and then restart. After that, we can safely browse the internet with a different identity. &lt;br /&gt;
&lt;br /&gt;
For more information on Tor and instructions for Windows users, see Security in a box's [https://securityinabox.org/en/guide/anonymity-and-circumvention howto]. &lt;br /&gt;
For instructions for Mac OSX users, visit this [https://ssd.eff.org/en/module/how-use-tor-mac-os-x howto] by the EFF. &lt;br /&gt;
&lt;br /&gt;
=== Devices and Well being ===&lt;br /&gt;
A LOT OF THIS CAN BE CONDENSED AND DELETED.&lt;br /&gt;
REFERENCE THE LEVEL-UP RESOURCES!&lt;br /&gt;
&lt;br /&gt;
While working on computer, smart phones and other devices, we tend to forget our body. Our body freezes. Fingers, eyes and ears follow the rhythm of our clicks, scrolls and swipes. In almost motionless, staring at the screen, the user forgets the possibilities of movement, pause or improving posture and even is imposing on the body pains and discomforts. While some senses get paralyzed, our brain becomes intertwined with the machine: processing a lot of data and information, multi-tasking and executing creative, administrative challenges while managing our engagements and multiple identities... our neurological activity increases. There is a risk in becoming inseparable of our hardware technologies. Actually we can do almost everything with a machine: communicate, getting ourselves organized, informed, be entertained, play, have sex, ... To have a healthy relationship with our machines is hence a key for our well being. &lt;br /&gt;
“Around 2000, I made a video installation “Does Technology ever end or does it restart automatically?” it was the moment when there was fear that the machines' clock would crash on the number 2000 &amp;lt;Y2K problem, the Millennium bug&amp;gt;: display of dates and the automated ordering of dated records or real-time events would get twisted. The media media hysteria around the potential failure of our electronic and digital devices which were surrounding us, made me reset (reboot in another distro). In the ecstasy of integrating tech in my daily life, exploring avatars and audiovisual creation, design to communicate political struggles, my hand was hurting, and I couldn't click the mouse anymore. I had to change my daily routine, care about my body and cure myself. I couldn't hold my keys nor masturbate :), .. what was I going to do with my right hand.” &lt;br /&gt;
SHOW THE PAIN open mouth and lips as wide as possible simultaneously raising your eyebrows as high as possible, hold while counting to 5 repeat a few times &lt;br /&gt;
(A/ A,separation/séparation) (1) strategies of prevention SCHEDULE: Work out a regular pattern for your day, and stick to it. Your brain will relax a bit if it knows “what comes next”. Plan non-digital activities. &lt;br /&gt;
PROCESS: If you get an idea or think of something you need to do, write it down. Your brain is actually a bad early implementation of Calendar reminders, Email Notifications and Associative Tagging. Brain reminders aren’t timed, so they will pop up at the most inconvenient moments. By writing it down you literally tell your brain that it’s ok to let go of the thought. &lt;br /&gt;
WORKFLOW: Interrupt Driven Work is a hassle. You do some work from your todo, but mainly you keep getting interrupted by new email, IRC and instant messages and phonecalls. Ideally, turn off the immediate notification and just check your email/social media/IRC / … once or twice a day. &lt;br /&gt;
PROCESS: If you get an idea or think of something you need to do, write it down. Your brain is actually a bad early implementation of Calendar reminders, Email Notifications and Associative Tagging. Brain reminders aren’t timed, so they will pop up at the most inconvenient moments. By writing it down you literally tell your brain that it’s ok to let go of the thought. &lt;br /&gt;
CHARGING: Charge your devices in a place which is not easy reachable. Do some stretching while reaching them.Go a Bit Off the Grid and use alternative energies to charge your devices so we reinforce the relation between technology and nature. &lt;br /&gt;
DAYLIGHT: You need about to get some decent daylight (20-40 minutes daily) to reset your body clock. Sitting in front of the window and sunlight can be limiting your screen view. Going outside can increase your healthy look... you will look better on the screen after! The quality of light also influences your sleeping/dreaming. &lt;br /&gt;
SLEEPING: Let's not take our daemons and shells scripts into our state of dreaming. Not having your devices next to your bed works wonders for your sleep well and good morning rituals. &lt;br /&gt;
FOOD &amp;amp; DRINK: Water can safe plants! And if you drank to much, don't forget to go to the toilet once in a while. &lt;br /&gt;
(2) Exercises to disconnect &lt;br /&gt;
Create performative events for a human understanding of technology. Probably besides of becoming an icon or a symbol of a visual interface, I guess you have to be minimum 2 people: 0 en 1 to make the process into a social momentum. # Let's go analogue – physical.  ??&lt;br /&gt;
_ make props for all the hardware components in the computer &lt;br /&gt;
  (from cardboard, scrap, .. take your time to make them) &lt;br /&gt;
_ distribute props over the #actors, _ create a script to enact the process (scenario) &lt;br /&gt;
exemple scripts: Screensavers, sleep mode, hibernate, standby or off. In this performative event the switching on and shutting down of a computer is (re)enacted through a collective body. What is happening with our hardware and software when we go to sleep or other modi of existence. Link: &lt;br /&gt;
Home Is a Server In this performative event we install a webserver and understand about Wiki's and it's recepies on a virtual machine SSH? Doors to open, commands to learn to activate our space into a home while baking pancakes. Link: &lt;br /&gt;
Crypto Dance ! In this performative event security is at stake in a dance which introduces basic crypto like in bob and eve do a lambada. (need still to be developed by Hacking with care) &lt;br /&gt;
Strategies of care &lt;br /&gt;
Chair Strike installation at the Academy of fine Arts Vienna, PC-Lab, in the framework of Strike, she said, by GirlsOnHorses (Auer, Egermann, Straganz, Wieger). &lt;br /&gt;
By paying more attention to the body and ICT work experiences, 'WORKINGSTILLWORKING” developed a variety of micro-movements and creative habits, tactics, gestures and practices, consciously or unconsciously to break free from motionless postures, painful or stultifying. Together with HACKING WITH CARE, they published a zine: http://workingstill-stillworking.net/wp-content/uploads/2013/06/AttentionSomaticTheZine1.3.pdf, Attent!on som(t)a(c)tics: With the micro movements of our bodies when using our devices, we improvise and explore forms of embodied emancipation within a digital context. &lt;br /&gt;
describe your (intimate, pleasant, difficult or binding…) relationships with computers and propose ways of subjugating those routines. &lt;br /&gt;
http://hackingwithcare.in/wiki/doku.php/projects : Online Resources for psychological and physical well-being, health, self-care, caregiving, in general and in the specific contexts of activism and hacking. Material to explore and raise awareness on related political issues, among caregivers, hackers-who-care, and friends of a good fair world, with the purpose of inspiring alliances. Caring for one self can be a collective emancipatory process to produce a collective platform of liberating instructions, gestures, movement or poetry. &lt;br /&gt;
SOMATIC EXPLORATIONS AND LIBERATING EXCERSISES RE-EMBODYING RELATIONS TO OUR DAILY TECHNOLGIES: TRICKS OF SELF AWARENESS(3)(4)(5) ???strategies of curing ??? &lt;br /&gt;
We know adjustable chairs, but what about adjustable software to different cognitive capabilities. &lt;br /&gt;
disable auto-login check cognitive capacity Using short cuts Organize a Hands massage workshop Switch between commandline and graphical Interface … lalala, do do, reeeeeeee: Technology accelerates to find solutions of interfacing to the human body Technology can be used to persuade people into a behaviour change. We can change our behaviour in relation with technology. &lt;br /&gt;
State of inertia &amp;amp; Red Light Reflex Long hours hunched over your hardware can cause the muscles of the front of the body to contract while the body pulls inward. The Red Light reflex is a protective reflex found in all vertebrate animals and is a response to fear, anxiety, prolonged distress or negativity. Rounded shoulders, depressed chest and the head jutting forward can lead to chronic neck pain, jaw pain, hip pain, mid-back pain and shallow breathing. The inability to breathe deeply deprives your brain, blood and muscles of the oxygen they need to function properly. This in turn can cause fatigue, depression, anxiety, sleep problems and exacerbate allergies. &lt;br /&gt;
Repetitive Strain Injury (RSI) http://www.workrave.org/ Workrave is a program that assists in the recovery and prevention of Repetitive Strain Injury (RSI). The program frequently alerts you to take micro-pauses, rest breaks and restricts you to your daily limit. &lt;br /&gt;
(1) Annie Abrahams,separation/séparation http://collection.eliterature.org/2/works/abrahams_separation/separation/index.htm# (2) http://bluehackers.org/howto (3) http://workingstill-stillworking.net (4) Anne Goldenberg, Hacking with Care : Attention, bien-être et politique de l’ordinaire dans le milieu hacktiviste: http://dpi.studioxx.org/en/hacking-care-attention-bien-%C3%AAtre-et-politique-de-l%E2%80%99ordinaire-dans-le-milieu-hacktiviste (5) L'ERSE POSTURE https://www.youtube.com/watch?v=Va0ZLaZHQlU (6) http://networkcultures.org/blog/2007/04/23/linux-for-theatre-makers-embodiment-and-nix-modus-operandi/&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Step_0&amp;diff=1273</id>
		<title>Step 0</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Step_0&amp;diff=1273"/>
				<updated>2015-05-27T17:19:40Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: /* Anonymising your connections */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
'''recommendations for the printed version: http://etherpad.calafou/p/securitydisclaimer'''&lt;br /&gt;
&lt;br /&gt;
== Before you start: mapping your data and devices; securing your data; anonymising your connections ==&lt;br /&gt;
&lt;br /&gt;
This section provides you with notions, methodologies and tools to take care of your data and devices and have those taking care of you. Data and devices management requires to reflect on their hosting and leaving qualities and in how we can configure those to not mess around with our well-being. This section It also explains how to engage into more secure communication practices when you get connected. All the following tips and tricks are pre-requisites to better understand how to manage identity on-line and creating safe spaces.&lt;br /&gt;
'''EDIT'''&lt;br /&gt;
&lt;br /&gt;
This section will cover the starting points: what data do you produce and store? Where? How do you make sure your data is secure? And when you're connecting to the internet, how do you anonymise your connections? &lt;br /&gt;
&lt;br /&gt;
It's also important to think about you relationship with your technology - how can we base this relationship in self care?&lt;br /&gt;
&lt;br /&gt;
=== Mapping your data ===&lt;br /&gt;
&lt;br /&gt;
Before becoming a zen user and developer of technologies, and adopting better privacy and digital security practices, it's important to first know what you want to protect. One way of doing this is to map (using a table, map, drawing, etc) your production and management of data. &lt;br /&gt;
&lt;br /&gt;
*What kind of data do you produce and or manage? With whom?&lt;br /&gt;
&lt;br /&gt;
To begin mapping your data, first make a list of the data you create yourself. This can include personal and work-related documents, emails, images, videos, designs, tweets, blog posts, and so on. Then make a list  of the data you manage or store, which is produced by others. This can encompass information given to you by your colleagues, friends, relatives to files you download from websites, repositories, p2p networks, etc. Finally, identify which type of data you share with others, for instance if you share a social media profile or email account with a family member, partner, or colleagues. &lt;br /&gt;
&lt;br /&gt;
'''Where is this data stored?''' &lt;br /&gt;
&lt;br /&gt;
*Which devices hold your data? &lt;br /&gt;
-This can include your computer, external drives, and phone. &lt;br /&gt;
&lt;br /&gt;
*Which online platforms host your data? &lt;br /&gt;
- This can include emails, social media accounts, etc. Also bear in mind that some applications enable syncing of data between your different devices, or between your devices and online platforms, and it's important to know where and when this is happening.  &lt;br /&gt;
&lt;br /&gt;
*How do you organise your data?&lt;br /&gt;
- Do you keep your personal/professional/activist data separate?&lt;br /&gt;
&lt;br /&gt;
*How sensitive is your data? &lt;br /&gt;
- For each type of data you have listed in your data map, what would happen if this particular data suddenly disappeared? For instance, if your email account is closed down, if your computer or external hard drive is stolen or breaks down, if you accidentally erase a folder, etc?. &lt;br /&gt;
- What would happen if this data were seen and copied by a third party? &lt;br /&gt;
&lt;br /&gt;
Do the same mapping exercise for the data you hold on others. &lt;br /&gt;
&lt;br /&gt;
Once you've answered thesE questions, you'll be better able to make decisions about which data you want to regularly back up, and where these backups will be stored. You will also be better able to decide what to do with your data when traveling - What type of data do you need with you? What is too sensitive? What can you easily access online?&lt;br /&gt;
&lt;br /&gt;
How do you build trust in relation to your data and how you store it? &lt;br /&gt;
???&lt;br /&gt;
&lt;br /&gt;
When doing so, ask yourself who has access to this device or media platform (your family, colleagues, friends, or servers administrators and you do not know&lt;br /&gt;
????&lt;br /&gt;
&lt;br /&gt;
* Syncing (online/offline – apps permissions)&lt;br /&gt;
????&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Securing your connections ===&lt;br /&gt;
&lt;br /&gt;
Once we've mapped our data, the next step is making sure it's secure. Especially where your data is stored online, good passwords are crucial. &lt;br /&gt;
&lt;br /&gt;
''' Creating and using strong passwords''' &lt;br /&gt;
&lt;br /&gt;
Managing passwords is also a crucial part of maintaining our information online. Using the same password over and over again is risky, as are passwords that connect us to our identit(ies). Since a password is only as secure as the least secure service where it has been used, it is good practice to maintain separate passwords for each of our accounts. For more information on the importance of strong passwords and how to store them, read Security in a Box's [https://securityinabox.org/en/guide/passwords%20 chapter on passwords]. &lt;br /&gt;
*Using a password manager&lt;br /&gt;
To keep multiple secure passwords, you can use a password manager. *KeePassX* is a cross-platform free and open-source password manager that is easy to use and creates files with passwords that can also be exported and used in other devices. It can generate random passwords and store them securely.  To learn how to use KeePassX, read this [https://securityinabox.org/en/guide/keepass/windows%20 how-to].&lt;br /&gt;
To learn how to use KeePassDroid, the correspondent tool for Android, read this [https://securityinabox.org/en/guide/keepassdroid/android how-to].&lt;br /&gt;
&lt;br /&gt;
*Creating strong passphrases using the diceware technique *&lt;br /&gt;
Some passwords — like the one we use to decrypt our KeePassX file or lock our devices —need to be easy to remember and strong at the same time. A good solution is to create passphrases that are formed by a random group of words that don’t make any sense together, separated by spaces. One way to do this is to use the Diceware techique (this requires six-sided dice and the [http://world.std.com/~reinhold/dicewarewordlist.pdf Diceware word list] [PDF].&lt;br /&gt;
&lt;br /&gt;
By rolling the dice five times, we will come up with a five-digit number that corresponds to a word on the Diceware word list; this word is the first word of our passphrase. If we repeat this at least six times, we can create a strong passphrase formed by six words that together make a strong, random passphrase. It can be memorized just as we did when we had to learn poems by heart at school and will be so long that it would take an average of 3500 years to crack it with brute force at a speed of one trillion guesses per second. &lt;br /&gt;
To learn more about the Diceware technique, read [https://firstlook.org/theintercept/2015/03/26/passphrases-can-memorize-attackers-cant-guess this article] published by Micah Lee in The Intercept.&lt;br /&gt;
To learn more about two-factor authentication and security questions, read EFF's [https://ssd.eff.org/en/module/creating-strong-passwords &amp;quot;Creating Strong Passwords&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
==== Using a secure connection ====&lt;br /&gt;
&lt;br /&gt;
Another very important measure we should take when going online, especially if we are transmitting personal data and passwords, is to always use a '''secure SSL connection''', which ensures that our data cannot be seen by anyone as they travel from our computer to the website we are visiting or to the service we are using. To do so, when we access a website we should type HTTPS instead of HTTP befor the url of the website we want to visitin. If we receive an error or the HTTPS is replaced by HTTP again, this means that the website is not offering a secure connection. To make sure that we always connect securely to websites when this option is offered, we can install [https://www.eff.org/https-everywhere '''HTTPS Everywhere'''], a Firefox, Chrome, and Opera extension developed by the Electronic Frontier Foundation that encrypts our communications with many major websites.&lt;br /&gt;
&lt;br /&gt;
Likewise, when we create an account with an online service (e.g. our mailbox or a chat network) that we will access through a specific client or app, we should check the features of the service to make sure that it offers a secure connection and configure our clients accordingly by activating the '''TLS/SSL''' option.&lt;br /&gt;
&lt;br /&gt;
=== Anonymising your connections ===&lt;br /&gt;
&lt;br /&gt;
When browsing the internet through a normal internet connection, there are several ways in which we give away data about ourselves - our IP address (the number that identifies our connection), for example, or which websites we are visiting. There are also several ways to intercept our communications, especially if we are connecting via a free Wi-Fi spot.&lt;br /&gt;
&lt;br /&gt;
'''Virtual Private Networks (VPN: accessing the web through an encrypted tunnel'''&lt;br /&gt;
To add a layer of protection, we can access the internet through a virtual private network (VPN) - an encrypted tunnel that hides all services, protocols, and contents. Using a VPN is not difficult: it basically requires downloading a compressed file, extracting it and changing our computer’s connection settings, but it is important to choose a secure one – better if located abroad – because a compromised VPN server could be accessed by an intermediary who could then analyse all our activities. Autonomous servers [https://help.riseup.net/en/vpn Riseup] and [https://vpn.autistici.org Autistici/Inventati] both offer a reliable VPN. &lt;br /&gt;
&lt;br /&gt;
But we should consider that from a technical standpoint VPNs have some limitations: &lt;br /&gt;
'''An insecure connection is still insecure''': Although a VPN will anonymise our location and protect us from surveillance from our ISP, once our data is securely routed through the VPN server, it will go out on the internet as it normally would. This means we should still use TLS/SSL when available (ie. (HTTPS to browse websites, pop-ssl/imaps/smtp-tls for mail exchange, and so on).&lt;br /&gt;
&lt;br /&gt;
'''VPNs are not a panacea''': although they accomplish a lot, they can’t fix everything. For example, they cannot increase our security if our computer is already compromised with viruses or spyware. If we give personal information to a website, there is little that a VPN can do to maintain our anonymity with that website or its partners. For more information, see Riseup’s [https://help.riseup.net/en/vpn/security-issues webpage on VPN anonymity]. &lt;br /&gt;
&lt;br /&gt;
'''The connection might get slower''': the VPN routes all our traffic through an encrypted connection to the server before it goes out onto the normal internet. This extra step can slow things down.  For more information on VPNs, visit [https://securityinabox.org/en/guide/anonymity-and-circumvention this page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Hiding your IP address using the Tor network'''&lt;br /&gt;
A key step to being anonymous online is to  hide your IP address.&lt;br /&gt;
On way to do this is to use a tool called Tor, an anonymity network that conceals both the location of our connection and what we do on the internet. By consistently using Tor, no one can link our IP (and therefore our alternative identity) to us, not even the mail server we use. For further information on how to use Tor, see the project's [https://www.torproject.org/ website].&lt;br /&gt;
&lt;br /&gt;
The [https://www.torproject.org/projects/torbrowser.html.en Tor Browser] is a software tool designed to increase the privacy and security of our Internet activities and habits. It masks our identity and our online browsing from many forms of internet surveillance. &lt;br /&gt;
&lt;br /&gt;
From the Tor Project: &lt;br /&gt;
&amp;quot;The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
The Tor Browser Bundle consists of the Tor software and a modified version of the Firefox web browser, which is designed to provide extra protection while using it. To stop scripts from running without us knowing and to force secure SSL connections whenever available, the browser bundle also includes NoScript and HTTPS-Everywhere add-ons. &lt;br /&gt;
&lt;br /&gt;
Tor protects our anonymity by routing communications through a distributed network of servers run by volunteers all over the world. Using Tor hides the sites we visit from potential onlookers, and hides our location/identity from those sites. The software is designed also to make sure servers in the Tor network don't know both our location and the sites we are visiting. &lt;br /&gt;
&lt;br /&gt;
Tor also takes steps to encrypt the communication to and through its network, but this measure cannot extend all the way to a website which is sending or receiving content over non-encrypted channels (i.e. not providing HTTPS access). Nevertheless, the advantage of using Tor when accessing such sites is that Tor can secure our communication up to the step between the last of the Tor servers and the non-secure site. This confines the chance to intercept the content to that last step. &lt;br /&gt;
&lt;br /&gt;
As with VPNs, there is a trade-off between anonymity and speed. Because Tor facilitates anonymous browsing by bouncing our traffic through volunteers’ computers and servers in various parts of the world, it will definitely be slower than using other web browsers on our computer. &lt;br /&gt;
&lt;br /&gt;
What we should remember when using the Tor Browser is that it makes us anonymous, but not private. Although our web requests are anonymous, if we are posting on Facebook or sending an email through Gmail, that activity is still identifiable as “us”. &lt;br /&gt;
&lt;br /&gt;
*NOT SURE WHAT TO DO ABOUT THIS SECTION - DOESN'T FIT HERE*&lt;br /&gt;
If we want to browse the web anonymously with more than one identity, we can do so by creating each time a new identity for our browser, so that a new set of random Tor proxy servers is selected and we appear to come from a new location to the web servers. To do this, we just need to click the onion icon in the upper left of our browser and to select “New identity” from the menu. The Tor Browser will briefly close, clearing our browsing history and cookies and then restart. After that, we can safely browse the internet with a different identity. &lt;br /&gt;
&lt;br /&gt;
For more information on Tor and instructions for Windows users, see Security in a box's [https://securityinabox.org/en/guide/anonymity-and-circumvention howto]. &lt;br /&gt;
For instructions for Mac OSX users, visit this [https://ssd.eff.org/en/module/how-use-tor-mac-os-x howto] by the EFF. &lt;br /&gt;
&lt;br /&gt;
[SECTION ON EMAIL HOSTING - NOT SURE HOW THIS FITS IN HERE] &lt;br /&gt;
Also the choice of the mail server we use for our contact mail address is important. While there are several secure servers that offer a good service – e.g. the Swiss commercial service [https://kolabnow.com Kolab Now] and the autonomous servers [http://riseup.net Riseup] (a site used by activists with a clear set of political principles) and [https://www.autistici.org Autistici/Inventati] – the main point is to find a service that offers a secure connection (HTTPS instead of HTTP) and that is compatible with our virtual persona. If, for instance, we are creating a fake identity that doesn’t know much about digital security, it may be better to use a more widespread service like Gmail, and the possibility of two-factor authentication is always a plus. If the mail address we are creating is connected to our work and hosted by our firm’s mail server with its own domain, it is a good idea not to include our surname in the address and to keep just the name followed by the domain (e.g. jane@businessname.com). Of course, if a mail address is required when registering a new mail account, we shouldn’t give our usual address and it is much better to use a disposable account for this purpose.&lt;br /&gt;
&lt;br /&gt;
=== Devices and Well being ===&lt;br /&gt;
A LOT OF THIS CAN BE CONDENSED AND DELETED.&lt;br /&gt;
REFERENCE THE LEVEL-UP RESOURCES!&lt;br /&gt;
&lt;br /&gt;
While working on computer, smart phones and other devices, we tend to forget our body. Our body freezes. Fingers, eyes and ears follow the rhythm of our clicks, scrolls and swipes. In almost motionless, staring at the screen, the user forgets the possibilities of movement, pause or improving posture and even is imposing on the body pains and discomforts. While some senses get paralyzed, our brain becomes intertwined with the machine: processing a lot of data and information, multi-tasking and executing creative, administrative challenges while managing our engagements and multiple identities... our neurological activity increases. There is a risk in becoming inseparable of our hardware technologies. Actually we can do almost everything with a machine: communicate, getting ourselves organized, informed, be entertained, play, have sex, ... To have a healthy relationship with our machines is hence a key for our well being. &lt;br /&gt;
“Around 2000, I made a video installation “Does Technology ever end or does it restart automatically?” it was the moment when there was fear that the machines' clock would crash on the number 2000 &amp;lt;Y2K problem, the Millennium bug&amp;gt;: display of dates and the automated ordering of dated records or real-time events would get twisted. The media media hysteria around the potential failure of our electronic and digital devices which were surrounding us, made me reset (reboot in another distro). In the ecstasy of integrating tech in my daily life, exploring avatars and audiovisual creation, design to communicate political struggles, my hand was hurting, and I couldn't click the mouse anymore. I had to change my daily routine, care about my body and cure myself. I couldn't hold my keys nor masturbate :), .. what was I going to do with my right hand.” &lt;br /&gt;
SHOW THE PAIN open mouth and lips as wide as possible simultaneously raising your eyebrows as high as possible, hold while counting to 5 repeat a few times &lt;br /&gt;
(A/ A,separation/séparation) (1) strategies of prevention SCHEDULE: Work out a regular pattern for your day, and stick to it. Your brain will relax a bit if it knows “what comes next”. Plan non-digital activities. &lt;br /&gt;
PROCESS: If you get an idea or think of something you need to do, write it down. Your brain is actually a bad early implementation of Calendar reminders, Email Notifications and Associative Tagging. Brain reminders aren’t timed, so they will pop up at the most inconvenient moments. By writing it down you literally tell your brain that it’s ok to let go of the thought. &lt;br /&gt;
WORKFLOW: Interrupt Driven Work is a hassle. You do some work from your todo, but mainly you keep getting interrupted by new email, IRC and instant messages and phonecalls. Ideally, turn off the immediate notification and just check your email/social media/IRC / … once or twice a day. &lt;br /&gt;
PROCESS: If you get an idea or think of something you need to do, write it down. Your brain is actually a bad early implementation of Calendar reminders, Email Notifications and Associative Tagging. Brain reminders aren’t timed, so they will pop up at the most inconvenient moments. By writing it down you literally tell your brain that it’s ok to let go of the thought. &lt;br /&gt;
CHARGING: Charge your devices in a place which is not easy reachable. Do some stretching while reaching them.Go a Bit Off the Grid and use alternative energies to charge your devices so we reinforce the relation between technology and nature. &lt;br /&gt;
DAYLIGHT: You need about to get some decent daylight (20-40 minutes daily) to reset your body clock. Sitting in front of the window and sunlight can be limiting your screen view. Going outside can increase your healthy look... you will look better on the screen after! The quality of light also influences your sleeping/dreaming. &lt;br /&gt;
SLEEPING: Let's not take our daemons and shells scripts into our state of dreaming. Not having your devices next to your bed works wonders for your sleep well and good morning rituals. &lt;br /&gt;
FOOD &amp;amp; DRINK: Water can safe plants! And if you drank to much, don't forget to go to the toilet once in a while. &lt;br /&gt;
(2) Exercises to disconnect &lt;br /&gt;
Create performative events for a human understanding of technology. Probably besides of becoming an icon or a symbol of a visual interface, I guess you have to be minimum 2 people: 0 en 1 to make the process into a social momentum. # Let's go analogue – physical.  ??&lt;br /&gt;
_ make props for all the hardware components in the computer &lt;br /&gt;
  (from cardboard, scrap, .. take your time to make them) &lt;br /&gt;
_ distribute props over the #actors, _ create a script to enact the process (scenario) &lt;br /&gt;
exemple scripts: Screensavers, sleep mode, hibernate, standby or off. In this performative event the switching on and shutting down of a computer is (re)enacted through a collective body. What is happening with our hardware and software when we go to sleep or other modi of existence. Link: &lt;br /&gt;
Home Is a Server In this performative event we install a webserver and understand about Wiki's and it's recepies on a virtual machine SSH? Doors to open, commands to learn to activate our space into a home while baking pancakes. Link: &lt;br /&gt;
Crypto Dance ! In this performative event security is at stake in a dance which introduces basic crypto like in bob and eve do a lambada. (need still to be developed by Hacking with care) &lt;br /&gt;
Strategies of care &lt;br /&gt;
Chair Strike installation at the Academy of fine Arts Vienna, PC-Lab, in the framework of Strike, she said, by GirlsOnHorses (Auer, Egermann, Straganz, Wieger). &lt;br /&gt;
By paying more attention to the body and ICT work experiences, 'WORKINGSTILLWORKING” developed a variety of micro-movements and creative habits, tactics, gestures and practices, consciously or unconsciously to break free from motionless postures, painful or stultifying. Together with HACKING WITH CARE, they published a zine: http://workingstill-stillworking.net/wp-content/uploads/2013/06/AttentionSomaticTheZine1.3.pdf, Attent!on som(t)a(c)tics: With the micro movements of our bodies when using our devices, we improvise and explore forms of embodied emancipation within a digital context. &lt;br /&gt;
describe your (intimate, pleasant, difficult or binding…) relationships with computers and propose ways of subjugating those routines. &lt;br /&gt;
http://hackingwithcare.in/wiki/doku.php/projects : Online Resources for psychological and physical well-being, health, self-care, caregiving, in general and in the specific contexts of activism and hacking. Material to explore and raise awareness on related political issues, among caregivers, hackers-who-care, and friends of a good fair world, with the purpose of inspiring alliances. Caring for one self can be a collective emancipatory process to produce a collective platform of liberating instructions, gestures, movement or poetry. &lt;br /&gt;
SOMATIC EXPLORATIONS AND LIBERATING EXCERSISES RE-EMBODYING RELATIONS TO OUR DAILY TECHNOLGIES: TRICKS OF SELF AWARENESS(3)(4)(5) ???strategies of curing ??? &lt;br /&gt;
We know adjustable chairs, but what about adjustable software to different cognitive capabilities. &lt;br /&gt;
disable auto-login check cognitive capacity Using short cuts Organize a Hands massage workshop Switch between commandline and graphical Interface … lalala, do do, reeeeeeee: Technology accelerates to find solutions of interfacing to the human body Technology can be used to persuade people into a behaviour change. We can change our behaviour in relation with technology. &lt;br /&gt;
State of inertia &amp;amp; Red Light Reflex Long hours hunched over your hardware can cause the muscles of the front of the body to contract while the body pulls inward. The Red Light reflex is a protective reflex found in all vertebrate animals and is a response to fear, anxiety, prolonged distress or negativity. Rounded shoulders, depressed chest and the head jutting forward can lead to chronic neck pain, jaw pain, hip pain, mid-back pain and shallow breathing. The inability to breathe deeply deprives your brain, blood and muscles of the oxygen they need to function properly. This in turn can cause fatigue, depression, anxiety, sleep problems and exacerbate allergies. &lt;br /&gt;
Repetitive Strain Injury (RSI) http://www.workrave.org/ Workrave is a program that assists in the recovery and prevention of Repetitive Strain Injury (RSI). The program frequently alerts you to take micro-pauses, rest breaks and restricts you to your daily limit. &lt;br /&gt;
(1) Annie Abrahams,separation/séparation http://collection.eliterature.org/2/works/abrahams_separation/separation/index.htm# (2) http://bluehackers.org/howto (3) http://workingstill-stillworking.net (4) Anne Goldenberg, Hacking with Care : Attention, bien-être et politique de l’ordinaire dans le milieu hacktiviste: http://dpi.studioxx.org/en/hacking-care-attention-bien-%C3%AAtre-et-politique-de-l%E2%80%99ordinaire-dans-le-milieu-hacktiviste (5) L'ERSE POSTURE https://www.youtube.com/watch?v=Va0ZLaZHQlU (6) http://networkcultures.org/blog/2007/04/23/linux-for-theatre-makers-embodiment-and-nix-modus-operandi/&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Step_0&amp;diff=1272</id>
		<title>Step 0</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Step_0&amp;diff=1272"/>
				<updated>2015-05-27T17:14:42Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: edited links&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
'''recommendations for the printed version: http://etherpad.calafou/p/securitydisclaimer'''&lt;br /&gt;
&lt;br /&gt;
== Before you start: mapping your data and devices; securing your data; anonymising your connections ==&lt;br /&gt;
&lt;br /&gt;
This section provides you with notions, methodologies and tools to take care of your data and devices and have those taking care of you. Data and devices management requires to reflect on their hosting and leaving qualities and in how we can configure those to not mess around with our well-being. This section It also explains how to engage into more secure communication practices when you get connected. All the following tips and tricks are pre-requisites to better understand how to manage identity on-line and creating safe spaces.&lt;br /&gt;
'''EDIT'''&lt;br /&gt;
&lt;br /&gt;
This section will cover the starting points: what data do you produce and store? Where? How do you make sure your data is secure? And when you're connecting to the internet, how do you anonymise your connections? &lt;br /&gt;
&lt;br /&gt;
It's also important to think about you relationship with your technology - how can we base this relationship in self care?&lt;br /&gt;
&lt;br /&gt;
=== Mapping your data ===&lt;br /&gt;
&lt;br /&gt;
Before becoming a zen user and developer of technologies, and adopting better privacy and digital security practices, it's important to first know what you want to protect. One way of doing this is to map (using a table, map, drawing, etc) your production and management of data. &lt;br /&gt;
&lt;br /&gt;
*What kind of data do you produce and or manage? With whom?&lt;br /&gt;
&lt;br /&gt;
To begin mapping your data, first make a list of the data you create yourself. This can include personal and work-related documents, emails, images, videos, designs, tweets, blog posts, and so on. Then make a list  of the data you manage or store, which is produced by others. This can encompass information given to you by your colleagues, friends, relatives to files you download from websites, repositories, p2p networks, etc. Finally, identify which type of data you share with others, for instance if you share a social media profile or email account with a family member, partner, or colleagues. &lt;br /&gt;
&lt;br /&gt;
'''Where is this data stored?''' &lt;br /&gt;
&lt;br /&gt;
*Which devices hold your data? &lt;br /&gt;
-This can include your computer, external drives, and phone. &lt;br /&gt;
&lt;br /&gt;
*Which online platforms host your data? &lt;br /&gt;
- This can include emails, social media accounts, etc. Also bear in mind that some applications enable syncing of data between your different devices, or between your devices and online platforms, and it's important to know where and when this is happening.  &lt;br /&gt;
&lt;br /&gt;
*How do you organise your data?&lt;br /&gt;
- Do you keep your personal/professional/activist data separate?&lt;br /&gt;
&lt;br /&gt;
*How sensitive is your data? &lt;br /&gt;
- For each type of data you have listed in your data map, what would happen if this particular data suddenly disappeared? For instance, if your email account is closed down, if your computer or external hard drive is stolen or breaks down, if you accidentally erase a folder, etc?. &lt;br /&gt;
- What would happen if this data were seen and copied by a third party? &lt;br /&gt;
&lt;br /&gt;
Do the same mapping exercise for the data you hold on others. &lt;br /&gt;
&lt;br /&gt;
Once you've answered thesE questions, you'll be better able to make decisions about which data you want to regularly back up, and where these backups will be stored. You will also be better able to decide what to do with your data when traveling - What type of data do you need with you? What is too sensitive? What can you easily access online?&lt;br /&gt;
&lt;br /&gt;
How do you build trust in relation to your data and how you store it? &lt;br /&gt;
???&lt;br /&gt;
&lt;br /&gt;
When doing so, ask yourself who has access to this device or media platform (your family, colleagues, friends, or servers administrators and you do not know&lt;br /&gt;
????&lt;br /&gt;
&lt;br /&gt;
* Syncing (online/offline – apps permissions)&lt;br /&gt;
????&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Securing your connections ===&lt;br /&gt;
&lt;br /&gt;
Once we've mapped our data, the next step is making sure it's secure. Especially where your data is stored online, good passwords are crucial. &lt;br /&gt;
&lt;br /&gt;
''' Creating and using strong passwords''' &lt;br /&gt;
&lt;br /&gt;
Managing passwords is also a crucial part of maintaining our information online. Using the same password over and over again is risky, as are passwords that connect us to our identit(ies). Since a password is only as secure as the least secure service where it has been used, it is good practice to maintain separate passwords for each of our accounts. For more information on the importance of strong passwords and how to store them, read Security in a Box's [https://securityinabox.org/en/guide/passwords%20 chapter on passwords]. &lt;br /&gt;
*Using a password manager&lt;br /&gt;
To keep multiple secure passwords, you can use a password manager. *KeePassX* is a cross-platform free and open-source password manager that is easy to use and creates files with passwords that can also be exported and used in other devices. It can generate random passwords and store them securely.  To learn how to use KeePassX, read this [https://securityinabox.org/en/guide/keepass/windows%20 how-to].&lt;br /&gt;
To learn how to use KeePassDroid, the correspondent tool for Android, read this [https://securityinabox.org/en/guide/keepassdroid/android how-to].&lt;br /&gt;
&lt;br /&gt;
*Creating strong passphrases using the diceware technique *&lt;br /&gt;
Some passwords — like the one we use to decrypt our KeePassX file or lock our devices —need to be easy to remember and strong at the same time. A good solution is to create passphrases that are formed by a random group of words that don’t make any sense together, separated by spaces. One way to do this is to use the Diceware techique (this requires six-sided dice and the [http://world.std.com/~reinhold/dicewarewordlist.pdf Diceware word list] [PDF].&lt;br /&gt;
&lt;br /&gt;
By rolling the dice five times, we will come up with a five-digit number that corresponds to a word on the Diceware word list; this word is the first word of our passphrase. If we repeat this at least six times, we can create a strong passphrase formed by six words that together make a strong, random passphrase. It can be memorized just as we did when we had to learn poems by heart at school and will be so long that it would take an average of 3500 years to crack it with brute force at a speed of one trillion guesses per second. &lt;br /&gt;
To learn more about the Diceware technique, read [https://firstlook.org/theintercept/2015/03/26/passphrases-can-memorize-attackers-cant-guess this article] published by Micah Lee in The Intercept.&lt;br /&gt;
To learn more about two-factor authentication and security questions, read EFF's [https://ssd.eff.org/en/module/creating-strong-passwords &amp;quot;Creating Strong Passwords&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
==== Using a secure connection ====&lt;br /&gt;
&lt;br /&gt;
Another very important measure we should take when going online, especially if we are transmitting personal data and passwords, is to always use a '''secure SSL connection''', which ensures that our data cannot be seen by anyone as they travel from our computer to the website we are visiting or to the service we are using. To do so, when we access a website we should type HTTPS instead of HTTP befor the url of the website we want to visitin. If we receive an error or the HTTPS is replaced by HTTP again, this means that the website is not offering a secure connection. To make sure that we always connect securely to websites when this option is offered, we can install [https://www.eff.org/https-everywhere '''HTTPS Everywhere'''], a Firefox, Chrome, and Opera extension developed by the Electronic Frontier Foundation that encrypts our communications with many major websites.&lt;br /&gt;
&lt;br /&gt;
Likewise, when we create an account with an online service (e.g. our mailbox or a chat network) that we will access through a specific client or app, we should check the features of the service to make sure that it offers a secure connection and configure our clients accordingly by activating the '''TLS/SSL''' option.&lt;br /&gt;
&lt;br /&gt;
=== Anonymising your connections ===&lt;br /&gt;
&lt;br /&gt;
When browsing the internet through a normal internet connection, there are several ways in which we give away data about ourselves - our IP address (the number that identifies our connection), for example, or which websites we are visiting. There are also several ways to intercept our communications, especially if we are connecting via a free Wi-Fi spot.&lt;br /&gt;
&lt;br /&gt;
'''Virtual Private Networks (VPN: accessing the web through an encrypted tunnel'''&lt;br /&gt;
To add a layer of protection, we can access the internet through a virtual private network (VPN) - an encrypted tunnel that hides all services, protocols, and contents. Using a VPN is not difficult: it basically requires downloading a compressed file, extracting it and changing our computer’s connection settings, but it is important to choose a secure one – better if located abroad – because a compromised VPN server could be accessed by an intermediary who could then analyse all our activities. Autonomous servers Riseup – https://help.riseup.net/en/vpn – and Autistici/Inventati – https://vpn.autistici.org – both offer a reliable VPN. &lt;br /&gt;
&lt;br /&gt;
But we should consider that from a technical standpoint VPNs have some limitations: &lt;br /&gt;
'''An insecure connection is still insecure''': Although a VPN will anonymise our location and protect us from surveillance from our ISP, once our data is securely routed through the VPN server, it will go out on the internet as it normally would. This means we should still use TLS when available (ie. (HTTPS to browse websites, pop-ssl/imaps/smtp-tls for mail exchange, and so on). *EXPLANATION NEEDED ON TLS* &lt;br /&gt;
&lt;br /&gt;
'''VPNs are not a panacea''': although they accomplish a lot, they can’t fix everything. For example, they cannot increase our security if our computer is already compromised with viruses or spyware. If we give personal information to a website, there is little that a VPN can do to maintain our anonymity with that website or its partners. For more information, see Riseup’s webpage on VPN anonymity: https://help.riseup.net/en/vpn/security-issues. &lt;br /&gt;
&lt;br /&gt;
'''The connection might get slower''': the VPN routes all our traffic through an encrypted connection to the server before it goes out onto the normal internet. This extra step can slow things down.  For more information on VPNs, visit: https://securityinabox.org/en/guide/anonymity-and-circumvention &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Hiding your IP address using the Tor network'''&lt;br /&gt;
A key step to being anonymous online is to  hide your IP address.&lt;br /&gt;
On way to do this is to use a tool called Tor, an anonymity network that conceals both the location of our connection and what we do on the internet. By consistently using Tor, no one can link our IP (and therefore our alternative identity) to us, not even the mail server we use. For further information on how to use Tor, see  ??&lt;br /&gt;
&lt;br /&gt;
The Tor Browser (https://www.torproject.org/projects/torbrowser.html.en) is a software tool designed to increase the privacy and security of our Internet activities and habits. It masks our identity and our online browsing from many forms of internet surveillance. &lt;br /&gt;
&lt;br /&gt;
From the Tor Project: &lt;br /&gt;
&amp;quot;The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
The Tor Browser Bundle consists of the Tor software and a modified version of the Firefox web browser, which is designed to provide extra protection while using it. To stop scripts from running without us knowing and to force secure SSL connections whenever available, the browser bundle also includes NoScript and HTTPS-Everywhere add-ons. &lt;br /&gt;
&lt;br /&gt;
Tor protects our anonymity by routing communications through a distributed network of servers run by volunteers all over the world. Using Tor hides the sites we visit from potential onlookers, and hides our location/identity from those sites. The software is designed also to make sure servers in the Tor network don't know both our location and the sites we are visiting. &lt;br /&gt;
&lt;br /&gt;
Tor also takes steps to encrypt the communication to and through its network, but this measure cannot extend all the way to a website which is sending or receiving content over non-encrypted channels (i.e. not providing HTTPS access). Nevertheless, the advantage of using Tor when accessing such sites is that Tor can secure our communication up to the step between the last of the Tor servers and the non-secure site. This confines the chance to intercept the content to that last step. &lt;br /&gt;
&lt;br /&gt;
As with VPNs, there is a trade-off between anonymity and speed. Because Tor facilitates anonymous browsing by bouncing our traffic through volunteers’ computers and servers in various parts of the world, it will definitely be slower than using other web browsers on our computer. &lt;br /&gt;
&lt;br /&gt;
What we should remember when using the Tor Browser is that it makes us anonymous, but not private. Although our web requests are anonymous, if we are posting on Facebook or sending an email through Gmail, that activity is still identifiable as “us”. &lt;br /&gt;
&lt;br /&gt;
*NOT SURE WHAT TO DO ABOUT THIS SECTION - DOESN'T FIT HERE*&lt;br /&gt;
If we want to browse the web anonymously with more than one identity, we can do so by creating each time a new identity for our browser, so that a new set of random Tor proxy servers is selected and we appear to come from a new location to the web servers. To do this, we just need to click the onion icon in the upper left of our browser and to select “New identity” from the menu. The Tor Browser will briefly close, clearing our browsing history and cookies and then restart. After that, we can safely browse the internet with a different identity. &lt;br /&gt;
&lt;br /&gt;
For more information on Tor and instructions for Windows users, visit: https://securityinabox.org/en/guide/anonymity-and-circumvention &lt;br /&gt;
For instructions for Mac OSX users, visit: https://ssd.eff.org/en/module/how-use-tor-mac-os-x &lt;br /&gt;
&lt;br /&gt;
[SECTION ON EMAIL HOSTING - NOT SURE HOW THIS FITS IN HERE] &lt;br /&gt;
Also the choice of the mail server we use for our contact mail address is important. While there are several secure servers that offer a good service – e.g. the Swiss commercial service Kolab Now (https://kolabnow.com) and the autonomous servers Riseup (a site used by activists with a clear set of political principles: http://riseup.net) and Autistici/Inventati (https://www.autistici.org) – the main point is to find a service that offers a secure connection (HTTPS instead of HTTP) and that is compatible with our virtual persona. If, for instance, we are creating a fake identity that doesn’t know much about digital security, it may be better to use a more widespread service like Gmail, and the possibility of two-factor authentication is always a plus. If the mail address we are creating is connected to our work and hosted by our firm’s mail server with its own domain, it is a good idea not to include our surname in the address and to keep just the name followed by the domain (e.g. jane@businessname.com). Of course, if a mail address is required when registering a new mail account, we shouldn’t give our usual address and it is much better to use a disposable account for this purpose.&lt;br /&gt;
&lt;br /&gt;
=== Devices and Well being ===&lt;br /&gt;
A LOT OF THIS CAN BE CONDENSED AND DELETED.&lt;br /&gt;
REFERENCE THE LEVEL-UP RESOURCES!&lt;br /&gt;
&lt;br /&gt;
While working on computer, smart phones and other devices, we tend to forget our body. Our body freezes. Fingers, eyes and ears follow the rhythm of our clicks, scrolls and swipes. In almost motionless, staring at the screen, the user forgets the possibilities of movement, pause or improving posture and even is imposing on the body pains and discomforts. While some senses get paralyzed, our brain becomes intertwined with the machine: processing a lot of data and information, multi-tasking and executing creative, administrative challenges while managing our engagements and multiple identities... our neurological activity increases. There is a risk in becoming inseparable of our hardware technologies. Actually we can do almost everything with a machine: communicate, getting ourselves organized, informed, be entertained, play, have sex, ... To have a healthy relationship with our machines is hence a key for our well being. &lt;br /&gt;
“Around 2000, I made a video installation “Does Technology ever end or does it restart automatically?” it was the moment when there was fear that the machines' clock would crash on the number 2000 &amp;lt;Y2K problem, the Millennium bug&amp;gt;: display of dates and the automated ordering of dated records or real-time events would get twisted. The media media hysteria around the potential failure of our electronic and digital devices which were surrounding us, made me reset (reboot in another distro). In the ecstasy of integrating tech in my daily life, exploring avatars and audiovisual creation, design to communicate political struggles, my hand was hurting, and I couldn't click the mouse anymore. I had to change my daily routine, care about my body and cure myself. I couldn't hold my keys nor masturbate :), .. what was I going to do with my right hand.” &lt;br /&gt;
SHOW THE PAIN open mouth and lips as wide as possible simultaneously raising your eyebrows as high as possible, hold while counting to 5 repeat a few times &lt;br /&gt;
(A/ A,separation/séparation) (1) strategies of prevention SCHEDULE: Work out a regular pattern for your day, and stick to it. Your brain will relax a bit if it knows “what comes next”. Plan non-digital activities. &lt;br /&gt;
PROCESS: If you get an idea or think of something you need to do, write it down. Your brain is actually a bad early implementation of Calendar reminders, Email Notifications and Associative Tagging. Brain reminders aren’t timed, so they will pop up at the most inconvenient moments. By writing it down you literally tell your brain that it’s ok to let go of the thought. &lt;br /&gt;
WORKFLOW: Interrupt Driven Work is a hassle. You do some work from your todo, but mainly you keep getting interrupted by new email, IRC and instant messages and phonecalls. Ideally, turn off the immediate notification and just check your email/social media/IRC / … once or twice a day. &lt;br /&gt;
PROCESS: If you get an idea or think of something you need to do, write it down. Your brain is actually a bad early implementation of Calendar reminders, Email Notifications and Associative Tagging. Brain reminders aren’t timed, so they will pop up at the most inconvenient moments. By writing it down you literally tell your brain that it’s ok to let go of the thought. &lt;br /&gt;
CHARGING: Charge your devices in a place which is not easy reachable. Do some stretching while reaching them.Go a Bit Off the Grid and use alternative energies to charge your devices so we reinforce the relation between technology and nature. &lt;br /&gt;
DAYLIGHT: You need about to get some decent daylight (20-40 minutes daily) to reset your body clock. Sitting in front of the window and sunlight can be limiting your screen view. Going outside can increase your healthy look... you will look better on the screen after! The quality of light also influences your sleeping/dreaming. &lt;br /&gt;
SLEEPING: Let's not take our daemons and shells scripts into our state of dreaming. Not having your devices next to your bed works wonders for your sleep well and good morning rituals. &lt;br /&gt;
FOOD &amp;amp; DRINK: Water can safe plants! And if you drank to much, don't forget to go to the toilet once in a while. &lt;br /&gt;
(2) Exercises to disconnect &lt;br /&gt;
Create performative events for a human understanding of technology. Probably besides of becoming an icon or a symbol of a visual interface, I guess you have to be minimum 2 people: 0 en 1 to make the process into a social momentum. # Let's go analogue – physical.  ??&lt;br /&gt;
_ make props for all the hardware components in the computer &lt;br /&gt;
  (from cardboard, scrap, .. take your time to make them) &lt;br /&gt;
_ distribute props over the #actors, _ create a script to enact the process (scenario) &lt;br /&gt;
exemple scripts: Screensavers, sleep mode, hibernate, standby or off. In this performative event the switching on and shutting down of a computer is (re)enacted through a collective body. What is happening with our hardware and software when we go to sleep or other modi of existence. Link: &lt;br /&gt;
Home Is a Server In this performative event we install a webserver and understand about Wiki's and it's recepies on a virtual machine SSH? Doors to open, commands to learn to activate our space into a home while baking pancakes. Link: &lt;br /&gt;
Crypto Dance ! In this performative event security is at stake in a dance which introduces basic crypto like in bob and eve do a lambada. (need still to be developed by Hacking with care) &lt;br /&gt;
Strategies of care &lt;br /&gt;
Chair Strike installation at the Academy of fine Arts Vienna, PC-Lab, in the framework of Strike, she said, by GirlsOnHorses (Auer, Egermann, Straganz, Wieger). &lt;br /&gt;
By paying more attention to the body and ICT work experiences, 'WORKINGSTILLWORKING” developed a variety of micro-movements and creative habits, tactics, gestures and practices, consciously or unconsciously to break free from motionless postures, painful or stultifying. Together with HACKING WITH CARE, they published a zine: http://workingstill-stillworking.net/wp-content/uploads/2013/06/AttentionSomaticTheZine1.3.pdf, Attent!on som(t)a(c)tics: With the micro movements of our bodies when using our devices, we improvise and explore forms of embodied emancipation within a digital context. &lt;br /&gt;
describe your (intimate, pleasant, difficult or binding…) relationships with computers and propose ways of subjugating those routines. &lt;br /&gt;
http://hackingwithcare.in/wiki/doku.php/projects : Online Resources for psychological and physical well-being, health, self-care, caregiving, in general and in the specific contexts of activism and hacking. Material to explore and raise awareness on related political issues, among caregivers, hackers-who-care, and friends of a good fair world, with the purpose of inspiring alliances. Caring for one self can be a collective emancipatory process to produce a collective platform of liberating instructions, gestures, movement or poetry. &lt;br /&gt;
SOMATIC EXPLORATIONS AND LIBERATING EXCERSISES RE-EMBODYING RELATIONS TO OUR DAILY TECHNOLGIES: TRICKS OF SELF AWARENESS(3)(4)(5) ???strategies of curing ??? &lt;br /&gt;
We know adjustable chairs, but what about adjustable software to different cognitive capabilities. &lt;br /&gt;
disable auto-login check cognitive capacity Using short cuts Organize a Hands massage workshop Switch between commandline and graphical Interface … lalala, do do, reeeeeeee: Technology accelerates to find solutions of interfacing to the human body Technology can be used to persuade people into a behaviour change. We can change our behaviour in relation with technology. &lt;br /&gt;
State of inertia &amp;amp; Red Light Reflex Long hours hunched over your hardware can cause the muscles of the front of the body to contract while the body pulls inward. The Red Light reflex is a protective reflex found in all vertebrate animals and is a response to fear, anxiety, prolonged distress or negativity. Rounded shoulders, depressed chest and the head jutting forward can lead to chronic neck pain, jaw pain, hip pain, mid-back pain and shallow breathing. The inability to breathe deeply deprives your brain, blood and muscles of the oxygen they need to function properly. This in turn can cause fatigue, depression, anxiety, sleep problems and exacerbate allergies. &lt;br /&gt;
Repetitive Strain Injury (RSI) http://www.workrave.org/ Workrave is a program that assists in the recovery and prevention of Repetitive Strain Injury (RSI). The program frequently alerts you to take micro-pauses, rest breaks and restricts you to your daily limit. &lt;br /&gt;
(1) Annie Abrahams,separation/séparation http://collection.eliterature.org/2/works/abrahams_separation/separation/index.htm# (2) http://bluehackers.org/howto (3) http://workingstill-stillworking.net (4) Anne Goldenberg, Hacking with Care : Attention, bien-être et politique de l’ordinaire dans le milieu hacktiviste: http://dpi.studioxx.org/en/hacking-care-attention-bien-%C3%AAtre-et-politique-de-l%E2%80%99ordinaire-dans-le-milieu-hacktiviste (5) L'ERSE POSTURE https://www.youtube.com/watch?v=Va0ZLaZHQlU (6) http://networkcultures.org/blog/2007/04/23/linux-for-theatre-makers-embodiment-and-nix-modus-operandi/&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Step_0&amp;diff=1271</id>
		<title>Step 0</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Step_0&amp;diff=1271"/>
				<updated>2015-05-27T17:13:51Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: added part on HTTS&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
'''recommendations for the printed version: http://etherpad.calafou/p/securitydisclaimer'''&lt;br /&gt;
&lt;br /&gt;
== Before you start: mapping your data and devices; securing your data; anonymising your connections ==&lt;br /&gt;
&lt;br /&gt;
This section provides you with notions, methodologies and tools to take care of your data and devices and have those taking care of you. Data and devices management requires to reflect on their hosting and leaving qualities and in how we can configure those to not mess around with our well-being. This section It also explains how to engage into more secure communication practices when you get connected. All the following tips and tricks are pre-requisites to better understand how to manage identity on-line and creating safe spaces.&lt;br /&gt;
'''EDIT'''&lt;br /&gt;
&lt;br /&gt;
This section will cover the starting points: what data do you produce and store? Where? How do you make sure your data is secure? And when you're connecting to the internet, how do you anonymise your connections? &lt;br /&gt;
&lt;br /&gt;
It's also important to think about you relationship with your technology - how can we base this relationship in self care?&lt;br /&gt;
&lt;br /&gt;
=== Mapping your data ===&lt;br /&gt;
&lt;br /&gt;
Before becoming a zen user and developer of technologies, and adopting better privacy and digital security practices, it's important to first know what you want to protect. One way of doing this is to map (using a table, map, drawing, etc) your production and management of data. &lt;br /&gt;
&lt;br /&gt;
*What kind of data do you produce and or manage? With whom?&lt;br /&gt;
&lt;br /&gt;
To begin mapping your data, first make a list of the data you create yourself. This can include personal and work-related documents, emails, images, videos, designs, tweets, blog posts, and so on. Then make a list  of the data you manage or store, which is produced by others. This can encompass information given to you by your colleagues, friends, relatives to files you download from websites, repositories, p2p networks, etc. Finally, identify which type of data you share with others, for instance if you share a social media profile or email account with a family member, partner, or colleagues. &lt;br /&gt;
&lt;br /&gt;
'''Where is this data stored?''' &lt;br /&gt;
&lt;br /&gt;
*Which devices hold your data? &lt;br /&gt;
-This can include your computer, external drives, and phone. &lt;br /&gt;
&lt;br /&gt;
*Which online platforms host your data? &lt;br /&gt;
- This can include emails, social media accounts, etc. Also bear in mind that some applications enable syncing of data between your different devices, or between your devices and online platforms, and it's important to know where and when this is happening.  &lt;br /&gt;
&lt;br /&gt;
*How do you organise your data?&lt;br /&gt;
- Do you keep your personal/professional/activist data separate?&lt;br /&gt;
&lt;br /&gt;
*How sensitive is your data? &lt;br /&gt;
- For each type of data you have listed in your data map, what would happen if this particular data suddenly disappeared? For instance, if your email account is closed down, if your computer or external hard drive is stolen or breaks down, if you accidentally erase a folder, etc?. &lt;br /&gt;
- What would happen if this data were seen and copied by a third party? &lt;br /&gt;
&lt;br /&gt;
Do the same mapping exercise for the data you hold on others. &lt;br /&gt;
&lt;br /&gt;
Once you've answered thesE questions, you'll be better able to make decisions about which data you want to regularly back up, and where these backups will be stored. You will also be better able to decide what to do with your data when traveling - What type of data do you need with you? What is too sensitive? What can you easily access online?&lt;br /&gt;
&lt;br /&gt;
How do you build trust in relation to your data and how you store it? &lt;br /&gt;
???&lt;br /&gt;
&lt;br /&gt;
When doing so, ask yourself who has access to this device or media platform (your family, colleagues, friends, or servers administrators and you do not know&lt;br /&gt;
????&lt;br /&gt;
&lt;br /&gt;
* Syncing (online/offline – apps permissions)&lt;br /&gt;
????&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Securing your connections ===&lt;br /&gt;
&lt;br /&gt;
Once we've mapped our data, the next step is making sure it's secure. Especially where your data is stored online, good passwords are crucial. &lt;br /&gt;
&lt;br /&gt;
''' Creating and using strong passwords''' &lt;br /&gt;
&lt;br /&gt;
Managing passwords is also a crucial part of maintaining our information online. Using the same password over and over again is risky, as are passwords that connect us to our identit(ies). Since a password is only as secure as the least secure service where it has been used, it is good practice to maintain separate passwords for each of our accounts. For more information on the importance of strong passwords and how to store them, read Security in a Box's [https://securityinabox.org/en/guide/passwords%20 chapter on passwords]. &lt;br /&gt;
*Using a password manager&lt;br /&gt;
To keep multiple secure passwords, you can use a password manager. *KeePassX* is a cross-platform free and open-source password manager that is easy to use and creates files with passwords that can also be exported and used in other devices. It can generate random passwords and store them securely.  To learn how to use KeePassX, read this [https://securityinabox.org/en/guide/keepass/windows%20 how-to].&lt;br /&gt;
To learn how to use KeePassDroid, the correspondent tool for Android, read this [https://securityinabox.org/en/guide/keepassdroid/android how-to].&lt;br /&gt;
&lt;br /&gt;
*Creating strong passphrases using the diceware technique *&lt;br /&gt;
Some passwords — like the one we use to decrypt our KeePassX file or lock our devices —need to be easy to remember and strong at the same time. A good solution is to create passphrases that are formed by a random group of words that don’t make any sense together, separated by spaces. One way to do this is to use the Diceware techique (this requires six-sided dice and the [http://world.std.com/~reinhold/dicewarewordlist.pdf Diceware word list] [PDF].&lt;br /&gt;
&lt;br /&gt;
By rolling the dice five times, we will come up with a five-digit number that corresponds to a word on the Diceware word list; this word is the first word of our passphrase. If we repeat this at least six times, we can create a strong passphrase formed by six words that together make a strong, random passphrase. It can be memorized just as we did when we had to learn poems by heart at school and will be so long that it would take an average of 3500 years to crack it with brute force at a speed of one trillion guesses per second. &lt;br /&gt;
To learn more about the Diceware technique, read [https://firstlook.org/theintercept/2015/03/26/passphrases-can-memorize-attackers-cant-guess this article] published by Micah Lee in The Intercept.&lt;br /&gt;
To learn more about two-factor authentication and security questions, read EFF's [https://ssd.eff.org/en/module/creating-strong-passwords &amp;quot;Creating Strong Passwords&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
==== Using a secure connection ====&lt;br /&gt;
&lt;br /&gt;
    Another very important measure we should take when going online, especially if we are transmitting personal data and passwords, is to always use a '''secure SSL connection''', which ensures that our data cannot be seen by anyone as they travel from our computer to the website we are visiting or to the service we are using. To do so, when we access a website we should type HTTPS instead of HTTP befor the url of the website we want to visitin. If we receive an error or the HTTPS is replaced by HTTP again, this means that the website is not offering a secure connection. To make sure that we always connect securely to websites when this option is offered, we can install '''HTTPS Everywhere''', a Firefox, Chrome, and Opera extension developed by the Electronic Frontier Foundation that encrypts our communications with many major websites: https://www.eff.org/https-everywhere&lt;br /&gt;
&lt;br /&gt;
    Likewise, when we create an account with an online service (e.g. our mailbox or a chat network) that we will access through a specific client or app, we should check the features of the service to make sure that it offers a secure connection and configure our clients accordingly by activating the '''TLS/SSL''' option.&lt;br /&gt;
&lt;br /&gt;
=== Anonymising your connections ===&lt;br /&gt;
&lt;br /&gt;
When browsing the internet through a normal internet connection, there are several ways in which we give away data about ourselves - our IP address (the number that identifies our connection), for example, or which websites we are visiting. There are also several ways to intercept our communications, especially if we are connecting via a free Wi-Fi spot.&lt;br /&gt;
&lt;br /&gt;
'''Virtual Private Networks (VPN: accessing the web through an encrypted tunnel'''&lt;br /&gt;
To add a layer of protection, we can access the internet through a virtual private network (VPN) - an encrypted tunnel that hides all services, protocols, and contents. Using a VPN is not difficult: it basically requires downloading a compressed file, extracting it and changing our computer’s connection settings, but it is important to choose a secure one – better if located abroad – because a compromised VPN server could be accessed by an intermediary who could then analyse all our activities. Autonomous servers Riseup – https://help.riseup.net/en/vpn – and Autistici/Inventati – https://vpn.autistici.org – both offer a reliable VPN. &lt;br /&gt;
&lt;br /&gt;
But we should consider that from a technical standpoint VPNs have some limitations: &lt;br /&gt;
'''An insecure connection is still insecure''': Although a VPN will anonymise our location and protect us from surveillance from our ISP, once our data is securely routed through the VPN server, it will go out on the internet as it normally would. This means we should still use TLS when available (ie. (HTTPS to browse websites, pop-ssl/imaps/smtp-tls for mail exchange, and so on). *EXPLANATION NEEDED ON TLS* &lt;br /&gt;
&lt;br /&gt;
'''VPNs are not a panacea''': although they accomplish a lot, they can’t fix everything. For example, they cannot increase our security if our computer is already compromised with viruses or spyware. If we give personal information to a website, there is little that a VPN can do to maintain our anonymity with that website or its partners. For more information, see Riseup’s webpage on VPN anonymity: https://help.riseup.net/en/vpn/security-issues. &lt;br /&gt;
&lt;br /&gt;
'''The connection might get slower''': the VPN routes all our traffic through an encrypted connection to the server before it goes out onto the normal internet. This extra step can slow things down.  For more information on VPNs, visit: https://securityinabox.org/en/guide/anonymity-and-circumvention &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Hiding your IP address using the Tor network'''&lt;br /&gt;
A key step to being anonymous online is to  hide your IP address.&lt;br /&gt;
On way to do this is to use a tool called Tor, an anonymity network that conceals both the location of our connection and what we do on the internet. By consistently using Tor, no one can link our IP (and therefore our alternative identity) to us, not even the mail server we use. For further information on how to use Tor, see  ??&lt;br /&gt;
&lt;br /&gt;
The Tor Browser (https://www.torproject.org/projects/torbrowser.html.en) is a software tool designed to increase the privacy and security of our Internet activities and habits. It masks our identity and our online browsing from many forms of internet surveillance. &lt;br /&gt;
&lt;br /&gt;
From the Tor Project: &lt;br /&gt;
&amp;quot;The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
The Tor Browser Bundle consists of the Tor software and a modified version of the Firefox web browser, which is designed to provide extra protection while using it. To stop scripts from running without us knowing and to force secure SSL connections whenever available, the browser bundle also includes NoScript and HTTPS-Everywhere add-ons. &lt;br /&gt;
&lt;br /&gt;
Tor protects our anonymity by routing communications through a distributed network of servers run by volunteers all over the world. Using Tor hides the sites we visit from potential onlookers, and hides our location/identity from those sites. The software is designed also to make sure servers in the Tor network don't know both our location and the sites we are visiting. &lt;br /&gt;
&lt;br /&gt;
Tor also takes steps to encrypt the communication to and through its network, but this measure cannot extend all the way to a website which is sending or receiving content over non-encrypted channels (i.e. not providing HTTPS access). Nevertheless, the advantage of using Tor when accessing such sites is that Tor can secure our communication up to the step between the last of the Tor servers and the non-secure site. This confines the chance to intercept the content to that last step. &lt;br /&gt;
&lt;br /&gt;
As with VPNs, there is a trade-off between anonymity and speed. Because Tor facilitates anonymous browsing by bouncing our traffic through volunteers’ computers and servers in various parts of the world, it will definitely be slower than using other web browsers on our computer. &lt;br /&gt;
&lt;br /&gt;
What we should remember when using the Tor Browser is that it makes us anonymous, but not private. Although our web requests are anonymous, if we are posting on Facebook or sending an email through Gmail, that activity is still identifiable as “us”. &lt;br /&gt;
&lt;br /&gt;
*NOT SURE WHAT TO DO ABOUT THIS SECTION - DOESN'T FIT HERE*&lt;br /&gt;
If we want to browse the web anonymously with more than one identity, we can do so by creating each time a new identity for our browser, so that a new set of random Tor proxy servers is selected and we appear to come from a new location to the web servers. To do this, we just need to click the onion icon in the upper left of our browser and to select “New identity” from the menu. The Tor Browser will briefly close, clearing our browsing history and cookies and then restart. After that, we can safely browse the internet with a different identity. &lt;br /&gt;
&lt;br /&gt;
For more information on Tor and instructions for Windows users, visit: https://securityinabox.org/en/guide/anonymity-and-circumvention &lt;br /&gt;
For instructions for Mac OSX users, visit: https://ssd.eff.org/en/module/how-use-tor-mac-os-x &lt;br /&gt;
&lt;br /&gt;
[SECTION ON EMAIL HOSTING - NOT SURE HOW THIS FITS IN HERE] &lt;br /&gt;
Also the choice of the mail server we use for our contact mail address is important. While there are several secure servers that offer a good service – e.g. the Swiss commercial service Kolab Now (https://kolabnow.com) and the autonomous servers Riseup (a site used by activists with a clear set of political principles: http://riseup.net) and Autistici/Inventati (https://www.autistici.org) – the main point is to find a service that offers a secure connection (HTTPS instead of HTTP) and that is compatible with our virtual persona. If, for instance, we are creating a fake identity that doesn’t know much about digital security, it may be better to use a more widespread service like Gmail, and the possibility of two-factor authentication is always a plus. If the mail address we are creating is connected to our work and hosted by our firm’s mail server with its own domain, it is a good idea not to include our surname in the address and to keep just the name followed by the domain (e.g. jane@businessname.com). Of course, if a mail address is required when registering a new mail account, we shouldn’t give our usual address and it is much better to use a disposable account for this purpose.&lt;br /&gt;
&lt;br /&gt;
=== Devices and Well being ===&lt;br /&gt;
A LOT OF THIS CAN BE CONDENSED AND DELETED.&lt;br /&gt;
REFERENCE THE LEVEL-UP RESOURCES!&lt;br /&gt;
&lt;br /&gt;
While working on computer, smart phones and other devices, we tend to forget our body. Our body freezes. Fingers, eyes and ears follow the rhythm of our clicks, scrolls and swipes. In almost motionless, staring at the screen, the user forgets the possibilities of movement, pause or improving posture and even is imposing on the body pains and discomforts. While some senses get paralyzed, our brain becomes intertwined with the machine: processing a lot of data and information, multi-tasking and executing creative, administrative challenges while managing our engagements and multiple identities... our neurological activity increases. There is a risk in becoming inseparable of our hardware technologies. Actually we can do almost everything with a machine: communicate, getting ourselves organized, informed, be entertained, play, have sex, ... To have a healthy relationship with our machines is hence a key for our well being. &lt;br /&gt;
“Around 2000, I made a video installation “Does Technology ever end or does it restart automatically?” it was the moment when there was fear that the machines' clock would crash on the number 2000 &amp;lt;Y2K problem, the Millennium bug&amp;gt;: display of dates and the automated ordering of dated records or real-time events would get twisted. The media media hysteria around the potential failure of our electronic and digital devices which were surrounding us, made me reset (reboot in another distro). In the ecstasy of integrating tech in my daily life, exploring avatars and audiovisual creation, design to communicate political struggles, my hand was hurting, and I couldn't click the mouse anymore. I had to change my daily routine, care about my body and cure myself. I couldn't hold my keys nor masturbate :), .. what was I going to do with my right hand.” &lt;br /&gt;
SHOW THE PAIN open mouth and lips as wide as possible simultaneously raising your eyebrows as high as possible, hold while counting to 5 repeat a few times &lt;br /&gt;
(A/ A,separation/séparation) (1) strategies of prevention SCHEDULE: Work out a regular pattern for your day, and stick to it. Your brain will relax a bit if it knows “what comes next”. Plan non-digital activities. &lt;br /&gt;
PROCESS: If you get an idea or think of something you need to do, write it down. Your brain is actually a bad early implementation of Calendar reminders, Email Notifications and Associative Tagging. Brain reminders aren’t timed, so they will pop up at the most inconvenient moments. By writing it down you literally tell your brain that it’s ok to let go of the thought. &lt;br /&gt;
WORKFLOW: Interrupt Driven Work is a hassle. You do some work from your todo, but mainly you keep getting interrupted by new email, IRC and instant messages and phonecalls. Ideally, turn off the immediate notification and just check your email/social media/IRC / … once or twice a day. &lt;br /&gt;
PROCESS: If you get an idea or think of something you need to do, write it down. Your brain is actually a bad early implementation of Calendar reminders, Email Notifications and Associative Tagging. Brain reminders aren’t timed, so they will pop up at the most inconvenient moments. By writing it down you literally tell your brain that it’s ok to let go of the thought. &lt;br /&gt;
CHARGING: Charge your devices in a place which is not easy reachable. Do some stretching while reaching them.Go a Bit Off the Grid and use alternative energies to charge your devices so we reinforce the relation between technology and nature. &lt;br /&gt;
DAYLIGHT: You need about to get some decent daylight (20-40 minutes daily) to reset your body clock. Sitting in front of the window and sunlight can be limiting your screen view. Going outside can increase your healthy look... you will look better on the screen after! The quality of light also influences your sleeping/dreaming. &lt;br /&gt;
SLEEPING: Let's not take our daemons and shells scripts into our state of dreaming. Not having your devices next to your bed works wonders for your sleep well and good morning rituals. &lt;br /&gt;
FOOD &amp;amp; DRINK: Water can safe plants! And if you drank to much, don't forget to go to the toilet once in a while. &lt;br /&gt;
(2) Exercises to disconnect &lt;br /&gt;
Create performative events for a human understanding of technology. Probably besides of becoming an icon or a symbol of a visual interface, I guess you have to be minimum 2 people: 0 en 1 to make the process into a social momentum. # Let's go analogue – physical.  ??&lt;br /&gt;
_ make props for all the hardware components in the computer &lt;br /&gt;
  (from cardboard, scrap, .. take your time to make them) &lt;br /&gt;
_ distribute props over the #actors, _ create a script to enact the process (scenario) &lt;br /&gt;
exemple scripts: Screensavers, sleep mode, hibernate, standby or off. In this performative event the switching on and shutting down of a computer is (re)enacted through a collective body. What is happening with our hardware and software when we go to sleep or other modi of existence. Link: &lt;br /&gt;
Home Is a Server In this performative event we install a webserver and understand about Wiki's and it's recepies on a virtual machine SSH? Doors to open, commands to learn to activate our space into a home while baking pancakes. Link: &lt;br /&gt;
Crypto Dance ! In this performative event security is at stake in a dance which introduces basic crypto like in bob and eve do a lambada. (need still to be developed by Hacking with care) &lt;br /&gt;
Strategies of care &lt;br /&gt;
Chair Strike installation at the Academy of fine Arts Vienna, PC-Lab, in the framework of Strike, she said, by GirlsOnHorses (Auer, Egermann, Straganz, Wieger). &lt;br /&gt;
By paying more attention to the body and ICT work experiences, 'WORKINGSTILLWORKING” developed a variety of micro-movements and creative habits, tactics, gestures and practices, consciously or unconsciously to break free from motionless postures, painful or stultifying. Together with HACKING WITH CARE, they published a zine: http://workingstill-stillworking.net/wp-content/uploads/2013/06/AttentionSomaticTheZine1.3.pdf, Attent!on som(t)a(c)tics: With the micro movements of our bodies when using our devices, we improvise and explore forms of embodied emancipation within a digital context. &lt;br /&gt;
describe your (intimate, pleasant, difficult or binding…) relationships with computers and propose ways of subjugating those routines. &lt;br /&gt;
http://hackingwithcare.in/wiki/doku.php/projects : Online Resources for psychological and physical well-being, health, self-care, caregiving, in general and in the specific contexts of activism and hacking. Material to explore and raise awareness on related political issues, among caregivers, hackers-who-care, and friends of a good fair world, with the purpose of inspiring alliances. Caring for one self can be a collective emancipatory process to produce a collective platform of liberating instructions, gestures, movement or poetry. &lt;br /&gt;
SOMATIC EXPLORATIONS AND LIBERATING EXCERSISES RE-EMBODYING RELATIONS TO OUR DAILY TECHNOLGIES: TRICKS OF SELF AWARENESS(3)(4)(5) ???strategies of curing ??? &lt;br /&gt;
We know adjustable chairs, but what about adjustable software to different cognitive capabilities. &lt;br /&gt;
disable auto-login check cognitive capacity Using short cuts Organize a Hands massage workshop Switch between commandline and graphical Interface … lalala, do do, reeeeeeee: Technology accelerates to find solutions of interfacing to the human body Technology can be used to persuade people into a behaviour change. We can change our behaviour in relation with technology. &lt;br /&gt;
State of inertia &amp;amp; Red Light Reflex Long hours hunched over your hardware can cause the muscles of the front of the body to contract while the body pulls inward. The Red Light reflex is a protective reflex found in all vertebrate animals and is a response to fear, anxiety, prolonged distress or negativity. Rounded shoulders, depressed chest and the head jutting forward can lead to chronic neck pain, jaw pain, hip pain, mid-back pain and shallow breathing. The inability to breathe deeply deprives your brain, blood and muscles of the oxygen they need to function properly. This in turn can cause fatigue, depression, anxiety, sleep problems and exacerbate allergies. &lt;br /&gt;
Repetitive Strain Injury (RSI) http://www.workrave.org/ Workrave is a program that assists in the recovery and prevention of Repetitive Strain Injury (RSI). The program frequently alerts you to take micro-pauses, rest breaks and restricts you to your daily limit. &lt;br /&gt;
(1) Annie Abrahams,separation/séparation http://collection.eliterature.org/2/works/abrahams_separation/separation/index.htm# (2) http://bluehackers.org/howto (3) http://workingstill-stillworking.net (4) Anne Goldenberg, Hacking with Care : Attention, bien-être et politique de l’ordinaire dans le milieu hacktiviste: http://dpi.studioxx.org/en/hacking-care-attention-bien-%C3%AAtre-et-politique-de-l%E2%80%99ordinaire-dans-le-milieu-hacktiviste (5) L'ERSE POSTURE https://www.youtube.com/watch?v=Va0ZLaZHQlU (6) http://networkcultures.org/blog/2007/04/23/linux-for-theatre-makers-embodiment-and-nix-modus-operandi/&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Step_0&amp;diff=1270</id>
		<title>Step 0</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Step_0&amp;diff=1270"/>
				<updated>2015-05-27T17:12:57Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: edited links&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
'''recommendations for the printed version: http://etherpad.calafou/p/securitydisclaimer'''&lt;br /&gt;
&lt;br /&gt;
== Before you start: mapping your data and devices; securing your data; anonymising your connections ==&lt;br /&gt;
&lt;br /&gt;
This section provides you with notions, methodologies and tools to take care of your data and devices and have those taking care of you. Data and devices management requires to reflect on their hosting and leaving qualities and in how we can configure those to not mess around with our well-being. This section It also explains how to engage into more secure communication practices when you get connected. All the following tips and tricks are pre-requisites to better understand how to manage identity on-line and creating safe spaces.&lt;br /&gt;
'''EDIT'''&lt;br /&gt;
&lt;br /&gt;
This section will cover the starting points: what data do you produce and store? Where? How do you make sure your data is secure? And when you're connecting to the internet, how do you anonymise your connections? &lt;br /&gt;
&lt;br /&gt;
It's also important to think about you relationship with your technology - how can we base this relationship in self care?&lt;br /&gt;
&lt;br /&gt;
=== Mapping your data ===&lt;br /&gt;
&lt;br /&gt;
Before becoming a zen user and developer of technologies, and adopting better privacy and digital security practices, it's important to first know what you want to protect. One way of doing this is to map (using a table, map, drawing, etc) your production and management of data. &lt;br /&gt;
&lt;br /&gt;
*What kind of data do you produce and or manage? With whom?&lt;br /&gt;
&lt;br /&gt;
To begin mapping your data, first make a list of the data you create yourself. This can include personal and work-related documents, emails, images, videos, designs, tweets, blog posts, and so on. Then make a list  of the data you manage or store, which is produced by others. This can encompass information given to you by your colleagues, friends, relatives to files you download from websites, repositories, p2p networks, etc. Finally, identify which type of data you share with others, for instance if you share a social media profile or email account with a family member, partner, or colleagues. &lt;br /&gt;
&lt;br /&gt;
'''Where is this data stored?''' &lt;br /&gt;
&lt;br /&gt;
*Which devices hold your data? &lt;br /&gt;
-This can include your computer, external drives, and phone. &lt;br /&gt;
&lt;br /&gt;
*Which online platforms host your data? &lt;br /&gt;
- This can include emails, social media accounts, etc. Also bear in mind that some applications enable syncing of data between your different devices, or between your devices and online platforms, and it's important to know where and when this is happening.  &lt;br /&gt;
&lt;br /&gt;
*How do you organise your data?&lt;br /&gt;
- Do you keep your personal/professional/activist data separate?&lt;br /&gt;
&lt;br /&gt;
*How sensitive is your data? &lt;br /&gt;
- For each type of data you have listed in your data map, what would happen if this particular data suddenly disappeared? For instance, if your email account is closed down, if your computer or external hard drive is stolen or breaks down, if you accidentally erase a folder, etc?. &lt;br /&gt;
- What would happen if this data were seen and copied by a third party? &lt;br /&gt;
&lt;br /&gt;
Do the same mapping exercise for the data you hold on others. &lt;br /&gt;
&lt;br /&gt;
Once you've answered thesE questions, you'll be better able to make decisions about which data you want to regularly back up, and where these backups will be stored. You will also be better able to decide what to do with your data when traveling - What type of data do you need with you? What is too sensitive? What can you easily access online?&lt;br /&gt;
&lt;br /&gt;
How do you build trust in relation to your data and how you store it? &lt;br /&gt;
???&lt;br /&gt;
&lt;br /&gt;
When doing so, ask yourself who has access to this device or media platform (your family, colleagues, friends, or servers administrators and you do not know&lt;br /&gt;
????&lt;br /&gt;
&lt;br /&gt;
* Syncing (online/offline – apps permissions)&lt;br /&gt;
????&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Securing your connections ===&lt;br /&gt;
&lt;br /&gt;
Once we've mapped our data, the next step is making sure it's secure. Especially where your data is stored online, good passwords are crucial. &lt;br /&gt;
&lt;br /&gt;
''' Creating and using strong passwords''' &lt;br /&gt;
&lt;br /&gt;
Managing passwords is also a crucial part of maintaining our information online. Using the same password over and over again is risky, as are passwords that connect us to our identit(ies). Since a password is only as secure as the least secure service where it has been used, it is good practice to maintain separate passwords for each of our accounts. For more information on the importance of strong passwords and how to store them, read Security in a Box's [https://securityinabox.org/en/guide/passwords%20 chapter on passwords]. &lt;br /&gt;
*Using a password manager&lt;br /&gt;
To keep multiple secure passwords, you can use a password manager. *KeePassX* is a cross-platform free and open-source password manager that is easy to use and creates files with passwords that can also be exported and used in other devices. It can generate random passwords and store them securely.  To learn how to use KeePassX, read this [https://securityinabox.org/en/guide/keepass/windows%20 how-to].&lt;br /&gt;
To learn how to use KeePassDroid, the correspondent tool for Android, read this [https://securityinabox.org/en/guide/keepassdroid/android how-to].&lt;br /&gt;
&lt;br /&gt;
*Creating strong passphrases using the diceware technique *&lt;br /&gt;
Some passwords — like the one we use to decrypt our KeePassX file or lock our devices —need to be easy to remember and strong at the same time. A good solution is to create passphrases that are formed by a random group of words that don’t make any sense together, separated by spaces. One way to do this is to use the Diceware techique (this requires six-sided dice and the [http://world.std.com/~reinhold/dicewarewordlist.pdf Diceware word list] [PDF].&lt;br /&gt;
&lt;br /&gt;
By rolling the dice five times, we will come up with a five-digit number that corresponds to a word on the Diceware word list; this word is the first word of our passphrase. If we repeat this at least six times, we can create a strong passphrase formed by six words that together make a strong, random passphrase. It can be memorized just as we did when we had to learn poems by heart at school and will be so long that it would take an average of 3500 years to crack it with brute force at a speed of one trillion guesses per second. &lt;br /&gt;
To learn more about the Diceware technique, read [https://firstlook.org/theintercept/2015/03/26/passphrases-can-memorize-attackers-cant-guess this article] published by Micah Lee in The Intercept.&lt;br /&gt;
To learn more about two-factor authentication and security questions, read EFF's [https://ssd.eff.org/en/module/creating-strong-passwords &amp;quot;Creating Strong Passwords&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
=== Anonymising your connections ===&lt;br /&gt;
&lt;br /&gt;
When browsing the internet through a normal internet connection, there are several ways in which we give away data about ourselves - our IP address (the number that identifies our connection), for example, or which websites we are visiting. There are also several ways to intercept our communications, especially if we are connecting via a free Wi-Fi spot.&lt;br /&gt;
&lt;br /&gt;
'''Virtual Private Networks (VPN: accessing the web through an encrypted tunnel'''&lt;br /&gt;
To add a layer of protection, we can access the internet through a virtual private network (VPN) - an encrypted tunnel that hides all services, protocols, and contents. Using a VPN is not difficult: it basically requires downloading a compressed file, extracting it and changing our computer’s connection settings, but it is important to choose a secure one – better if located abroad – because a compromised VPN server could be accessed by an intermediary who could then analyse all our activities. Autonomous servers Riseup – https://help.riseup.net/en/vpn – and Autistici/Inventati – https://vpn.autistici.org – both offer a reliable VPN. &lt;br /&gt;
&lt;br /&gt;
But we should consider that from a technical standpoint VPNs have some limitations: &lt;br /&gt;
'''An insecure connection is still insecure''': Although a VPN will anonymise our location and protect us from surveillance from our ISP, once our data is securely routed through the VPN server, it will go out on the internet as it normally would. This means we should still use TLS when available (ie. (HTTPS to browse websites, pop-ssl/imaps/smtp-tls for mail exchange, and so on). *EXPLANATION NEEDED ON TLS* &lt;br /&gt;
&lt;br /&gt;
'''VPNs are not a panacea''': although they accomplish a lot, they can’t fix everything. For example, they cannot increase our security if our computer is already compromised with viruses or spyware. If we give personal information to a website, there is little that a VPN can do to maintain our anonymity with that website or its partners. For more information, see Riseup’s webpage on VPN anonymity: https://help.riseup.net/en/vpn/security-issues. &lt;br /&gt;
&lt;br /&gt;
'''The connection might get slower''': the VPN routes all our traffic through an encrypted connection to the server before it goes out onto the normal internet. This extra step can slow things down.  For more information on VPNs, visit: https://securityinabox.org/en/guide/anonymity-and-circumvention &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Hiding your IP address using the Tor network'''&lt;br /&gt;
A key step to being anonymous online is to  hide your IP address.&lt;br /&gt;
On way to do this is to use a tool called Tor, an anonymity network that conceals both the location of our connection and what we do on the internet. By consistently using Tor, no one can link our IP (and therefore our alternative identity) to us, not even the mail server we use. For further information on how to use Tor, see  ??&lt;br /&gt;
&lt;br /&gt;
The Tor Browser (https://www.torproject.org/projects/torbrowser.html.en) is a software tool designed to increase the privacy and security of our Internet activities and habits. It masks our identity and our online browsing from many forms of internet surveillance. &lt;br /&gt;
&lt;br /&gt;
From the Tor Project: &lt;br /&gt;
&amp;quot;The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
The Tor Browser Bundle consists of the Tor software and a modified version of the Firefox web browser, which is designed to provide extra protection while using it. To stop scripts from running without us knowing and to force secure SSL connections whenever available, the browser bundle also includes NoScript and HTTPS-Everywhere add-ons. &lt;br /&gt;
&lt;br /&gt;
Tor protects our anonymity by routing communications through a distributed network of servers run by volunteers all over the world. Using Tor hides the sites we visit from potential onlookers, and hides our location/identity from those sites. The software is designed also to make sure servers in the Tor network don't know both our location and the sites we are visiting. &lt;br /&gt;
&lt;br /&gt;
Tor also takes steps to encrypt the communication to and through its network, but this measure cannot extend all the way to a website which is sending or receiving content over non-encrypted channels (i.e. not providing HTTPS access). Nevertheless, the advantage of using Tor when accessing such sites is that Tor can secure our communication up to the step between the last of the Tor servers and the non-secure site. This confines the chance to intercept the content to that last step. &lt;br /&gt;
&lt;br /&gt;
As with VPNs, there is a trade-off between anonymity and speed. Because Tor facilitates anonymous browsing by bouncing our traffic through volunteers’ computers and servers in various parts of the world, it will definitely be slower than using other web browsers on our computer. &lt;br /&gt;
&lt;br /&gt;
What we should remember when using the Tor Browser is that it makes us anonymous, but not private. Although our web requests are anonymous, if we are posting on Facebook or sending an email through Gmail, that activity is still identifiable as “us”. &lt;br /&gt;
&lt;br /&gt;
*NOT SURE WHAT TO DO ABOUT THIS SECTION - DOESN'T FIT HERE*&lt;br /&gt;
If we want to browse the web anonymously with more than one identity, we can do so by creating each time a new identity for our browser, so that a new set of random Tor proxy servers is selected and we appear to come from a new location to the web servers. To do this, we just need to click the onion icon in the upper left of our browser and to select “New identity” from the menu. The Tor Browser will briefly close, clearing our browsing history and cookies and then restart. After that, we can safely browse the internet with a different identity. &lt;br /&gt;
&lt;br /&gt;
For more information on Tor and instructions for Windows users, visit: https://securityinabox.org/en/guide/anonymity-and-circumvention &lt;br /&gt;
For instructions for Mac OSX users, visit: https://ssd.eff.org/en/module/how-use-tor-mac-os-x &lt;br /&gt;
&lt;br /&gt;
[SECTION ON EMAIL HOSTING - NOT SURE HOW THIS FITS IN HERE] &lt;br /&gt;
Also the choice of the mail server we use for our contact mail address is important. While there are several secure servers that offer a good service – e.g. the Swiss commercial service Kolab Now (https://kolabnow.com) and the autonomous servers Riseup (a site used by activists with a clear set of political principles: http://riseup.net) and Autistici/Inventati (https://www.autistici.org) – the main point is to find a service that offers a secure connection (HTTPS instead of HTTP) and that is compatible with our virtual persona. If, for instance, we are creating a fake identity that doesn’t know much about digital security, it may be better to use a more widespread service like Gmail, and the possibility of two-factor authentication is always a plus. If the mail address we are creating is connected to our work and hosted by our firm’s mail server with its own domain, it is a good idea not to include our surname in the address and to keep just the name followed by the domain (e.g. jane@businessname.com). Of course, if a mail address is required when registering a new mail account, we shouldn’t give our usual address and it is much better to use a disposable account for this purpose.&lt;br /&gt;
&lt;br /&gt;
=== Devices and Well being ===&lt;br /&gt;
A LOT OF THIS CAN BE CONDENSED AND DELETED.&lt;br /&gt;
REFERENCE THE LEVEL-UP RESOURCES!&lt;br /&gt;
&lt;br /&gt;
While working on computer, smart phones and other devices, we tend to forget our body. Our body freezes. Fingers, eyes and ears follow the rhythm of our clicks, scrolls and swipes. In almost motionless, staring at the screen, the user forgets the possibilities of movement, pause or improving posture and even is imposing on the body pains and discomforts. While some senses get paralyzed, our brain becomes intertwined with the machine: processing a lot of data and information, multi-tasking and executing creative, administrative challenges while managing our engagements and multiple identities... our neurological activity increases. There is a risk in becoming inseparable of our hardware technologies. Actually we can do almost everything with a machine: communicate, getting ourselves organized, informed, be entertained, play, have sex, ... To have a healthy relationship with our machines is hence a key for our well being. &lt;br /&gt;
“Around 2000, I made a video installation “Does Technology ever end or does it restart automatically?” it was the moment when there was fear that the machines' clock would crash on the number 2000 &amp;lt;Y2K problem, the Millennium bug&amp;gt;: display of dates and the automated ordering of dated records or real-time events would get twisted. The media media hysteria around the potential failure of our electronic and digital devices which were surrounding us, made me reset (reboot in another distro). In the ecstasy of integrating tech in my daily life, exploring avatars and audiovisual creation, design to communicate political struggles, my hand was hurting, and I couldn't click the mouse anymore. I had to change my daily routine, care about my body and cure myself. I couldn't hold my keys nor masturbate :), .. what was I going to do with my right hand.” &lt;br /&gt;
SHOW THE PAIN open mouth and lips as wide as possible simultaneously raising your eyebrows as high as possible, hold while counting to 5 repeat a few times &lt;br /&gt;
(A/ A,separation/séparation) (1) strategies of prevention SCHEDULE: Work out a regular pattern for your day, and stick to it. Your brain will relax a bit if it knows “what comes next”. Plan non-digital activities. &lt;br /&gt;
PROCESS: If you get an idea or think of something you need to do, write it down. Your brain is actually a bad early implementation of Calendar reminders, Email Notifications and Associative Tagging. Brain reminders aren’t timed, so they will pop up at the most inconvenient moments. By writing it down you literally tell your brain that it’s ok to let go of the thought. &lt;br /&gt;
WORKFLOW: Interrupt Driven Work is a hassle. You do some work from your todo, but mainly you keep getting interrupted by new email, IRC and instant messages and phonecalls. Ideally, turn off the immediate notification and just check your email/social media/IRC / … once or twice a day. &lt;br /&gt;
PROCESS: If you get an idea or think of something you need to do, write it down. Your brain is actually a bad early implementation of Calendar reminders, Email Notifications and Associative Tagging. Brain reminders aren’t timed, so they will pop up at the most inconvenient moments. By writing it down you literally tell your brain that it’s ok to let go of the thought. &lt;br /&gt;
CHARGING: Charge your devices in a place which is not easy reachable. Do some stretching while reaching them.Go a Bit Off the Grid and use alternative energies to charge your devices so we reinforce the relation between technology and nature. &lt;br /&gt;
DAYLIGHT: You need about to get some decent daylight (20-40 minutes daily) to reset your body clock. Sitting in front of the window and sunlight can be limiting your screen view. Going outside can increase your healthy look... you will look better on the screen after! The quality of light also influences your sleeping/dreaming. &lt;br /&gt;
SLEEPING: Let's not take our daemons and shells scripts into our state of dreaming. Not having your devices next to your bed works wonders for your sleep well and good morning rituals. &lt;br /&gt;
FOOD &amp;amp; DRINK: Water can safe plants! And if you drank to much, don't forget to go to the toilet once in a while. &lt;br /&gt;
(2) Exercises to disconnect &lt;br /&gt;
Create performative events for a human understanding of technology. Probably besides of becoming an icon or a symbol of a visual interface, I guess you have to be minimum 2 people: 0 en 1 to make the process into a social momentum. # Let's go analogue – physical.  ??&lt;br /&gt;
_ make props for all the hardware components in the computer &lt;br /&gt;
  (from cardboard, scrap, .. take your time to make them) &lt;br /&gt;
_ distribute props over the #actors, _ create a script to enact the process (scenario) &lt;br /&gt;
exemple scripts: Screensavers, sleep mode, hibernate, standby or off. In this performative event the switching on and shutting down of a computer is (re)enacted through a collective body. What is happening with our hardware and software when we go to sleep or other modi of existence. Link: &lt;br /&gt;
Home Is a Server In this performative event we install a webserver and understand about Wiki's and it's recepies on a virtual machine SSH? Doors to open, commands to learn to activate our space into a home while baking pancakes. Link: &lt;br /&gt;
Crypto Dance ! In this performative event security is at stake in a dance which introduces basic crypto like in bob and eve do a lambada. (need still to be developed by Hacking with care) &lt;br /&gt;
Strategies of care &lt;br /&gt;
Chair Strike installation at the Academy of fine Arts Vienna, PC-Lab, in the framework of Strike, she said, by GirlsOnHorses (Auer, Egermann, Straganz, Wieger). &lt;br /&gt;
By paying more attention to the body and ICT work experiences, 'WORKINGSTILLWORKING” developed a variety of micro-movements and creative habits, tactics, gestures and practices, consciously or unconsciously to break free from motionless postures, painful or stultifying. Together with HACKING WITH CARE, they published a zine: http://workingstill-stillworking.net/wp-content/uploads/2013/06/AttentionSomaticTheZine1.3.pdf, Attent!on som(t)a(c)tics: With the micro movements of our bodies when using our devices, we improvise and explore forms of embodied emancipation within a digital context. &lt;br /&gt;
describe your (intimate, pleasant, difficult or binding…) relationships with computers and propose ways of subjugating those routines. &lt;br /&gt;
http://hackingwithcare.in/wiki/doku.php/projects : Online Resources for psychological and physical well-being, health, self-care, caregiving, in general and in the specific contexts of activism and hacking. Material to explore and raise awareness on related political issues, among caregivers, hackers-who-care, and friends of a good fair world, with the purpose of inspiring alliances. Caring for one self can be a collective emancipatory process to produce a collective platform of liberating instructions, gestures, movement or poetry. &lt;br /&gt;
SOMATIC EXPLORATIONS AND LIBERATING EXCERSISES RE-EMBODYING RELATIONS TO OUR DAILY TECHNOLGIES: TRICKS OF SELF AWARENESS(3)(4)(5) ???strategies of curing ??? &lt;br /&gt;
We know adjustable chairs, but what about adjustable software to different cognitive capabilities. &lt;br /&gt;
disable auto-login check cognitive capacity Using short cuts Organize a Hands massage workshop Switch between commandline and graphical Interface … lalala, do do, reeeeeeee: Technology accelerates to find solutions of interfacing to the human body Technology can be used to persuade people into a behaviour change. We can change our behaviour in relation with technology. &lt;br /&gt;
State of inertia &amp;amp; Red Light Reflex Long hours hunched over your hardware can cause the muscles of the front of the body to contract while the body pulls inward. The Red Light reflex is a protective reflex found in all vertebrate animals and is a response to fear, anxiety, prolonged distress or negativity. Rounded shoulders, depressed chest and the head jutting forward can lead to chronic neck pain, jaw pain, hip pain, mid-back pain and shallow breathing. The inability to breathe deeply deprives your brain, blood and muscles of the oxygen they need to function properly. This in turn can cause fatigue, depression, anxiety, sleep problems and exacerbate allergies. &lt;br /&gt;
Repetitive Strain Injury (RSI) http://www.workrave.org/ Workrave is a program that assists in the recovery and prevention of Repetitive Strain Injury (RSI). The program frequently alerts you to take micro-pauses, rest breaks and restricts you to your daily limit. &lt;br /&gt;
(1) Annie Abrahams,separation/séparation http://collection.eliterature.org/2/works/abrahams_separation/separation/index.htm# (2) http://bluehackers.org/howto (3) http://workingstill-stillworking.net (4) Anne Goldenberg, Hacking with Care : Attention, bien-être et politique de l’ordinaire dans le milieu hacktiviste: http://dpi.studioxx.org/en/hacking-care-attention-bien-%C3%AAtre-et-politique-de-l%E2%80%99ordinaire-dans-le-milieu-hacktiviste (5) L'ERSE POSTURE https://www.youtube.com/watch?v=Va0ZLaZHQlU (6) http://networkcultures.org/blog/2007/04/23/linux-for-theatre-makers-embodiment-and-nix-modus-operandi/&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Step_2&amp;diff=1262</id>
		<title>Step 2</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Step_2&amp;diff=1262"/>
				<updated>2015-05-27T15:35:32Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: changed pads title&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===='''What are Safe Spaces?'''====&lt;br /&gt;
Safe spaces can be understood as spaces that are created to share common values, whether explicit, through a community agreement, or implicit through the sharing of values. They enable members of a group to flourish, empower themselves and create community. Safe spaces have provided a safe environment for discussion and awareness raising in the women's liberation movement in the 60s and 70s. Safe spaces are also about pushing boundaries and confronting certain difficult issues among a group of people such as: Who can be part of a women's only group? And who can be defined as a woman? As these are important questions to be addressed, they need reflection, trust and the understanding of where our own assumptions come from. &lt;br /&gt;
&lt;br /&gt;
Safe space strategies have been used in many different contexts in recent times too. In Tahrir Square in Egypt, Operation Anti Sexual Harassment (OpAntiSH) was set up to react to an unsafe environment and as a way to protect women and/or confront harassers and support survivors of sexual abuse and harassment. In Kenya, the women-only Umoja village was created for women survivors of rape and sexual assaults, as a place where they could feel safe and secure, raise their kids, earn a living collectively, heal and reclaim their dignity. During the USA Occupy movements many women, queer and trans* persons did not feel safe to camp in the squares and parks. Some resorted to women-only tents, or women of colour-only affinity groups while others, mostly transwomen, opted for an online presence as putting their bodies on the line was deemed too dangerous.&lt;br /&gt;
&lt;br /&gt;
===='''Safe Space Online?'''==== &lt;br /&gt;
&lt;br /&gt;
The internet is experienced by many as a safe space for resisting the gender oppression that they encounter in their everyday life. Fereshteh Nouraie-Simone talks about the internet as [https://books.google.es/books?id=exM4bIzF5IoC&amp;amp;pg=PA62&amp;amp;lpg=PA62&amp;amp;dq=Wings+of+Freedom+for+Iranian+women&amp;amp;source=bl&amp;amp;ots=tQgAni6g_K&amp;amp;sig=_VxBUJw6TbywQqeD7zw7YmSW_j4&amp;amp;hl=es&amp;amp;sa=X&amp;amp;ei=qiZkVfG0M4Tn7gaR0ICQBQ&amp;amp;ved=0CCcQ6AEwAA#v=onepage&amp;amp;q=Wings%20of%20Freedom%20for%20Iranian%20women&amp;amp;f=false Wings of Freedom] for Iranian women.  Scholar [http://www.saskiasassen.com/PDFs/publications/Towards-a-Sociology-of-Information-Technology.pdf Saskia Sassen] argues that the internet allows women and trans* persons to be involved in new forms of contestations, build global community and potentially transform conditions on the ground.  However, at the same time many women and trans* people experience severe forms of violence and silencing online. There are countless stories now of women and trans* people facing harassment, threats and smear campaigns by anyone from a misogynist or transphobic reader of their blog to a state-sponsored attacker trying to hinder their advocacy work. See [https://www.takebackthetech.net/mapit/ Take Back the Tech] for an up-to-date list of reports.  &lt;br /&gt;
&lt;br /&gt;
Morever, we might assume that online communities such as the ones we take part in through social media, email discussion lists, phones and Internet Relay Chat (IRC) channels are inherently democratic, horizontal, participatory and relatively safe. This is not true. Online spaces often reproduce hierarchies, privileges and power relations that exist in society. We need to be mindful of this and to think through ways to mitigate and limit these downsides to get the best out of our spaces. Using such strategies is about caring for ourselves and for the communities we are part of. Making these issues explicit and visible is also about agency, social justice and feminism, and it will help better shape the spaces we care about, we organize in and in which we grow. &lt;br /&gt;
&lt;br /&gt;
This step aims to provide concrete suggestions on how to create safe spaces online and offline. It is divided into three core parts. First, a set of tools will be highlighted to move forward with starting to build safe spaces for us and our collectives/organizations through online communication such as mailing lists, pads, Internet Relay Chat (IRC), etc. Second, it will focus on strategies of resistance in public spaces which are not inherently safe, such as Twitter and Wikipedia. Finally it will loop back to the offline and discuss ways to build safe spaces offline such as through women and trans* only spaces to learn and Do-it-Together.&lt;br /&gt;
&lt;br /&gt;
===='''How to set up a Safe Space Mailing list'''====&lt;br /&gt;
&lt;br /&gt;
Mailing lists are one of the oldest forms of social networks. They allow you to discuss, organise, share information, exchange video, audio and pictures. The below section will help you in the steps to setting up a safe space mailing list. &lt;br /&gt;
&lt;br /&gt;
====='''Choosing a mailing list'''=====&lt;br /&gt;
&lt;br /&gt;
You have decided that you need a communication channel for your collective and you do not want to use corporate services. There are in fact many alternative services to choose from that are recommended for use by human rights defenders. They are free but they still prioritise security and user privacy. For example: Riseup, Aktivix or Autistici/Inventati (A/I Collective). &lt;br /&gt;
&lt;br /&gt;
Riseup is a tech collective which provides secure communication tools for people working on liberatory social change.  They have many feminist and queer oriented lists and therefore are a great collective to host your mailing list. To see some of the existing public mailing lists go to:  https://lists.riseup.net/www/ .&lt;br /&gt;
&lt;br /&gt;
Other tech collectives also offer mailing-lists and email addresses. Autistici/Inventati (A/I Collective) and Aktivix are two other great examples, and the former also offers a dedicated newsletter service for groups that want to send regular news to a high number of recipients. To read about their services visit:  http://www.autistici.org/en/services/lists.html and/or https://lists.aktivix.org/mailman/listinfo&lt;br /&gt;
&lt;br /&gt;
====='''Open or closed list?'''===== &lt;br /&gt;
&lt;br /&gt;
Once you are ready to create your mailing list you need to decide whether it will be an open or closed list. An open list allows anyone to subscribe and participate in the discussion. A closed list is limited to the subscribed email addresses that will have been approved by you or your collective. In deciding what is best, check if choosing to keep a list open to new subscriptions automatically implies that the archives of the list are available to anyone on the web and will eventually end up on search engines (such as Google). In some cases, the archives of a closed list are only accessible to those who have the subscription password while the archives of a closed list can be accessed by everybody. In other cases, as A/I's platform (which is unfortunately much more complex to use) you can choose whether you keep the archives public or not independently of your choice to keep your list open to new subscriptions.&lt;br /&gt;
If you intend to talk about sensitive issues (talking about feminism is often a sensitive issue!) or if trust within the group is important for creating your safe space, you might want to set up a closed list and to keep your archives closed. If you do choose to leave your archives accessible, it is important to inform everyone subscribed to the list that any delicate topic or personal detail that pops up in your discussions will be potentially visible to anybody.&lt;br /&gt;
&lt;br /&gt;
====='''Publicizing your list or keeping it secret?'''=====&lt;br /&gt;
&lt;br /&gt;
A list becomes really public when it is advertised to the world and anyone can request subscription. For example [http://femtechnet.newschool.edu/mailman/listinfo/femtechnet the mailing list] run by FemTechNet. But a list mustn't be necessarily publicized and can be run on a need-to-know basis. In other words, you can choose not to advertise your list publicly and to keep it invitation-only. You could have for instance a publicized list which is closed i.e. a list that people know about (literally everyone!), but which requires approval as mentioned above.&lt;br /&gt;
&lt;br /&gt;
====='''Who should I invite?'''===== &lt;br /&gt;
&lt;br /&gt;
Once you have your list set up, start inviting people you know to your mailing list. If friends are suggesting to add more people to the list, ask them to explain to the list the reasons why such and such person should be added. If you get a green light from your collective, add this person to your mailing list. Working through the web of trust is a good practice to follow when setting up a mailing list. Also, make sure you have a discussion on who can be part of this list. If you set up a feminist list, who can be part of this list? Do you for instance allow feminist men to be part of the list? If so, will you be setting up a policy for your list on the acceptable behavior? (See below for how to set up a policy) These are important questions that you need to discuss with your group. But don’t be too harsh on yourself and your group and know that you can always revisit these decisions if at some point you and your collective feel you want to change your collective mailing list agreement.&lt;br /&gt;
 &lt;br /&gt;
====='''Who will administer the list?'''=====&lt;br /&gt;
&lt;br /&gt;
Administering the list involves handling subscriptions and moderating content. One person can be responsible for doing it but if your list suddenly becomes very chatty, this might be too demanding for just one person to do.  You can also choose to have more than one administrator of the list. A list can even be collectively managed. As a case in point, the Spoon Collective, a discussion list active in the 90s, adopted a strategy of central collective &amp;quot;ownership&amp;quot;.  Everyone on the list had administration rights and so the responsibility of managing the list could be shared amongst members. This is a strategy that can be best used when you are part of a close collective. It also requires trust that all members will care enough to manage it collectively. &lt;br /&gt;
&lt;br /&gt;
Before trying to figure out what best suits you, you should think about internet access and expectations from list members. Depending on where you are located, some people on the list might not have regular access to the internet and this needs to be factored in when taking the decision. Some tensions will inevitably arise from the collective administering process and therefore you and your collective need to think carefully about the ways in which you will handle these tensions. Are we ready to wait for a few days to have new members added to the list? If each message needs admin approval, are we ready to accept waiting for the message to be approved for a few days, a week, more? Since administering a list is a great way to learn, is it only those who are tech savvy that might manage it or should we rather allow for learning to happen? If your expectations are clear, the possibility for tensions and conflicts to emerge will be minimized.&lt;br /&gt;
&lt;br /&gt;
====='''Mailing list policies'''=====&lt;br /&gt;
&lt;br /&gt;
Agreeing on a mailing list policy from the start will save you a lot of time and difficult conversations. Publishing your policy and the ways in which to report violations of the policy, even if it is a closed list, might be helpful in creating the online safe space you want everyone to enjoy. The policy can provide guidelines for everyone using the list, on how to behave. It can address tensions like the fact that expression of emotion is an important feminist principle, but losing your temper and attacking someone you don't agree with on the list is not ok. &lt;br /&gt;
&lt;br /&gt;
Having a visible and explicit policy will send a strong signal of the value of creating a safe space on a mailing list. The geekfeminism wiki is a great example of a women-only policy for online communities (http://geekfeminism.wikia.com/wiki/Statement_of_purpose/Women-only_communities). They also have a similar policy or agreement for online communities that includes men: http://geekfeminism.wikia.com/wiki/Statement_of_purpose:_communities_including_men   Check them out and adapt them to your needs, beliefs and desires. &lt;br /&gt;
&lt;br /&gt;
To make sure that the policy does not get forgotten, you can regularly remind the subscribers. The Ada Initiative (https://adainitiative.org/) mailing list, for example, adds a link to each email sent on the list. Below is what you see:&lt;br /&gt;
 &lt;br /&gt;
''Policies for behavior on this list: http://geekfeminism.wikia.com/wiki/Statement_of_purpose/Women-only_communities&lt;br /&gt;
http://sf.adacamp.org/attendee-information/policies/#ahp&lt;br /&gt;
Contact Adacamp-alumni-owner@lists.adainitiative.org to report violations&lt;br /&gt;
Please avoid gendered assumptions and language about the list as a whole (eg &amp;quot;XX&amp;quot;, &amp;quot;ovaries&amp;quot;, &amp;quot;ladies&amp;quot;)&lt;br /&gt;
To unsubscribe, go to:&lt;br /&gt;
http://lists.adainitiative.org/listinfo.cgi/adacamp-alumni-adainitiative.org''&lt;br /&gt;
&lt;br /&gt;
====='''Encrypting mailing lists'''=====&lt;br /&gt;
&lt;br /&gt;
If you want a high level of security, there is the possibility of encrypting mailing lists. However, it is important to understand that this requires every participants to the list to already use PGP (Pretty Good Privacy)/GPG. This type of list, based on a software named Schleuder and developed by the German Tech Collective Nadir.org, is designed to serve as a tool for group communication, but this time with a strong emphasis on security. Schleuder list is a GPG-enabled mailing list and the list takes care of all de- and encryption among others. If you and your group feel you are able to install software in a server or can ask help from your community and you are all ready to use an encrypted mailing list, visit: http://schleuder2.nadir.org/&lt;br /&gt;
&lt;br /&gt;
===='''What is an etherpad?'''====&lt;br /&gt;
&lt;br /&gt;
Pads are a great way to collaborate in real-time on documents.  They are a good alternative to corporate services like Google Docs and more effective for co-editing text than mailing back and forth.  The main thing you need to look for in a pad is that it is hosted with an encrypted connection via SSL. A list of such pads can be found [https://github.com/ether/etherpad-lite/wiki/Sites-that-run-Etherpad-Lite here]. &lt;br /&gt;
&lt;br /&gt;
When you create a pad you decide on the name of the URL. Just like with creating passwords, you should make it long and inventive. For example: https://pad.riseup.net/p/feminists is not secure. You want to use a more complicated URL such as https://pad.riseup.net/p/FeministsRockAndTheyWillBeDoingGreatThingsToghether.  Once the pad is created you can send the URL to your friends and colleagues to start collaborating on a document. Remember whoever has the URL can access the pad, so don't share it in public spaces. &lt;br /&gt;
&lt;br /&gt;
Pads allow you to choose to be anonymous, use a moniker or use your real name. There is a colour-based system that differentiates the contributions of each participants on the pad, so being anonymous will not bring too much confusion while writing. If are worried about your pad being found by others, you might consider a password protected pad. For this check out: https://www.protectedtext.com/&lt;br /&gt;
&lt;br /&gt;
===='''What is Internet Relay Chat (IRC)?'''====&lt;br /&gt;
&lt;br /&gt;
IRC is a chat service, which can be hosted on different servers, and accessed from through different user clients. It provides the ability to set up channels or chatrooms where many people can discuss and gives you the option to encrypt your communication. You can’t embed video, audio or pictures, but you can link to them. &lt;br /&gt;
&lt;br /&gt;
IRC can be used to facilitate collaboration in addition to decision-making processes. If you are thinking about starting a new project, are launching a campaign or just want to have a space for your group to ask each other questions, you can consider using IRC. IRC allows for real-time collaboration as long as you all have easy access to the Internet and can arrange your schedules to be available at the same time. If your group has individuals working from different timezones or from places where power outages regularly occur or some of you regularly get pulled away to look after kids or parents, a mailing list might be better for reaching decisions collectively. &lt;br /&gt;
&lt;br /&gt;
IRC can take a little time to get used depending on the skills in your group. Regardless of your skills, developing relationships across a purely text-based channel such as IRC can be challenging. Try to be sensitive to how language can be interpreted and different styles of communication that exist between different people. You can always think of ways to overcome this challenge with your group. For example structuring introductions when you first start out, sharing links to articles, chatting about random news in your country or trying to develop a shared language. &lt;br /&gt;
&lt;br /&gt;
====='''Setting up IRC'''=====&lt;br /&gt;
&lt;br /&gt;
There are several ways to chat through an IRC network. The easiest way to start out is to use a web browser application such as those provided by [https://irc.indymedia.nl/ Indymedia] or [https://webchat.freenode.net/ Freenode]. You can instantly create a nickname and a channel which you can give to your colleagues to connect with you. &lt;br /&gt;
&lt;br /&gt;
Using a web application is however not the most secure option so if you are a more advanced user, or have already tested IRC out and think it will work for you, it is recommended you access your chosen IRC network from a client. There is advice and instructions on how to access an IRC network this way, provided by [https://freenode.net/using_the_network.shtml Freenode], [https://www.autistici.org/en/stuff/man_irc Autistici] and [http://docs.indymedia.org/view/Sysadmin/IrcHowTo Indymedia]. The last two also allow us to anonymise our connections through Tor.&lt;br /&gt;
&lt;br /&gt;
There are several clients which you can choose from. For example Xchat for GNULinux and Windows and XChat Aqua/Azure for Mac OS, and many more. For more information on IRC chat clients, look at the [https://prism-break.org/en/protocols/irc/ Prism-Break web platform], a site that has been developed after the Snowden revelations which supports you to opt out of mass surveillance programs.&lt;br /&gt;
&lt;br /&gt;
====='''Basic rules of engagement'''=====&lt;br /&gt;
&lt;br /&gt;
Once you start your meeting it is useful to appoint a facilitator that will keep track of time and topics to be discussed and who might ask participants to re-focus if the discussion goes off track.  When you start a conversation take time to say hi and greet people. It is particularly important to talk to newcomers. If a group of you know each other over IRC, you might have a tendency to chat to one another and/or give more importance to what your friends say. In order to create a welcoming environment and a safe space, acknowledging and valuing the voice of everyone will be key on IRC.&lt;br /&gt;
&lt;br /&gt;
While continuing the discussion, let's remind ourselves that writing is not easy for everyone and/or that many might not be using their mother tongue. IRC can also go very fast, particularly if you are many in the discussion, so allowing everyone to slow down and let people read all the inputs can help to facilitate an empowering discussion.  You might for instance decide that people should be given turns to speak in order to ensure that everyone has space to express themselves. You can simply assign turns in alphabetical order of nicknames (or any order you want to give) for each of the points addressed. This can help structure the conversation and stop one or a small group of people dominating the conversation. It can also be useful to end your conversation with “over” or “finish” or &amp;quot;done&amp;quot; so everyone knows when you have stopped speaking and because IRC meetings can be tiring, you can set a time limit beforehand. Whichever methods you choose to use, make them visible and explicit beforehand, in the email where you will be inviting people for the IRC meeting for example.&lt;br /&gt;
&lt;br /&gt;
==== '''Tools for managing projects and groups: wikis, forums and Crabgrass''' ====&lt;br /&gt;
&lt;br /&gt;
Chat services and mailing lists will only take you so far. When it comes to managing collaboration between people living in different places, you will probably find yourself looking for something with more functionality. &lt;br /&gt;
&lt;br /&gt;
One of the oldest tools used for public discussions online is '''internet forums''',  where discussions can be hosted over time and are at least temporarily archived. What really distinguishes a forum from a mailing list or IRC chat is that it has a tree-like structure and can contain a number of sub discussions, each with a different topic.&lt;br /&gt;
&lt;br /&gt;
If you are looking for a tool to collaboratively write a text with many sections or even to create the initial structure and content for a website, a '''wiki''' can be useful. This is a web application that allows for hierarchical structuring of content and tracks the edits and additions of the users, easily allowing you to revert changes, move around and delete content. &lt;br /&gt;
&lt;br /&gt;
Both forums and wikis need to be installed in a web space, so will require the expertise of a website manager. However you will find these tools, together with many others, in one of the most versatile platforms for managing groups and collective projects, [https://we.riseup.net/crabgrass/about Crabgrass]. Crabgrass is hosted by the autonomous server '''Riseup''', [https://we.riseup.net/ we.riseup.net], the tech collective providing tools for activists, already mentioned above. &lt;br /&gt;
&lt;br /&gt;
Crabgrass provides a secure HTTPS connection and encrypted data storage, and users and groups are free to choose which information they reveal about themselves. The offered tools include functionality for personal messaging, public or private forums, wikis, task lists, decision-making tools, and a system for uploading and managing images, audio, and documents. It is also possible to set up a customized public homepage where your group can publish your event calendar, blog posts, and other content. For more about how to use Crabgrass, read this [https://info.securityinabox.org/default/communities/01/crabgrass-online-collaboration how-to] in Tactical Tech's Security in-a-box&lt;br /&gt;
&lt;br /&gt;
Finally you can visit the [[Step_1#Alternative_social_networks|alternative social networks section]] in this manual if you want to use social networking platforms other than the dominant ones.&lt;br /&gt;
&lt;br /&gt;
=== Strategies for creating safe spaces in the public sphere ===&lt;br /&gt;
&lt;br /&gt;
There are ways to counter the vulnerability and intimidation we might feel online. This can be achieved by caring for our personal and collective safety, through using security and privacy enabling tools and techniques. This can also be achieved by resistance. Organising online collective actions can be a very powerful exercise to resist what can be an unsafe environment. They can also bring attention and visibility to certain issues and in turn help bring about transformation. Using feminist counterspeech, storming Wikipedia collectively and swarming together can all be important acts that have an impact for you and your group at the discursive (written), psychological and material levels. And they are fun too! Mostly because they are creative, bring about individual and collective agency and the feeling that you are not alone. &lt;br /&gt;
&lt;br /&gt;
====='''Feminist Counterspeech'''===== &lt;br /&gt;
&lt;br /&gt;
Feminist counterspeech has been used as a responses to making sexism visible online, as a response to online attacks and harrassment, among others. Other forms of resistance include organized public shaming, advocacy and lobbying for public policies, etc. Feminist counterspeech can be an effective tactic to trigger a new narrative online, create a sense of belonging and make visible the effectiveness of collective feminist actions online. Feminist counterspeech is a form of discursive resistance that allows you to call out misogyny and sexism online and makes visible both weak and strong feminist networks online. There are many examples of these which you have probably seen and appreciated. For example the #yesallwomen hashtag which was created as a response to the #notallmen hashtag on Twitter and was used to document women's stories of harassment and abuse. Or the rapid and distributed sharing and uploading of the artist Rupi Kuar's photo showing menstrual blood, in response to the image-sharing tool Instagram censoring it. &lt;br /&gt;
&lt;br /&gt;
======'''Wikipedia?'''======&lt;br /&gt;
&lt;br /&gt;
Feminists have criticised the way in which knowledge is produced, made and constructed on Wikipedia. The fact that Wikipedia’s contributors are mostly male (about 10% are women though this can vary between countries) in their twenties and thirties and disproportionately Western are important factors that influence content. Women who have played a significant role in history are often missing from Wikipedia and, at times, feminist, queer and trans content are not always easily accepted on the online encyclopedia. A notable example relates to an entry about Chelsea Manning, the United States Army soldier who was convicted in July 2013 of violations of the USA Espionage Act after releasing the largest set of classified documents to WikiLeaks. When Manning formally announced her gender transition, the English Wikipedia entry under her name was quickly amended to reflect this change. A week after intense discussions regarding this amendment took place, where a majority of Wikipedians disregarded experts on transgendered issues, the article was reverted back to Bradley Manning. The article has since then returned to Chelsea Manning (at least in the English language).&lt;br /&gt;
&lt;br /&gt;
====== Wikistorming ======&lt;br /&gt;
Storming Wikipedia or organising an Edit-a-thon is a tactic to respond to the lack of women, feminist, queer and trans* content on Wikipedia. These empower participants to learn collectively how to edit Wikipedia and to change content to better reflect their communities and histories. Learning to edit Wikipedia can seem daunting so collectively editing and creating pages about trans*, women and queers is a great way to confront fears, add feminist, queer and trans content on the online encyclopedia and Do-It-With-Others (DIWO) in a safe space.&lt;br /&gt;
&lt;br /&gt;
======'''How to organise a Wikistorming'''======&lt;br /&gt;
&lt;br /&gt;
There are always great reasons to organise a wikistorming on any day! However, if you are looking for broader impact and be connected to others such gatherings often happen on these two days: [http://findingada.com/about/faq/ Ada Lovelace Day] in mid-October and March 8 International Women's Day. Once you have decided on a date, gather a group of friends and friends of friends who want to learn or already know how to edit Wikipedia and identify a safe space where to hold the event. It can be held in someone’s home, in a community centre, at an art centre or at a community organisation. Make sure you find a place that is accessible and ideally that already has a feminist base. Wikistorming may last for a day or half a day.  Before the wikistorming or as part of it, decide which Wikipedia entries you want create or which existing page you want to edit. Be realistic in your goals and don't put too many edits on your plate! To edit Wikipedia carefully it takes time. If you want to organise a wikistorming visit: http://femtechnet.newschool.edu/wikistorming/&lt;br /&gt;
&lt;br /&gt;
======'''Installing Bots Against Trolls And Swarming Together'''======&lt;br /&gt;
&lt;br /&gt;
If you use Twitter, 4chan or any online forums where comments are allowed, you might have noticed that they tend to not be very safe spaces. [http://seriouspony.com/trouble-at-the-koolaid-point/ Kathy Siera says] there is a “koolaid point” for women and queers who start to gather a following and be listened online. At this point, a certain group of people may decide that you have too much influence, and make it their mission to silence you or discredit you. We have seen this in numerous high profile cases but also in constant reports from women and queer writers, activists and organisers.This is called trolling.&lt;br /&gt;
&lt;br /&gt;
======What is a troll?======&lt;br /&gt;
&lt;br /&gt;
A troll was once just a mountain-dwelling monster in kids stories. Then a troll became the word for early internet users who intentionally sowed discord on IRC and chat forums, often targeting and singling out new users. But now the word is used more broadly to describe people who target and harass others online. This can include anything from constant derogatory and belittling messages to edited images and even threats. Most often the subjects of this kind of abuse are marginalised groups like women, queers and people of colour. In recent years there have been more and more cases of people speaking out about how they are harassed. &lt;br /&gt;
&lt;br /&gt;
======How should you deal with trolls?======&lt;br /&gt;
&lt;br /&gt;
There are two key ways you can deal with trolls: one is to block them and report them to the platform you are using or to engage with them. This decision depends on what you want to achieve. Blocking them can definitely work and you can continue with your work unimpeded. A project like “Block Together” was developed to help people who are harassed share their blocklists with each other. Historically platforms like Twitter and Facebook have not handled reports of intimidation and violence very well. However this is changing, as they recognise how severe this problem is and how it deters people with important voices from using their services. When blocking doesn't help is when users are really committed to trolling and create numerous different profiles (called “sock puppet accounts”) to continue the harassment. Then your blocking has to keep up with their new account generation and it becomes tedious. You might consider the alternative of engaging trolls. There are a few tactics for engaging trolls. One is to try and enter into rational arguments with them and interrogate their views. Another way is to try to shame them or use humour to deflate them. &lt;br /&gt;
&lt;br /&gt;
Effective engagement with trolls can actually help to generate a debate and public interest around the act of harassment and involve others online in talking about safe spaces, violence, sexism and online behaviour. It can also be a source of empowerment for the subjects of trolling: seeing others laugh at your harasser can be very uplifting.&lt;br /&gt;
&lt;br /&gt;
======Swarming======&lt;br /&gt;
&lt;br /&gt;
The method of swarming can be used to drown out harassers. This can be done in retro style by creating communities of support with your allies in social media spaces where you are likely to encounter harassment. When someone is being targeted, others can quickly be alerted and bombard the harasser with messages. The content of that message is up to you: it could be scolding, educational, or loving. Another option is: instead of directing messages towards the harasser, the swarm can fill the victim's content stream in order to quickly make the negative, violent content disappear into online history.&lt;br /&gt;
&lt;br /&gt;
======Do I have to use my own account?======&lt;br /&gt;
&lt;br /&gt;
If you want to engage with trolls, and even if you consider using the “swarming” method, you might prefer to stay anonymous to avoid having your real identity trolled. Setting up a network of second accounts to do your troll-response work can be a good idea for your organisation or your community of friends. It might be easier too, psychologically, to say some of the things you want to trolls, than you would when it is linked to your main identity. And it is more performative: you can create any kind of identity you want and style it with an avatar, a funny name, a character etc. (see &amp;quot;'''Creating a new online identity'''&amp;quot; and the following chapters in '''Step 1''').&lt;br /&gt;
&lt;br /&gt;
======Automation======&lt;br /&gt;
&lt;br /&gt;
While battling the trolls in the old-fashioned human way can be fun and eye-opening, it can also be a time waster. Another option to consider is automation. For this you need someone who can do some coding to start from scratch or work with freely available code someone already uploaded on Github.&lt;br /&gt;
&lt;br /&gt;
======What's a bot?======&lt;br /&gt;
&lt;br /&gt;
A bot is a software application that runs an automated task over the internet. Bots perfom tasks at a greater velocity than humans can. There are many different breeds of bots: for example the spambot which harvests email addresses and contact information or the attention bot which fakes clicks on Youtube videos to make them look more popular than they actually are. They can post content, gather information and click on things. Twitter is filled with bots which use algorithms to harvest information and tweet. Many of these are humorous and random: like @twoheadlines which randomly grabs news headlines and combines them to create funny combinations. The below steps address Twitter mainly. However some of these ideas can be used across other platforms too.&lt;br /&gt;
&lt;br /&gt;
====== How can a bot battle a troll? ======&lt;br /&gt;
&lt;br /&gt;
A bot can be programed to document trolls' activities or talk to them, so that you don't have to. There are a few ways of doing this: the autotweet bot and a silent data-gathering bot in combination with the talking bot(s). The examples below speak specifically about what is possible on Twitter. However the ideas could be applied to other platforms. &lt;br /&gt;
&lt;br /&gt;
1. The data-gathering bot &lt;br /&gt;
&lt;br /&gt;
The data-gathering bot quietly scans Twitter gathering tweets, usernames and any other available information you program it to, and places this in a .csv file for you to analyse or use for further purposes outlined below. This first kind of bot can be useful just for understanding what kind of content is out there and maybe doing a first stage analysis of abuse.  &lt;br /&gt;
&lt;br /&gt;
2. The simple tweeting bot &lt;br /&gt;
&lt;br /&gt;
If you follow the #gamergate hashtag on Twitter, you will see a bot called @everyethics which tweets different humorous reasons for the #gamergate trolling, ridiculing of the claim that Gamergate was not about attacking women in gaming but about “ethics in game journalism”. While this bot could be seen as spam, it was actually clearly a strategy to undermine and make fun of the trolls. &lt;br /&gt;
&lt;br /&gt;
3. The retweet bot&lt;br /&gt;
&lt;br /&gt;
The retweet bot is programmed to scan the Twitter API for a list of words, phrases or hashtags defined by you, and to retweet those. This would be a strategy to document and publicise Twitter abuse. Here's an[[ https://lilithlela.cyberguerrilla.org/?p=17418| example of such a bot]] you can download and install.   &lt;br /&gt;
&lt;br /&gt;
4. The autotweet bot &lt;br /&gt;
&lt;br /&gt;
The “autotweet” bot is similar except that every time it finds a tweet with one of the words, phrases or hashtags you have programmed it to look for, it will tweet a prewritten tweet to that user. There are a number of examples of this in Twitter history: @stealthmountain which corrects any Twitter user who spells “sneak peek” wrong. These bots get shut down much quicker now as was shown by @fembot which responded to racists and sexist tweets that it spotted and was blocked after making only 75 tweets. Unfortunately Twitter does not make it so easy to do this anymore. &lt;br /&gt;
&lt;br /&gt;
5. The tweeting bot in combination with the data-gathering bot&lt;br /&gt;
&lt;br /&gt;
You can use a data-gathering bot to find the users tweeting violent things, compile them in a spreadsheet for you to read over and check for accuracy and remove any false positives. Alongside the data-gathering bot, you can have a talking bot or a team of talking bots which can tweet whatever you decide is useful information, to those users.&lt;br /&gt;
&lt;br /&gt;
======Things to watch out for======&lt;br /&gt;
&lt;br /&gt;
1. Language is slippery&lt;br /&gt;
&lt;br /&gt;
If you want to tackle violence against women online, you will have to be very careful about what kind of language you search for. For example, every time someone uses the word “bitch” on Twitter to intimidate or harass a woman, there are probably at least five other people using it to tell their friend how much they love them or talk about the latest celebrity affair. The best way to figure out which language is used to harm women is to crowdsource it from people who have been harassed and then do a number of tests, pulling tweets from the Twitter API and then analysing it yourself. &lt;br /&gt;
&lt;br /&gt;
2. Twitter is smart (and strict)&lt;br /&gt;
&lt;br /&gt;
Twitter is not against bots and if you just want to create a bot that scans information from Twitter for you to analyse, or a bot that just tweets out to no one in particular, you will not encounter any problems. However if you want to tweet @ other Twitter users, you have to take into account Twitter's policy against spam. See Twitter's guide to [https://support.twitter.com/articles/76915-automation-rules-and-best-practices# Automation Rules and Best Practices].&lt;br /&gt;
&lt;br /&gt;
======Evading Twitter's spam filters======&lt;br /&gt;
&lt;br /&gt;
There are a few things to keep in mind when trying to bypass Twitter's spam filters:&lt;br /&gt;
&lt;br /&gt;
1. Safety in numbers&lt;br /&gt;
The more bots you have to distribute the work amongst, the more successful you will be. The group Peng! Collective did such an action in 2015 which they called “[http://zerotrollerance.guru/ Zero Trollerance]”. They ran a silent data-gathering bot to identify trolls through a long list of keyword combinations, hashtags and phrases. They then ran 160 bots which tweeted at the database of 3000 trolls, sending them new messages daily for an entire week. They were for the most part able to avoid being blocked by Twitter or users because they had so many bots and they rotated the tweeting across the bots.&lt;br /&gt;
&lt;br /&gt;
2. Rate Limit&lt;br /&gt;
&lt;br /&gt;
Twitter monitors each account's activity and has a “rate limit” that limits your number of tweets, to ensure that no one floods the content stream. This is also the way that they figure out which accounts might be spambots.  If the frequency of tweeting looks like it doesn't come from a human, Twitter will block the account. If you try to tweet the same tweet, many times right after each other, you will receive a message telling you that your tweet looks like spam and that Twitter is blocking you in order to protect their users. At the time of writing, tests were done with tweeting 15 times with 8 minute intervals and this passed under the radar. &lt;br /&gt;
&lt;br /&gt;
3. Content &lt;br /&gt;
&lt;br /&gt;
If you are tweeting the exact same tweet over and over again, this is also a red flag to Twitter's spam filters. How to avoid this is to pad every tweet with a random word from a readable language that is not the same as the language you are tweeting in. The easiest way to do this is a compile a long list of these words, and program your script to draw from this list randomly for every tweet. &lt;br /&gt;
&lt;br /&gt;
4. Location of the tweets&lt;br /&gt;
&lt;br /&gt;
Use a VPN which gives you a new IP address every time you reconnect to fool Twitter into thinking that the accounts are being managed from different locations. To learn more about what a VPN is, read &amp;quot;'''Anonymising your connections'''&amp;quot; in Step 0.&lt;br /&gt;
&lt;br /&gt;
======How to set up a Twitter account to be used as a bot======&lt;br /&gt;
&lt;br /&gt;
You still need to write the script for you or to configure a script already created by someone else and downloaded from Github, or to find someone else to do this for you. But what is easy to do and what even volunteers might like to do is to help you set up all the Twitter accounts so that they can be easily controlled by the script. &lt;br /&gt;
&lt;br /&gt;
1. Create a new account as you would normally and make sure to give it a photo, follow some people and do some tweeting (recently registered, faceless accounts with 0 followers will get blocked very quickly). &lt;br /&gt;
2. In order to function as a bot the account needs to be verified with a valid phone number. To do this you can use your own phone number, volunteers numbers or buy a bulk of cheap sim cards. Don't use the same phone number for numerous accounts – again this will be a quick sign to Twitter that the account is dodgy. &lt;br /&gt;
3. Now you need to register an application with the Twitter API which will allow your bot to make “calls” to the API, i.e. retrieve or send data. Go to [https://apps.twitter.com/app/new apps]  and create a new application. You can provide any dummy content in the fields there and then you can set your permissions to “read and write” and generate the keys you will need. &lt;br /&gt;
&lt;br /&gt;
More on these steps and some simple bots to download and test out at [https://lilithlela.cyberguerrilla.org/?p=9247 Cyber Guerilla].&lt;br /&gt;
&lt;br /&gt;
===='''Dos and dont's supporting people subject to online violence'''==== &lt;br /&gt;
&lt;br /&gt;
When you or your friends are under attack online there are a few steps to follow to support you or them.&lt;br /&gt;
&lt;br /&gt;
Try to be quick in bringing support. But remember that knowing what to do and how to do it in such situation needs a lot of practice to become good at it. But as a general rule, you should tell yourself that gender-based violence and harassment online is unacceptable. This should be your main message if you don't have a lot of practice in dealing with such phenomenon. &lt;br /&gt;
&lt;br /&gt;
If you are close to the person under attack offer immediate assistance. In the event of doxing, where confidential info has been released on the internet about the person, you might want to offer a safe space (a home) if the person does not feel safe to stay where she/they lives.&lt;br /&gt;
&lt;br /&gt;
If you do not know (well) the person, you can speak out. Since collective actions are often more effective than individual actions, make sure you gather a group of friends, and friends of friends, for a Twitter storming for instance. Make visible the issue! This will show to the person under attack that you and others care and that such acts are not OK. &lt;br /&gt;
&lt;br /&gt;
Depending on the nature and context of the attack, you might want to speak out to the media and highlight the gendered nature of online attacks. Using the media to bring light to a situation can be an important way to bring about visibility to such issue. As a best practice, though, we recommend that you consult the persons under attack before speaking to the mainstream media. If you do not know her/them, go through the web of trust. Also, we recommend you to contact a friendly and/or feminist media or journalist. Prior to doing so, we recommend that you form a group of people in opposition to such violence, draft a press release and explain what gender-based violence and harassment online are and why they exist. This will bring visibility to the issue and concentrate less on the person who has been or who is under attack. Thinking about the harm and added stress that the person can go through if she is made visible in the mainstream media is a feminist issue that you should carefully assess.    &lt;br /&gt;
&lt;br /&gt;
If you are part of an organisation or network you can write a solidarity statement that explicitly says you condemn online gender-based violence and harassment online. If it's a person from your organisation who has been under attack, make sure she/they read the solidarity statement before it is being released. The person will feel that her team mates care and respect her/their wishes. It will also allow the person to have agency over what is written. What is even better is to have an organisational policy on what to do when someone is under attack. If you have a policy and specific steps to follow when such situation occurs, chances are you will do less harm and be more effective in your strategy. &lt;br /&gt;
&lt;br /&gt;
As an ally, that is someone who wants to support a disadvantaged group but is not part of that group (e.g. men are allies when it comes to women's rights issues), you ought to speak out and say “NO” to online harassment and violence. Speaking out ought to happen in the public spaces. This is very important. Do it all the time that you witness online violence! Otherwise, the culture of impunity to online harassment will continue.&lt;br /&gt;
&lt;br /&gt;
====What are some of the current platforms which document online violence?==== &lt;br /&gt;
&lt;br /&gt;
Documenting instances of online violence and harassment is key to showing the extent of the problem and is very powerful as it makes visible the structural aspect of violence in societies. A few initiatives have started to document this process. We highlight a few examples below. &lt;br /&gt;
&lt;br /&gt;
APC's '''Take back the Tech''' has collected more than 500 stories of women who have experienced violence online. These stories were collected using the open source platform called Ushahidi. The data visualisation can be see here: https://www.takebackthetech.net/mapit/ . The overall results of those who have participated in this exercise show that women between 18 and 30 who are using Facebook are most likely to be under online threat. To read about the story visit: http://www.genderit.org/articles/mapping-strategy-disclose-online-violence-against-women &lt;br /&gt;
&lt;br /&gt;
'''HarassMap''' was born as a response to the persistent problem of sexual harassment on the streets of Egypt. Since the crowdsourcing platform based on Ushahidi is anonymous, Harassmap allows to document instances of sexual harassment whether you are the victim or a witness (http://harassmap.org/en/). To read about the effectiveness of crowdsourced data visit: http://harassmap.org/en/wp-content/uploads/2013/03/Towards-A-Safer-City_full-report_EN-.pdf [PDF]. Similar to HarrassMap is Hollaback, an initiative that aims at stopping street harassment using technology all over the world (http://www.ihollaback.org/).  &lt;br /&gt;
&lt;br /&gt;
HeartMob is a platform that aims at providing real-time support to individuals experiencing online harassment and empowers bystanders to act. This platform is being built and you should stay abreast of its development. It is an initiative of Hollaback.  Visit their Kickstarter project to know more about the initiative: https://www.kickstarter.com/projects/4096561/heartmob/description&lt;br /&gt;
&lt;br /&gt;
=== Building our safe spaces offline === &lt;br /&gt;
&lt;br /&gt;
All the ideas about creating and maintaining safe spaces detailed so far can of course also be applied offline when you think about bringing women and trans* persons together to network, learn and collaborate. In the case of security and privacy training, you also need to consider how your participants might learn skills to protect themselves when the topics themselves can very easily be frightening or overwhelming. &lt;br /&gt;
&lt;br /&gt;
Ideas have arisen in women and trans* tech conferences and skills workshops as how best to build safe spaces. Groups such as Flossie.org, Fossbox, Autonomous Tech Fetish (ATF), and Eclectic Tech Carnival (ETC) have each used a different set of principles to build safe spaces and are thus good examples to explore to highlight some of the differences, how to facilitate discussion about them, and how to arrive at a shared idea of an appropriate space for women and trans* persons to engage with tech. &lt;br /&gt;
&lt;br /&gt;
Every group has to work out their own idea of an appropriate space for their participants. Once you have arrived at a shared ideal, it's time to look at the practicalities of implementing these ideas in material, offline, spaces. This will include thinking about how much formality you want, what kind of formalities, how you will accommodate diversity, how you will facilitate participation for all the participants both in terms of your practical arrangements and in the way you formalise the social space.  &lt;br /&gt;
&lt;br /&gt;
==== How do you create a safe space? ====&lt;br /&gt;
&lt;br /&gt;
The difficulties in defining what a &amp;quot;safe space&amp;quot; should look like are inherent in the fact that you are bringing a diversity of people together, who might be considered to be part of the same community but all have different histories, contexts and needs. What one person might find politically, socially or personally threatening, might mean very little to another. And everyone will of course also come with different experiences and levels of knowledge and skills in technology. &lt;br /&gt;
&lt;br /&gt;
We need to remind ourselves then that whenever we create a space, even a safe space, it will never be experienced in the same way by the people involved. It is important to be aware that, in struggling to perfect a feminist safe space, one always runs the risk of creating, instead, yet another form of social control and pressure to conform to a particular image of what a woman or trans* identified person is.&lt;br /&gt;
&lt;br /&gt;
So, overall, the most important thing to remember is that everyone is different, with their own set of experiences, history, context and needs. There is always risk and vulnerability in opening yourself to new experiences. The more diverse the environment, the more emotional risk we open ourselves to as ideas and ways of being may be fundamentally challenged. So we are not aiming for the avoidance of any kind of conflict or emotional risk but, instead, to provide buffers, understanding, reciprocation, support, love, and care for each other and for our shared endeavour. We must take every possible step to ensure that practical needs are met (protecting anonymity, respecting diversity, dealing with harassment, providing appropriate living space, etc.), and focus on collaboration, facilitation and mediation.&lt;br /&gt;
&lt;br /&gt;
==== Women and trans* only? ====&lt;br /&gt;
&lt;br /&gt;
This question can be one of the most divisive as it will often touch on people's strongly held sense of their political, personal, sexual and social identities. It can raise up issues of sexual orientation and gender identity as well as mobilising all kinds of other loyalties. Some will prefer a women and trans* only environment, some will feel that this opens up an opportunity for external attacks on the whole project by adversarial forces, whilst some will feel that cis-men friends and colleagues will be unfairly excluded and resentful. Discussion can sometimes divide along lines of sexual orientation or of feminist conviction - or just between women who regularly work alongside cis-men in the tech industry and women who would like to learn tech but find learning alongside cis-men challenging. These divisions will also never be clearly defined - individuals don't take neat &amp;quot;sides&amp;quot; as they probably have multiple modes of identification. &lt;br /&gt;
&lt;br /&gt;
If you need to have a debate about this, some things to consider are: &lt;br /&gt;
&lt;br /&gt;
* Think about boundaries for the debate -- agreed framework, rules of engagement? How do we define &amp;quot;woman&amp;quot; and &amp;quot;trans*&amp;quot;? How do we define &amp;quot;safe&amp;quot;? &lt;br /&gt;
* Who do we want to include or influence, specifically women and trans* or also potential sympathisers?  &lt;br /&gt;
* What is the balance of positions on feminism present in the group, is there a prevalent &amp;quot;flow&amp;quot; of opinion?  &lt;br /&gt;
* How important versus how contentious? Is it worth alienating some people from the group? How can we frame the debate to avoid alienating people who don't agree with the decision? &lt;br /&gt;
* How will the decision affect the actual experience of people within the space?&lt;br /&gt;
* Do we have all the skills we need to deliver this project among our networks or will we need specific additional skills? Where will we get them? &lt;br /&gt;
* How will the space be formalised to promote equal participation, especially if cis-men are included?&lt;br /&gt;
&lt;br /&gt;
Take your time to decide these questions. It's probably a good idea to record them somewhere so they can be referred to in future. If you use chat channels (IRC, pads, etc.) you can probably take a log of the discussion. If not, some form of minutes will be useful. You can then use this record as a basis for any formal codes of conduct or policies you want to draft later and to avoid getting stuck in endless arguments by having something clear to refer back to and for new participants to catch up.&lt;br /&gt;
&lt;br /&gt;
==== What are you trying to do? ====&lt;br /&gt;
&lt;br /&gt;
For some groups, discussion and reflection is a key activity which renders the whole group activity meaningful. For others, discussion is a source of vexation and obstruction from practical objectives. Again, this is a somewhat false divide as everyone needs to reflect and everyone needs to be practical. Nevertheless, there may be important differences in emphasis and these may be based on what you are actually trying to do. It's all too easy to become engrossed in politics and to neglect to make sure there's enough discussion on the specific aims of the project itself and on the experience of diverse participants. &lt;br /&gt;
&lt;br /&gt;
Building offline spaces is easiest and most successful when you're clear about what you're trying to do and how you plan to go about it. Being clear about what you're trying to do can also shift debate through less painful channels and provide very clear, practical arguments for specific choices, making the discussion feel less emotive. &lt;br /&gt;
&lt;br /&gt;
The first thing which must be considered is exactly what the event is intended to achieve. Women and trans* and tech events can probably be categorised something like this (again, this abstract division may not reflect the 'messiness' of practical activism): &lt;br /&gt;
&lt;br /&gt;
* Advocacy: How do we change the culture of tech sectors to be more amenable for women and trans* persons, and/or let the world know that they are great at tech, and/or get more women involved? &lt;br /&gt;
* Skills: How can we learn to do xyz? &lt;br /&gt;
* Support, networking and boundary-crossing: What does it mean to be a woman or trans* person in tech? How can women from different places or sectors come together to spark off new ideas and practices? How can we support each other as women and trans* persons in tech? &lt;br /&gt;
&lt;br /&gt;
We can see right away how these different types of event might develop different gender policies even if the same group of people were organising them. For example, it's difficult advocating change in the male culture of tech sectors if you haven't invited cis-men to hear what you want to say - but you might prefer to discuss *how* to do this in a women and trans*-only environment first. Or are you advocating engagement with technology to women and trans* and mainly want free, frank and mutually supportive discussion or skills-sharing? In this case, a women and trans* environment suggests itself. &lt;br /&gt;
&lt;br /&gt;
With skills workshops, there is research to suggest that women and trans* persons learn tech skills best with each other so these workshops have a very clear and communicable reason for being exclusive. But you may still hear cis-men allies grumbling that they also wanted to learn that skill and it isn't fair. So, in that case, we can either explain the benefits of exclusive learning environments and recommend that a cis-man step forward to run an open workshop, or we might consider compromising with women and trans*-only as facilitators but inviting open participation. Another possibility is to run an event twice, once for women and trans* participants and once for open participation. As a side-effect, this can help others to experience the safe space methodology and change their own practice.&lt;br /&gt;
&lt;br /&gt;
It's also important to remember that building offline spaces is resource- and labour-intensive and often many compromises have to be made. It may be a good idea to try to identify as early as possible which values are shared, important, and relevant to the event so that you can constantly remember to prioritise those and de-prioritise less important or potentially divisive issues.&lt;br /&gt;
&lt;br /&gt;
==== Choosing a format that fits ====&lt;br /&gt;
&lt;br /&gt;
Once you have settled the basic questions about what your event is *for* and who you want to invite, it's time to think about the format you will use for your event. There are many different ways of organising different kinds of spaces, the following is just an outline of a few of those most popular with FLOSS communities. &lt;br /&gt;
&lt;br /&gt;
* Temporary Autonomous Zone: An alternative to traditional models of revolution, the T.A.Z is an uprising that creates free, ephemeral enclaves of autonomy in the here-and-now. [[http://beautifultrouble.org/theory/temporary-autonomous-zone/ | Beautiful Trouble]]&lt;br /&gt;
&lt;br /&gt;
* Un-Conference: creating a space that helps people make connections, share knowledge, collaborate and create brainchildren. To take part, attendees are encouraged to give a presentation, create a discussion, or even chair a debate [[http://lanyrd.com/blog/2012/unconference-howto/ | Lanyrd on running an unconference]] and [[http://openspaceworld.org/wp2/what-is/ | Open Space]]. Pros: relatively egalitarian (watch out for tyranny of structurelessness) and relatively easy to organise (no messing about with programmes, scheduling and advanced prep). Cons: can be extremely intimidating and therefore exclusionary towards less experienced or skilled participants and stressful if you need to organise tech or other resources for specific activities in advance.   &lt;br /&gt;
&lt;br /&gt;
* Workshop: transferring skills or knowledge in an interactive session - there are thousands upon thousands of workshop methodologies, so selecting a workshop format is very much about being clear about what you want to achieve. Workshops are a good format for building skills or for maker and design activities. &lt;br /&gt;
&lt;br /&gt;
* Hacklab/Hackerspace/Makerspace: Hacklabs, hackerspaces and [[http://makerspace.com/ | makerspaces]] are community spaces with hardware and/or tools - great for people to &amp;quot;get their hands dirty&amp;quot;, you can mess about with anything from taking computers apart to installing Linux to making music with bananas or even building a WWII PoW radio out of razorblades and copper wire! To learn more about hacklabs and hackerspaces, read Maxigas' article &amp;quot;Hacklabs and Hackerspaces: Shared Machine Workshops&amp;quot;, in: http://www.coredem.info/IMG/pdf/pass11_an-2.pdf [PDF]&lt;br /&gt;
&lt;br /&gt;
* Sprint: A sprint is a get-together of people involved in a project to further a focused development of some aspect of the project such as working on sections of code, writing manuals or books, etc. These are effective at getting a lot done quickly for code and manuals (less so for other forms of writing) but very exhausting and emotionally demanding - make sure you keep food and drink coming! To read more about sprints, visit: [[https://en.wikipedia.org/wiki/Sprint_%28software_development%29 | Wikipedia on sprints]] and [http://www.flossmanuals.org/service/booksprints | Flossmanuals Booksprints]].&lt;br /&gt;
&lt;br /&gt;
* Hackathon: with their motto &amp;quot;programming till someone drops from exhaustion&amp;quot;, hack events can also mix different groups like NGOs with hackers to come up with new approaches to building tech for that group. To learn more about hackatons, read:  [[http://globalvoicesonline.org/2012/11/23/hackathons-in-droves-how-is-a-hackathon-organised/ | Global Voices on how to run a hackathon]].&lt;br /&gt;
&lt;br /&gt;
* Seminar: bringing together small groups for recurring meetings focusing on a particular subject, in which everyone present actively participates, or offering information or training on specific topics. Pros: structured activity supports women with less experience or confidence, planning for tech/resource support is easier, people know what to expect. Cons: can be overly structured and lacking spontaneity for more experience participants , more 'carnivalised' or 'top-down', more organisational effort in advance. Read [[https://en.wikipedia.org/wiki/Seminar | the page of Wikipedia on Seminars]].&lt;br /&gt;
&lt;br /&gt;
Your choice of format is going to be about:&lt;br /&gt;
&lt;br /&gt;
* what you're trying to do - ask yourself which format will support this activity best&lt;br /&gt;
* participants' needs, existing skills, experience and preferences&lt;br /&gt;
* practical considerations - what physical spaces are available, what will they allow you to do, what resources do you have, etc.?&lt;br /&gt;
* Your organisational resources - how much can you take on? &lt;br /&gt;
&lt;br /&gt;
Choice of workshop or seminar format is obvious for skills sharing, but it can get more difficult to decide for advocacy and networking events. Advocacy events can be some of the most challenging as it's easy to spend the entire day &amp;quot;re-inventing the wheel&amp;quot; with people who are new to the questions. If you have participants from diverse backgrounds in your advocacy event, it's probably best to go with a more structured format. Unconferencing and hacking works best with activists or experienced practitioners who are used to a high level of self-determination and with a shared understanding of implied rules and structures. Having said that, it can work well to try more open formats anyway, but be prepared for some skilled facilitating to make it safe and fun for less experienced participants as well as the more experienced. &lt;br /&gt;
&lt;br /&gt;
It's perfectly fine to mix and match approaches to suit what you're trying to do and whom you're doing it with - so go ahead and experiment.&lt;br /&gt;
&lt;br /&gt;
==== Codes of conduct ====&lt;br /&gt;
&lt;br /&gt;
It's important, especially in mixed environments, to think about what's acceptable behaviour in the space and what isn't. In order for this to have any practical effect, you also have to think about what you'll do if individuals breach this - or when things go wrong generally. &lt;br /&gt;
&lt;br /&gt;
You can find plenty of information and example policies on the [[http://geekfeminism.wikia.com/wiki/Conference_anti-harassment/Adoption | Geek Feminism Conference anti-harassment/Adoption page]]&lt;br /&gt;
&lt;br /&gt;
Make sure your participants understand your policy and how that relates to their behaviour. It can be useful to make time in your schedule at the beginning of the event to share your policy, and reach consensus with the group on how to maintain a safe space over the days of the event. &lt;br /&gt;
&lt;br /&gt;
Your policy should at the base be about preventing aggressive behaviour and not about trying to &amp;quot;police&amp;quot; how people identify, communicate or present themselves as long as this is not creating a serious threat to other participants. It's also worth remembering that people who are struggling in a culturally unfamiliar environment can become confrontational more easily than they usually would. There may be many reasons why a participant might be struggling to communicate positively at any given moment. It's key to remain calm and to provide a non-judgemental space for the expression of emotions like anger or frustration. We are different, let's celebrate it, even when it's difficult to do!&lt;br /&gt;
&lt;br /&gt;
==== Respecting Privacy ====&lt;br /&gt;
&lt;br /&gt;
* Don't take or circulate sound, video or photos without permission - if anyone present faces significant external risk then don't take photos at all unless participants have given express permission and an opportunity to cover their identity. &lt;br /&gt;
&lt;br /&gt;
* If you wish to record the event, prepare formal consent forms telling people exactly what audio-visual records are being made and how they will be stored and used and ask for clear consent with a signature. &lt;br /&gt;
&lt;br /&gt;
* Don't share details of anyone's participation, speech or actions on social media without their express permission.  &lt;br /&gt;
&lt;br /&gt;
* Refer to Infrastructure sections to understand how to set up secure networks.&lt;br /&gt;
&lt;br /&gt;
==== Case Studies ====&lt;br /&gt;
&lt;br /&gt;
In the following, two women-and-tech spaces will help illustrate what was covered until now in this section of the manual, which pertains to the aims, participants and context which influence format. &lt;br /&gt;
&lt;br /&gt;
===== Eclectic Tech Carnival (ETC) =====&lt;br /&gt;
&lt;br /&gt;
ETC was organised on an &amp;quot;unconference&amp;quot; model using a combination of university spaces, art centres and community centres. It is relatively well-funded and so is able to bring participants in from all over the world. It is located in a different city each time and organised by a group from that city in collaboration with the core ETC collective. It provides &amp;quot;full board&amp;quot; space for participants and also partners with additional arts events located in the host city. &lt;br /&gt;
&lt;br /&gt;
ETC made the decision to be for women-only. Participants are culturally diverse but mostly from arts, academic, non-profit and related tech backgrounds. This means that they have a lot of experience in self-organising and thrive in a relatively unstructured environment. The code of conduct tends to be implicit rather than stated. &lt;br /&gt;
&lt;br /&gt;
Eclectic Tech Carnival spawned [[http://transhackfeminist.noblogs.org/ | Transhack 2014]] and also Flossie.org. ETC and Transhack's relatively coherent culture has fostered the development of a strong focus on reflection and feminist practice. It has been an influential and much-loved space for more than a decade.&lt;br /&gt;
&lt;br /&gt;
===== Flossie =====&lt;br /&gt;
&lt;br /&gt;
Flossie runs a conference and also skills workshops and was based on the ETC format. It is intended to combine advocacy, boundary-crossing, support and skills-sharing bringing together women involved in digital arts with coders, artists, and makers. There are various problems with trying to bring the ETC format to the UK, which has an extremely marketised academic/arts/non-profit sector and is outside of the Schengen area, making it very difficult for non-EU participants to attend in person. Eventually, it was decided to do something a little different. There was a small amount of funding from Google which didn't cover &amp;quot;full board&amp;quot; and, in any case, it was impossible to find spaces such as the schools used in ETC in Austria in the marketised UK public sector. Videos were made and the links were available for women outside of EU to contribute. The whole event was not streamed publicly because of bandwidth problems at the university which hosted the event. &lt;br /&gt;
&lt;br /&gt;
In the end the biggest difference came from involving more women from pure tech and engineering sectors. Flossie worked with Ubuntu Women and the Women's and Open Source Groups at the British Computer Society to involve women from purely technological backgrounds as well as digital artists, activists and makers in order to foster wider skills sharing and open up access to high-level computer skills for women. This was very popular but also opened out all kinds of communication difficulties as the groups had quite different cultures and backgrounds. &lt;br /&gt;
&lt;br /&gt;
The first issue raised by this was that many of the students who joined the collective wanted a more structured environment as they didn't feel confident in self-organising and more experienced organisers also felt the unconference structure could be a problem given the diversity of backgrounds and interests. The second was that a reflective approach became more difficult. In the first year, a panel was held to consider how to go about building a positive representation of women in technology. This quickly became very dislocated and adversarial because, as the group began to realise, there were many different models of feminism ''and'' of technology between women who were primarily tech/engineering, academics, and women who were primarily activists or artists. It was decided that the group would focus on the basic value that all shared - supporting more women to make better use of open technology and to move from being consumers to being producers. The group had to deprioritise feminist reflection or debates about practice. This proved very effective in holding together these very different groups and building lasting networks with a positive and collaborative atmosphere.&lt;br /&gt;
&lt;br /&gt;
===='''What is a Feminist Hackerspace?'''====&lt;br /&gt;
&lt;br /&gt;
Building a feminist hackerspace is another way of creating a safe space offline for women in tech in addition to reach out to women activists and artists who might not be drawn to traditional hackerspaces.  &lt;br /&gt;
&lt;br /&gt;
But first what is a hackerspace? Hackerspaces are often volunteer-run spaces based on the concept of openness, where in theory anyone who is interested in learning about and playing with technology (software, hardware, etc.) can go. However, throughout the world women have remained underrepresented in these spaces despite the attempts to proposed remedial strategies in certain space, such as women-only hack nights and the adoption of codes of conduct. The women-only hack night particularly has been met with controversy in many spaces since it is deemed to go against the principle of openness. &lt;br /&gt;
&lt;br /&gt;
Other reasons have been highlighted to explain the emergence of feminist hackerspaces such as the difficulties in recognizing and acknowledging privileges along the lines of gender, race, ethnicity and class in addition to the patriarchal behaviours that many women recognise as prevalent in hackerspaces. To change the aforementioned state of affair, feminist geeks, makers, artists and hackers have decided to start feminist hackerspaces. This shows that women are interested in technology, want to learn, improve their skills, look for a like-minded community and want to share their skills with others. And it is fun too!  &lt;br /&gt;
&lt;br /&gt;
Feminist hackerspaces are not all the same. They vary in form, shape and size. What seems to unite them though is a set of boundaries that they decide collectively (who can be a member, who can be a guest, what are the policies, etc.) and an explicit belief in feminist principles. Feminist hackerspaces provide a place to work on individual and collective projects in a supportive environment.  &lt;br /&gt;
&lt;br /&gt;
To know more about feminist hackerspaces you might want to visit the website of: the Mz Baltazar’s Laboratory in Vienna (http://www.mzbaltazarslaboratory.org/), The Mothership Hackermoms in Berkeley (http://mothership.hackermoms.org/), Double Union in San Francisco (https://www.doubleunion.org/) and FemHack in Montreal (http://foufem.wiki.orangeseeds.org/).&lt;br /&gt;
&lt;br /&gt;
===='''Which Criteria Do I Use to Assess Whether a Space is Safe or Not? '''====&lt;br /&gt;
&lt;br /&gt;
As a summary and check-list, you will find below the criteria (or rather questions) by which to assess whether a space is safe or not. These questions will be useful when you are assessing whether a space can be considered a safe space.&lt;br /&gt;
 &lt;br /&gt;
- What is the history of the space? Why was it decided to start this space and who started it? How many women are/were involved?  Documenting yourself about a space is very important. Asking questions is always relevant. &lt;br /&gt;
&lt;br /&gt;
- Who has left the space since the beginning and for which reasons? Is it mostly women who have left the space? &lt;br /&gt;
&lt;br /&gt;
- Does the space has policies? If so, what kind? Go and read it.  &lt;br /&gt;
&lt;br /&gt;
- Are the policies regularly put in practice? Ask members in the space, particularly women. &lt;br /&gt;
&lt;br /&gt;
- How do they welcome new comers? The first time you went to the space did you get a tour? Did people say hello? Were the people in the space friendly? &lt;br /&gt;
&lt;br /&gt;
- Are there regular meetings (assemblies) that you can attend to raise issues of concerns, to suggest collective projects, to suggest the organisation of workshops, to discuss the space (its cleanliness, etc.), to present yourself, etc.?  &lt;br /&gt;
&lt;br /&gt;
- Is the language and vocabulary used on the website and in the space explicitly feminist? Read the website carefully, or go and see for yourself how the space looks like. &lt;br /&gt;
&lt;br /&gt;
- Who can go in the space and under which condition? This should be made explicit on the website, otherwise ask.&lt;br /&gt;
 &lt;br /&gt;
- Do you know people who you trust in the space or do you know friends of friends? The web of trust can be very useful here. &lt;br /&gt;
&lt;br /&gt;
- Is it an accessible space? In which part of town is it located? Are there bathrooms? What are the opening hours? Who has access to the keys of the space? &lt;br /&gt;
&lt;br /&gt;
- How much does it cost to become a member? Is there a sliding scale policy?&lt;br /&gt;
&lt;br /&gt;
No space is a perfect space, even a safe space is not perfect. But safe spaces should at least provide an environment and a set of boundaries to talk, meet, address and raise difficult issues, among others. If you feel the space has potential and you want to get involved, don't be shy!&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Step_1&amp;diff=1258</id>
		<title>Step 1</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Step_1&amp;diff=1258"/>
				<updated>2015-05-27T15:18:16Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Understanding and minimising our digital shadows ===&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. Unfortunately, the internet has also become a space where people who challenge the dominant discourse often find themselves under attack. These attacks can be very personal - enabled by the fact that there is often a lot of personal information about us on the internet. &lt;br /&gt;
&lt;br /&gt;
To strengthen our defences against these kinds of attacks, it’s a good idea to start by our assessing our '''digital shadows'''. These shadows - can tell a story about us: who we are, were we live and hang out, what we are interested in, and who our friends and colleagues are. &lt;br /&gt;
&lt;br /&gt;
This can expose us to several threats. In particular, it is the publicly available traces we leave behind that expose us to online harassment. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' we can use to shape or control our digital shadows, to increase our privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing our activity online.  &lt;br /&gt;
&lt;br /&gt;
Some examples of these include controlling the amount of data we give away by consciously stripping valuable information from content and metadata; trying the art of self doxxing; and thinking about ways to play with and break up our online identity.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== '''What is a digital shadow?''' ====&lt;br /&gt;
&lt;br /&gt;
Our digital shadows can be defined as the stories data tells about us. These digital shadows are created by trillions of bits of data, digital traces we leave everyday when we connect to the Internet, our mobile phone and online services. Our digital shadows have a life of their own, are affected by others and change in unpredictable ways. Our digital shadows grow continuously, can be permanent permanent and we have little control over them. These traces are a spectre of our past and present activities, which melt together in a permanent and ever-changing profile.&lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' The devices and the software we use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data about us. These bits of data can include our name, location, contacts, pictures, messages, tweets and likes, but also the brand of our computer, length of our phone calls and information about which websites we visit. These data traces can be put out there by ourselves as well as other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' In some cases we '''actively '''share data – for example when we share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about us, by tagging us in pictures, mentioning us in tweets or simply by communicating with us. In other cases, we give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
Our browsing habits and IP address are shared when we visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites we visit, and the information shared is collected for a wide range of purposes,  from website analytics to advertising. Our mobile phone apps also collect data on us without our active knowledge or consent – for example, the photos we take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow us as we move from one service to another - from our internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in our readers to publishing pictures from the latest protest we have covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of our messages, blogs, tweets and phone calls; it is our pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables our email to be delivered, help find files on our computer and permit mobile communication. Metadata can be our email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognized by computers.&lt;br /&gt;
&lt;br /&gt;
==== '''Who is collecting our data, and why?''' ====   &lt;br /&gt;
&lt;br /&gt;
We might wonder about the importance of one picture or one message, or think there is so much data out there that nobody knows what to do with it. However, data collection and data analysis has become very sophisticated. &lt;br /&gt;
&lt;br /&gt;
The data traces you leave are collected, analysed and sorted by various parties to create digital shadows, or '''profiles'''. Every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by companies, governments and individuals for a variety of purposes. It can be bought and sold; it can be used to control; or it can be used to create harassment strategies.&lt;br /&gt;
&lt;br /&gt;
Our digital shadows or profiles can be used to gain insight into who we are, what we do and where we have been. This data can then be used to make predictions on what we might do or where we might be in future. For example, if someone knows that we are an outspoken blogger on gender issues in country x, they know that we will probably be present at a conference on blogging and women held in that country. Profiles can also give potential harassers the ability to harass us across different platforms.  &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to our digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. We can't know exactly what is happening to our digital shadow, and that itself is a problem. &lt;br /&gt;
&lt;br /&gt;
However, there are tools and tactics we can use to manage our digital shadows and to limit their ramifications in terms of profiling and surveillance. This will be discussed in the rest of this section.&lt;br /&gt;
&lt;br /&gt;
==== '''Exploring our own digital shadow''' ====&lt;br /&gt;
&lt;br /&gt;
As we mentioned before, anyone can potentially access to our digital shadow – including communications service providers, law enforcement agencies and  companies, as well as groups and individuals running their own servers.  We cannot know precisely what happens to our digital shadow and that itself is a problem. But there are tools and tactics to manage our digital shadow and to limit its ramifications in terms of  profiling and surveillance.&lt;br /&gt;
&lt;br /&gt;
Some good places to start are:&lt;br /&gt;
&lt;br /&gt;
* Exploring our individual digital shadow with '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – a tool launched by Tactical Tech, accompanied by a website that offers a lot of tips on how to protect our privacy and control our digital shadow: https://myshadow.org&lt;br /&gt;
* Identifying and materialising social networks across our online and physical activities: John Fass, researcher and designer at the Royal College of Art, has created some activities to materialise our social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* Seeing through the eyes of our mobile phone by installing a tool called '''openpath.cc'''. Some of our apps can see the same things. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone we can change the permissions for each app under its privacy setting.&lt;br /&gt;
&lt;br /&gt;
==== '''Controlling what we share: content and metadata''' ====&lt;br /&gt;
&lt;br /&gt;
The good news is that we can partly control what content and metadata we give away. &lt;br /&gt;
&lt;br /&gt;
When we publish content on the web, it is always a good idea to ask ourselves if what we are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to our personal lives, the names we mention or the images we upload may contribute to a picture about who we are, what we are doing, where we are doing it and so on. This could be used by people who wish to target us. &lt;br /&gt;
&lt;br /&gt;
This does not mean that we should silence ourselves – by taking some basic measures, we can limit our risks by increasing the level of the effort that would be required to attack us or our contacts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about our life''', we can use private profiles that can only be accessed by selected contacts. When using private profiles on commercial social media, we should be aware of the regular changes to the privacy policies of that platform. This can have an impact on how “private” our profiles are. There have been cases where privacy settings have been changed, exposing pictures, content and the conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web and on publicly accessible social network profiles, we should ask ourselves if the information we spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to post information on public events only after they are finished.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices.  https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* '''Use strong passwords''', and '''use different passwords''' for each web service you use - if you you the same password for multiple services and someone intercepts your password for one of these services, they could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not usingy our real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or we can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing hidden data from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or Adblock Plus, as well as by monitoring our privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like our IP address''', thereby increasing our anonymity online.&lt;br /&gt;
&lt;br /&gt;
===='''Social domains'''====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”.&lt;br /&gt;
&lt;br /&gt;
Each of us belongs to several '''social domains''' - our work or advocacy networks, our family networks, friends, and sports teams. &lt;br /&gt;
&lt;br /&gt;
Some of these networks may be more secure than others. For example, we may tend to have a more secure communication practices for our work or advocacy activities, but less secure practices for interacting with friends on a social network. Areas where these domains intersect can turn into a threat to our security. &lt;br /&gt;
&lt;br /&gt;
If we use a single identity in all our domains, it becomes easier to gather information about us and to identify our vulnerabilities. For example, if we reveal in a social network that we like a particular kind of game and that we download files with a p2p program like Emule, an attacker who wants to investigate our work or advocacy activities might trick us into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This attacker is interested in our advocacy activities, but knows that we have increased privacy and security measures for that part of our lives. The attacker also knows that our love of games is a digital weak spot as this network is not encrypted. Thus the attacker can exploit this part of our lives to gain access to another, more secure part. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if our work identity and our Emule profile can be connected to the same person; and this is why separating our social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
==== '''Self-Doxing''' ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' (also written as &amp;quot;doxxing&amp;quot;, or &amp;quot;D0xing&amp;quot;, a word derived from &amp;quot;Documents&amp;quot;, or &amp;quot;Docx&amp;quot;) describes tracing or gathering information about someone using sources that are freely available on the internet. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. &lt;br /&gt;
&lt;br /&gt;
Doxing is premised on the idea that &amp;quot;The more you know about your target, the easier it will be to find his or her flaws”.&lt;br /&gt;
&lt;br /&gt;
Harassers and stalkers use several tools and techniques to gather information about their targets, but since these tools and techniques are mostly public and easy to use, we can also use them ourselves. &amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more than is immediately obvious about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, yellow pages, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists; or looking for images that the target has shared (and for instance may have also published in another, more personal, account). But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
We can use these same tools to explore what can be easily found out about us by others. &lt;br /&gt;
&lt;br /&gt;
Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser.&lt;br /&gt;
&lt;br /&gt;
* Useful tips on how to self-dox are available here: https://lilithlela.cyberguerrilla.org/?page_id=93870 &lt;br /&gt;
* For more about (self-)doxing tools and techniques, visit: https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* A useful (and creepy!) tool to learn what traces we have left behind in our Facebook account is Ubisoft’s '''Digital Shadow''', a Facebook app which illustrates what third parties can know about us through our Facebook profiles: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== '''Can we remove our digital past? Creating new identities''' ====&lt;br /&gt;
''&lt;br /&gt;
&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' &lt;br /&gt;
&lt;br /&gt;
We may think that deleting certain sensitive data from social networks and web services may be enough to protect ourselves, but metadata cannot be deleted as easily.  And using just one identity through our whole life - in all our work and personal domains - creates a bulk of information that could be used to profile or attack us. &lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one or several new ones - one for each of our social domains. We might also choose to use our real identity in some areas, and our new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When we create a new identity, we should select the contacts for each one carefully, and avoid sharing contacts with other identities we use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* It's important to make sure that our various identities are not linked in any way to each other, or to our real identity. Remember that some of these connections can be tenuous: for example, did you sign up for a new, pseudonymous Gmail account using your real phone number? &lt;br /&gt;
&lt;br /&gt;
* Treating each of our extra identities as potentially disposable can be useful, as they can be discarded easily if it is compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable identities can be created for new acquaintances where appropriate – introductory profiles we can use to get to know somebody before we include them in a more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== '''Deleting identities''' ====&lt;br /&gt;
&lt;br /&gt;
If we decide to separate our domains by creating multiple identities, one of the first decisions we should make is whether to delete or keep the identity or identities that we already have.  &lt;br /&gt;
&lt;br /&gt;
To do this, we can start by investigating the traces of our existing identity or identities. (for methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
If we want to delete existing accounts:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitate the process of deleting social network profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
==== '''Mapping our social domains''' ====&lt;br /&gt;
To separate our social domains, it's helpful to first map them out and identify which ones could expose us most to cross-domain attacks. &lt;br /&gt;
&lt;br /&gt;
We can do this by thinking about our different activities and networks, and reflecting how sensitive each of these is. This will enable us to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
Partitioning one’s digital life into separate social (or &amp;quot;security&amp;quot;) domains requires some thinking. &lt;br /&gt;
&lt;br /&gt;
Polish computer security researcher Joanna Rutkowska has worked extensively on this, to the point that she developed  a security-oriented Linux distribution based on the concept of “security by isolation” (called Qubes OS). In this system, each social domain is isolated in a separate virtual machine. While Rutkowska's scheme is quite sophisticated and focused on her operating system, it can give us interesting insights on how to start thinking about separating our domains. &lt;br /&gt;
&lt;br /&gt;
The three basic domains Rutkowska identifies for herself are “work”, “personal”, and “red” (the untrusted, insecure area).&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain includes her work email, where she keeps her work PGP keys, where she prepares reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations. To add to this, she has a “work-admin” and a “work-blog” domain, in order to get a further level of security for managing her company’s servers and for writing on her blog.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes all the non-work-related stuff - such as personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the communication with her partner when she is away from home. The couple uses encrypted mails to communicate, and she has separate PGP keys for this purpose.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain, on the other hand, is totally untrusted. This is where her disposable identities or profiles belong. Rutkowska uses this domain to do everything that doesn’t fit into other domains, and which doesn’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
* Besides these three main domains, Rutkowska has several other separate domains. One is dedicated to '''shopping''', for accessing e-commerce sites. What defines this domain is access to her credit card numbers and her personal address (for shipping). Then there is the '''vault''' domain, the ultimately trusted place where she generates and keeps all her passwords (using KeePassX) and master GPG keys. Finally, she has a domain for all the Qubes development (&amp;quot;qubes-dev&amp;quot;), one for '''accounting''', and another one for '''work archives'''.&lt;br /&gt;
&lt;br /&gt;
Of course we don’t have to separate our domains in such a complex way, and using Qubes Os to keep them separated is just one solution – and one that requires a powerful machine to run on. Yet Rutkowska’s reflections on domain mapping can be an enlightening starting point to analyse our activities, and to separate our social domains for enhanced security.&lt;br /&gt;
&lt;br /&gt;
* Joanna Rutkowska’s article on security domains can be found here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
=== '''2. Assessing risks and potentials: how to choose which online identity fits our purpose''' ===&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;'''Real&amp;quot; or virtual identity?''' ====&lt;br /&gt;
&lt;br /&gt;
Once we have identified our different social domains and the digital activities and contacts that go with them, what we need to do is decide if we want to differentiate our identities accordingly, or if we'd rather stick to our official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
We may want to keep our work connected to our legal or &amp;quot;real&amp;quot; identity, or think that our activism should be anonymous, but these are decisions that need to be thought about carefully.&lt;br /&gt;
&lt;br /&gt;
For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social networks, and her online activist identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known in this context?&lt;br /&gt;
&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known in this context?&lt;br /&gt;
&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once we have '''assessed our risk,''' we can then consider different strategies for separating our identities online. &lt;br /&gt;
&lt;br /&gt;
For more on assessing risk, visit: https://ssd.eff.org/en/module/introduction-threat-modeling  &lt;br /&gt;
&lt;br /&gt;
==== '''Strategies for separating identities online''' ====&lt;br /&gt;
&lt;br /&gt;
'''strategies''' for maintaining separate identities can range range full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding talks about her decision to start writing under her real name, dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”. &lt;br /&gt;
&lt;br /&gt;
Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is dangerous one.&lt;br /&gt;
http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name&lt;br /&gt;
&lt;br /&gt;
In &amp;quot;The Girl's Guide to Staying Safe Online,&amp;quot; Sady Doyle writes that while becoming visible &amp;quot;creates a specific vulnerability&amp;quot;, giving up on our online activities is exactly what the misogynists and harassers expect from us - and so the best way to ‘stay safe’ online may simply be to stay online. &amp;quot;After all: If there’s no one left willing to complain about the harassment, what are the odds that it’s going to change?”&lt;br /&gt;
http://inthesetimes.com/article/12311/the_girls_guide_to_staying_safe_online&lt;br /&gt;
&lt;br /&gt;
As such, we have several options available to us: We can attempt to participate online anonymously. We can use a &amp;quot;persistent pseudonym&amp;quot;.  We can identify fully with our real or legal name, or we can divide our online lives, using our real or legal name sometimes and a pseudonym at other times. The following section will explore the pros and cons of each option, so we can determine which options are best for each one of us.&lt;br /&gt;
&lt;br /&gt;
==== '''Anonymity''' ====&lt;br /&gt;
Total anonymity can be both isolating and difficult to maintain, but is useful in settings where we don't need to gain other people's trust, when there are few or no people we can trust, or when we don't want to expose others in our life to risks. &lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in certain specific situations, such as researching or participating in message boards about health issues, or when sharing sensitive information. We may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
On anonymity, Vani, a human rights activist, writes: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”. [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity speaks of their participation on social networks anonymously]&lt;br /&gt;
&lt;br /&gt;
But while anonymity is a good option in many situations, it can also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely: “Anonymity also isolates you”, a blogger writes. “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
Anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. When we adopt anonymity as a strategy we may use pseudonyms, but these pseudonyms are not used across different networks or social domains, and some may only be used once and then discarded. For more information on how to be anonymous online, see '''Anonymizing tools'''.&lt;br /&gt;
&lt;br /&gt;
==== '''Persistent Pseudonymity''' ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves using a pseudonym consistently over a period of time. &lt;br /&gt;
&lt;br /&gt;
The Oxford English Dictionary defines a pseudonym as &amp;quot;a fictitious name, especially one used by an author.&amp;quot; In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. &lt;br /&gt;
&lt;br /&gt;
Jillian C. York, in a blog post for the Electronic Frontier Foundation, writes: &amp;quot;There are myriad reasons why individuals may wish to use a name other than the one they were born with. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent discrimination or they may use a name that’s easier to pronounce or spell in a given culture.&amp;quot;&lt;br /&gt;
https://www.eff.org/deeplinks/2011/07/case-pseudonyms&lt;br /&gt;
&lt;br /&gt;
Pseudonymous speech has played a critical role throughout history, says York. &amp;quot;From the literary efforts of George Eliot and Mark Twain to the explicitly political advocacy of Publius in the Federalist Papers or Junius' letters to the Public Advertiser in 18th century London, people have contributed strongly to public debate under pseudonyms and continue to do so to this day.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity,&amp;quot; which typically means using your legal name or the name by which you are commonly known. This policy has caused some users, such as a group of drag performers in California, to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that a risk of doing so is being reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is using a name-shaped pseudonym.&lt;br /&gt;
https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers us '''visibility'''. Visibility allows us to network with others, and by pinning our voice to a particular name we can develop an '''online reputation'''. An online reputation allows others to decide whether we are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to our legal identity, or not. The choice to connect our online reputation to our &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== '''Collective Identity''' ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. This could mean a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity. &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice we make, what is important is that we keep our domains effectively separated. &lt;br /&gt;
&lt;br /&gt;
No matter how many domains we identify in our digital life, and how many corresponding identities we create, on the internet every identity - even the one bearing our real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means that you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you; gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' can be beneficial at times, but can also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': few opportunities to gain trust and reputation, or to network with others.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': difficult; requires caution. Might also require the use of anonymisation tools (for example Tor.)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonym could be linked to our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify us across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if we are also using our real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': possible exposure of our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
=== '''4. Creating a new online identity''' ===&lt;br /&gt;
&lt;br /&gt;
==== '''What’s in a name?''' ====&lt;br /&gt;
&lt;br /&gt;
The practice of naming varies greatly from one culture to another. While names, in one form or another, have existed across cultures for milennia,  the concept of a &amp;quot;legal name&amp;quot; is a fairly new one. &lt;br /&gt;
&lt;br /&gt;
Different countries regulate the practice of naming in different ways; for example, in Morocco, names must be chosen from a government-approved list, while in Germany a name must be clearly reflective of the baby's gender. &lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgement on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If we want to use commercial social networks, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that we use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once we have decided on a name, a surname, and a username for our virtual persona, we should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if we wish to develop our own reputation, we don’t want to be confused with someone else, especially if they don’t share our views of the world!&lt;br /&gt;
&lt;br /&gt;
==== '''Writing our own story''' ==== &lt;br /&gt;
&lt;br /&gt;
The practice of “story telling” (and of creating a social mask, for that matter) is an old one, and creating a new persona with a story makes it a lot easier to maintain the role. &lt;br /&gt;
&lt;br /&gt;
We can base our story on a “known” person’s story, a superhero, a fictional character from our favourite novel, or adopt a “group identity” like Anonymous/Anonymiss or the Guerrilla Girls. If we feel particularly inspired, we can invent a new story.&lt;br /&gt;
&lt;br /&gt;
The main point is that when we create an identity we should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== '''Creating a credible persona''' ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If we keep all our normal identifying traits - such as our gender, job, attitude or the way we write - it might be possible for someone to connect the dots and connect our pseudonymous personas with our real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': One of the things to consider is our '''linguistic fingerprint'''. This could be identified through a so-called &amp;quot;stylometric analysis&amp;quot; using tools that are increasingly usable, even for non-experts, that make it possible to identify the author of a particular text.  We can, for example, give away our real identity through our particular way of writing certain words, our typical typos, and our style and tone.  To change this, we can start by using a spell-checker in our word processor to check for consistent typos. We could also think about adopting a different writing attitude. To keep it simple, we could adopt one simple rule for each persona, e.g. making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks, or a spelling criminal, always putting apostrophes in the wrong place or mistyping words. What we decide to do with our writing style should match the character we choose for our new identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': To be sure that our pseudonymous avatar cannot be tracked back to us, our persona should have a job that is different from ours, but not so different that we don’t know anything about that field: for example, they shouldn’t be a surgeon if we don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select our persona's skills and the main topics they focus on and write about. These can, of course, overlap - for example a journalist who writes about national politics may have an alternative identity that talks about national politics as well, but only casually (and their main interest will be something different, like carpentry or feminism or food).&lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': As for psychological attitude, a good rule of thumb is to give our persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, we are able to weather the strikes and even have some fun in the process. For example, if we have a very strong sense of humour, we could choose a severe lack of humour as our persona's biggest weakness, so that if that weakness comes under attack we can enjoy impersonating a humourless persona without really being psychologically harmed. &lt;br /&gt;
&lt;br /&gt;
What is most important is to remember that on the internet, each one of our identities - even the one connected to our real name - is a “virtual” identity, and it is always better to decide what character traits we want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for our “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for our identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
==== '''Creating online profiles''' ====&lt;br /&gt;
&lt;br /&gt;
Once we have created several personas, it's important keep them separate in both our physical and digital lives. While keeping notes on our identities might help ensure that we remember our story, there are technical measures we can take to make sure that our profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social network accounts''' for each of our identities. A good rule of thumb is to always use different apps for each account/identity and, if possible, to separate our identities per device or operating system (see '''6. A different machine for each identity''').&lt;br /&gt;
&lt;br /&gt;
==== Creating separate browser profiles and mailboxes ====&lt;br /&gt;
&lt;br /&gt;
''Browser profiles:'' To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles  . For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
&lt;br /&gt;
''Mailboxes:'' When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
===='''Disposable email addresses''' ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains we need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all we need is a '''disposable email address''' that we only need to use once or few times, for example for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if we decide to have just one identity online, using disposable email addresses prevents sites from building up a history of our activities and ensures that if that account gets compromised we can simply delete it and create a new one, keeping our digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are:''' '''https://anonbox.net'''&amp;lt;nowiki/&amp;gt;''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': Making the process of creating a disposable account easier, '''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': We can also make use of existing fake or disposable email accounts. '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
==== '''Mail aliases''' ====&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to our main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised we can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill our main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org), two secure, autonomous servers that are particularly focused on the right to privacy and anonymity.&lt;br /&gt;
&lt;br /&gt;
==== '''Managing our identities on social networks''' ====&lt;br /&gt;
&lt;br /&gt;
Note: When we use social networking platforms, we should always access them with a secure HTTPS connection. &lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?)&lt;br /&gt;
&lt;br /&gt;
Also be very careful about the''' profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for us in that social network, regardless of our privacy settings.&lt;br /&gt;
&lt;br /&gt;
It's also crucial to make sure your contacts do not overlap with your other identities, and to make sure your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous accounts with your &amp;quot;real&amp;quot; identity. If someone is looking to unmask one of your pseudonymous personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when we interact with the platform using a GPS-enabled phone, but it can also happen if we are connecting from other devices - for example the network our computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
Photos and videos can also reveal a lot of information without you realising it. Many cameras will embed metadata into your photos, which can include the date, time and location of the photo, camera type, etc. Photo and video sharing sites may publish this information when we upload content to their sites.&lt;br /&gt;
&lt;br /&gt;
If we access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage social networking platforms - you just need to choose a different one for each identity, to reduce the risk of giving away our real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide our trails is to publish from our various accounts at different times of the day. Some social networks, like Facebook, allow users to schedule the publication time of their posts, while for others, like Twitter, there are several apps that can do the job for us.&lt;br /&gt;
* To schedule a post on Facebook, read:https://www.facebook.com/help/389849807718635&lt;br /&gt;
&lt;br /&gt;
* There are several apps to schedule a post on Twitter and other social networks, like Buffer – https://buffer.com – or Postcron https://postcron.com&lt;br /&gt;
Two further good hints for using social networks with multiple identities are to follow other people who could reasonably be considered the owners of our fake account, and to write (and hashtag on Twitter) posts about events that we are not attending, especially if they are taking place far away from us, to further distance our personal identity from our pseudonymous identities. It may also be fun to publish and then delete posts that look like we have exposed our identity, so as to further confuse anyone who may try to track us down.&lt;br /&gt;
&lt;br /&gt;
Finally, whatever social network we decide to use, we should always read its terms of service to check if they suit our purposes well. And if we find them too complicated, we can check the website Terms of Service; Didn’t Read (https://tosdr.org), where terms of service of many social networks and web services are easily summarized for common mortals.&lt;br /&gt;
&lt;br /&gt;
==== '''Alternative social networks''' ====&lt;br /&gt;
&lt;br /&gt;
For the sheer number of their users, mainstream commercial social networks like Facebook or Twitter are extremely useful if our aim is to publicize as widely as possible an event we are organizing or a project we are launching. Nevertheless, when we advertise our initiatives, we should remember that these platforms have very strict terms of service that could justify their decision to terminate our accounts if they find that our contents infringe their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
&lt;br /&gt;
Moreover, as is well known, with commercial social networks users are not the costumers, but the product, because they are profiled and sold to advertisers. If we add to this the ever-changing terms of service and policy and the interactions with other apps and features that make it very difficult to understand clearly what happens to our data, the best solution is to avoid commercial social networks as much as possible, and to limit their use to specific projects we want to publicize to a wide audience.&lt;br /&gt;
&lt;br /&gt;
But social networks are not always profiling their users: there are alternatives that give much more freedom to their users and don't profile them.&lt;br /&gt;
&lt;br /&gt;
On of these, '''Ello''', explicitly states in its manifesto that “You are not a product” and has become famous, particularly in the trans* community, for not requiring real names, a rarity amongst commercial social networks. Consequently, its number of users has grown and this can be a good alternative to mainstream commercial social networks for achieving the critical mass of readers we need to spread our ideas and initiatives. Nevertheless, Ello is still a commercial project, and there are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)] and '''Crabgrass '''(https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
&lt;br /&gt;
Other similar sites may be popular in different regions, so we way wish to explore other options. Before choosing one, we should consider the following points:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there no problems related to encryption, such as problems related to encryption certificates?&lt;br /&gt;
* How are your content and personal data treated in the End User Licence Agreement and Privacy Policy or Data Use Policy? With whom are they shared? For a useful add-on which helps users understand the Terms of Service of many popular sites, see '''Terms of Service; Didn't Read''' – https://tosdr.org&lt;br /&gt;
* What privacy options are provided for users? Can we choose to share our videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* '''Is the geographical location of the servers known?''' Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of our email activity and information?&lt;br /&gt;
&lt;br /&gt;
==== '''Creating a site of one’s own''' ====&lt;br /&gt;
&lt;br /&gt;
Some of us may be content with the tools we have discussed so far, and writing in our social network accounts, especially if we have found a more privacy-friendly option (see '''5.3 Alternative social networks'''), may be all we need to voice our opinions and to''' '''interact with a network of people (or with several networks, if we are using different identities when writing online). On the other hand, we may want a more independent platform to spread our ideas, plans or creations, and to do that we can create a website or a blog.&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' is as easy as signing up in a web service and choosing a name and a nice theme for our blog, and there are several blogging platforms around that are both user-friendly and free, like '''Wordpress.com'''. Equally based on the free and open-source blogging tool Wordpress, but with some tweaks for additional user privacy, there are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs '''– [http://noblogs.org/ http://noblogs.org] – and Nadir’s '''BlackBlogs '''– [http://blackblogs.org/ http://blackblogs.org]. To open them, all that is needed is to have an email account hosted in an autonomous server (see &amp;lt;nowiki/&amp;gt;https://www.autistici.org/en/links.html &amp;lt;nowiki/&amp;gt;and &amp;lt;nowiki/&amp;gt;https://blackblogs.org/policy &amp;lt;nowiki/&amp;gt;respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
All these platforms offer enough space for normal blogging activities and are very easy to use, but if we want to actively create our site from scratch, perhaps because we want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, what we really should do is find some space in a server for our '''website''' and perhaps to associate it to our domain of choice.&lt;br /&gt;
* Webhosting services are many, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If we want to have our own '''domain''', bypassing payments and identifications may get difficult unless we use Bitcoin or another anonymous payment system, and the personal data we will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command (whois) or on several websites such as Gandi: Whois (https://www.gandi.net/whois). To avoid this, we can register our domain giving the data of an association and using a prepaid credit card that is not connected to our data (if available in our country), or else we can use a registrar like Gandi.net ([https://www.gandi.net/ https://www.gandi.net]) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
=== '''5. Managing collective online identities''' ===&lt;br /&gt;
&lt;br /&gt;
==== '''Collective virtual personas''' ====&lt;br /&gt;
&lt;br /&gt;
From General Ludd to Captain Swing, from the Guerrilla Girls to Luther Blissett to Anonymous, for centuries several groups and like-minded people have participated anonymously in historic protest movements or have created ground-breaking and provoking artworks or pranks attributing them to a collective pseudonym that, besides hiding their identity as individuals, has shrouded their feats in an aura of myth and almost magical power.&lt;br /&gt;
&lt;br /&gt;
Several essays have been written on the topic, and the fascination of pseudonymity and shapeshifting has perhaps its roots in the dawn of humanity, but what counts is that we can choose to adopt a collective identity that already exists, like Anonymous/Anonymiss, or create a new one that we want to share with our own group or with the rest of the world.&lt;br /&gt;
* A very interesting study on multiple identities online is anthropologist Gabriella Coleman’s book ''Hacker, Hoaxer, Whistleblower, Spy. The Many Faces of Anonymous ''(2014), based on an anthropological research on how Anonymous has become a well-known and powerful collective identity with multiple faces and attitudes.&lt;br /&gt;
&lt;br /&gt;
* In her PhD dissertation ''Networked Disruption. Rethinking Oppositions in Art, Hacktivism and the Business of Social Networking ''(2011), Tatiana Bazzichelli also describes how multiple identities have been used to disrupt the fundamental notions of power and hegemony on which Western culture is based, and how this works in the web today.&lt;br /&gt;
&lt;br /&gt;
==== '''Managing collective identities... or simple collective accounts''' ====&lt;br /&gt;
&lt;br /&gt;
While the collaboration of many individuals can help creating a rich collective identity that is even more credible, given the many character traits we can think up with an enthusiastic, imaginative group of people, managing a collective project may have some further security and technological challenges we should keep in mind.&lt;br /&gt;
&lt;br /&gt;
As we stressed above, security is a chain, and a single weak link can break the entire system. Therefore, our security and anonymity depend on the precautions each member of our group takes. We may decide that we don’t want to be absolutely anonymous, that our close friends can know about our collective activities, and the degree of security we may want to attain for our group depends on the possible threats we face and on our adversaries’ power and skills. Nonetheless, there are some important assets we would certainly not want to loose, like for instance the password to our collective mailbox or to our group’s social network accounts. Therefore, if we decide that we are going to share those passwords with the whole group, we’d better train each member on how to store a password securely or make sure that they have learnt the password by heart and don’t keep it on a post-it next to their desk at work (see '''3.2 Creating and using strong passwords''').&lt;br /&gt;
&lt;br /&gt;
Whenever possible, we should try to use services that provide for different accounts and passwords. For example, instead of using a single mailbox for contact, we may create a mailing list that allows non-subscribed people to write to it and have all the members of the group subscribe to it, so that if someone writes to the group they can all read the e-mail in their own mailbox rather than in a collective one with a dangerously shared password. Similarly, if coordination really needs to happen through Facebook, it is much better to share information in a dedicated group rather than do everything within a collective account (which also risks to be deleted due to violation of the terms of service, see '''2.3 Persistent Pseudonymity''' and '''5.2 Managing our identities on social networks''').&lt;br /&gt;
&lt;br /&gt;
=== '''6. A different machine for each identity''' ===&lt;br /&gt;
&lt;br /&gt;
If we use the same operating system for our several identities, no matter how carefully we separate our profiles, we can still make a human mistake, for example connecting to a pseudonymous account through the browser profile we have assigned to our true identity, or get infected by a malware that allows our attacker to monitor all we do online, with all our identities, and connect dots together.&lt;br /&gt;
&lt;br /&gt;
Both risks can be limited by using a virtual machine for each of our domains, and by reserving yet another virtual machine to opening fishy attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own OS which runs as software on our physical computer. We can think of a VM as a &amp;lt;em&amp;gt;computer within a computer&amp;lt;/em&amp;gt;. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For our purposes of anonymization, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org), and to run Whonix in a virtual machine created with Virtualbox.&lt;br /&gt;
&lt;br /&gt;
==== '''Whonix: compartmentalizing our identities through a secure virtual machine''' ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix '''(https://www.whonix.org) is an operating system that aims at protecting our anonymity, privacy and security by helping us use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. It is a complete operating system designed to be used in a virtual machine. It is Free Software and based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. &lt;br /&gt;
&lt;br /&gt;
Whonix’s website offers a wide documentation, ranging from very clear installation and usage instructions to thorough recommendations on security and the risks we may run: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== '''Tails: a live system that leaves no traces''' ====&lt;br /&gt;
&lt;br /&gt;
Using virtual machines, Whonix in particular, is a good idea if we have our own computer where we are free to install whatever we want, especially if it is a powerful machine. But if we use an older box or just connect to the internet from cybercafes, installing a virtual machine becomes unsustainable. In this case, we may turn to a live Linux distribution, a USB-stick with a Linux operating system installed on it that runs in the computer we are using as soon as we switch it on.&lt;br /&gt;
&lt;br /&gt;
A particularly secure live distribution focused on security and anonymity is '''Tails''', or '''The Amnesic Incognito Live System''', a free and open-source Debian-based Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections.&lt;br /&gt;
&lt;br /&gt;
When we launch Tails, we have a complete operating system that, just as Whonix, comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, we can access the internet, communicate, and do all we need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless we ask it to do so.&lt;br /&gt;
&lt;br /&gt;
When using different identities, it is not advisable to use the same Tails session to perform two tasks or endorse two contextual identities that we really want to keep separate from another, for example hiding our location to check our personal email and publishing a document on our pseudonymous blog.&lt;br /&gt;
&lt;br /&gt;
The first reason is that Tor tends to reuse the same circuits, for example amongst a same browsing session, making it easier for a powerful adversary to correlate the several browsing requests as part of a same circuit and possibly made by a same user. Second, in case of a security hole or a misuse in using Tails or one of its applications, information about our session could be leaked. That could reveal that the same person was behind the various actions made during the session.&lt;br /&gt;
&lt;br /&gt;
T''he solution to both threats is to shut down and restart Tails every time we are using a new identity''.&lt;br /&gt;
&lt;br /&gt;
==== '''Security by isolation: Qubes OS''' ====&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting us; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, the most pessimistic, and realistic, approach is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that we want to secure.&lt;br /&gt;
&lt;br /&gt;
In order to implement security by isolation, for instance, '''Whonix''' is divided into two parts: Whonix-Workstation, which is the system we access for our work, and Whonix-Gateway, which routes all internet traffic through Tor and, by being isolated from the workstation, averts many threats posed by malware, misbehaving applications, and user error.&lt;br /&gt;
&lt;br /&gt;
But while Whonix needs a virtual machine to run on and its main focus is anonymization, there is an operating system that has security by isolation as its main purpose and that can make life a lot easier to someone who manages several social domains and/or identities in her digital life.&lt;br /&gt;
&lt;br /&gt;
Called '''Qubes OS''' – https://www.qubes-os.org – and developed by computer security researcher Joanna Rutkowska, Qubes is a free and open-source security-oriented operating system based on '''Fedora''', a Linux distribution, and '''Xen''', a virtual machine monitor (or hypervisor), that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things we do on our computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, we can do everything on a single physical computer without having to worry that one successful cyberattack harms our whole system, potentially revealing all the connections among our several identities.&lt;br /&gt;
&lt;br /&gt;
A plus of Qubes OS for the purposes of multiple identities management is its user-friendly window manager, that assigns a different colour to each domain. Thus, the colour of the frame makes each window clearly recognizable as belonging to the domain corresponding to that colour and prevents potential human mistakes in the management of our identities.&lt;br /&gt;
&lt;br /&gt;
==== '''Tails, Whonix, Qubes OS: how to choose''' ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described in the last few paragraphs – Whonix, Tails and Qubes OS – all allow us to use a completely separate operating system for managing our alternate identities, and can be quite useful to make sure that we don’t reveal our true identity while we use the anonymous one(s). Still better, if we can afford it, would be to have a different machine for each of our identities, as well as an air-gapped one to store our most sensitive data. Of course, the choice depends on the resources we can dedicate to securing our digital life and on our threat-model, especially on the adversaries we expect to face: if we are pretty sure that in our country harassers work together with the regime to slander (or worse) people like us, we may want to be absolutely sure that none of our data is leaked and – if we have enough funds or are connected to a network of hacktivists – we may decide to ask for an expert’s help to check that we have taken all the necessary measures to keep doing an efficient work and to stop any ill-intentioned actors from tampering with our data. On the other hand, if we feel sufficiently protected by our community and/or by our government, and we expect our adversaries not to be very skilled in technological matters, perhaps all we need is to separate our browser profiles and mailboxes, to use a secure HTTPS connection and some basic common sense and to keep developing a network of support for vocal women online.&lt;br /&gt;
&lt;br /&gt;
If we think that using a different operating system is really necessary, or that it can be helpful to keep things logically and graphically separated (or we just want to explore all the possibilities we have for the fun of it!), we should assess our resources and our needs in order to identify the best solution for us.&lt;br /&gt;
&lt;br /&gt;
''Comparison between Tails, Whonix and Qubes Os:''&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Tails'''&lt;br /&gt;
!'''Whonix'''&lt;br /&gt;
!'''Qubes OS'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Required hardware/software'''&lt;br /&gt;
|&amp;quot;x86 compatible and/or Virtual Machines; DVD, USB stick, or SD card for booting the system&amp;quot;&lt;br /&gt;
|&amp;quot;x86 compatible pc with VirtualBox&amp;quot;&lt;br /&gt;
|&amp;quot;a powerful pc capable of running Qubes OS&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''System requirements'''&lt;br /&gt;
|&amp;quot;lowest&amp;quot;&lt;br /&gt;
|&amp;quot;high&amp;quot;&lt;br /&gt;
|&amp;quot;highest&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Difficulty to install'''&lt;br /&gt;
|&amp;quot;medium&amp;quot;&lt;br /&gt;
|&amp;quot;medium&amp;quot;&lt;br /&gt;
|&amp;quot;easy&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Difficulty to configure'''&lt;br /&gt;
|&amp;quot;low&amp;quot;&lt;br /&gt;
|&amp;quot;medium&amp;quot;&lt;br /&gt;
|&amp;quot;high&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Learning curve'''&lt;br /&gt;
|&amp;quot;low&amp;quot;&lt;br /&gt;
|&amp;quot;low&amp;quot;&lt;br /&gt;
|&amp;quot;high&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Anonymization by default'''&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|&amp;quot;no&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Security by isolation'''&lt;br /&gt;
|&amp;quot;no&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Pre-installed applications'''&lt;br /&gt;
|&amp;quot;nice selection&amp;quot;&lt;br /&gt;
|&amp;quot;not many&amp;quot;&lt;br /&gt;
|&amp;quot;not many, and some, like Tor or Virtualbox cannot be installed at all&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Persistence'''&lt;br /&gt;
|&amp;quot;no (available option)&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
As we can see in the table above, '''Tails''' just needs a normal computer and a DVD or a bootable device to launch the system, but installing the system in this device, as well as having the DVD, USB stick or SD card actually boot in the computer we are using, can be tricky, and we may need some external help. After that, though, using Tails is pretty easy, and if what we need to do with our alternate persona needs a focus on ''anonymization'', then it may be worthwhile to overcome the initial obstacle. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. One particular advantage of Tails is that after we have switched the computer off, we leave no traces and everything we have done vanishes into thin air. But if on the other hand we need ''persistence'', i.e. we want to keep some files we have created or downloaded in our USB stick or we have changed some system settings and want to keep them also in the future, we need to enable this option when we start the system. Last but not least, Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what we need is both ''anonymity'' and ''security by isolation'' and we have a good machine – https://www.whonix.org/wiki/System_Requirements – where we can run Virtualbox, installing '''Whonix''' in one or more virtual machines, according to the number of our alternative identities, seems a good solution that caters to all our needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if we want to keep all our activities inside our own computer without having to install anything else and if what we are trying to do is to effectively ''separate'' our identities rather than anonymize our activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if we feel that we really need to protect ourselves against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protects us from every threat, and we shouldn’t look at them as a magic potion that will make us invulnerable. Nevertheless, by using any of them, according to our needs and resources, we will raise the level of effort that an attacker will need to harm us, thus making an attack less likely.&lt;br /&gt;
&lt;br /&gt;
For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&amp;lt;nowiki/&amp;gt;&amp;lt;nowiki/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Step_1&amp;diff=1257</id>
		<title>Step 1</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Step_1&amp;diff=1257"/>
				<updated>2015-05-27T15:16:48Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
=== Understanding and minimising our digital shadows ===&lt;br /&gt;
&lt;br /&gt;
The internet is a great space to explore, learn, speak up, listen and communicate with people across the world. Unfortunately, the internet has also become a space where people who challenge the dominant discourse often find themselves under attack. These attacks can be very personal - enabled by the fact that there is often a lot of personal information about us on the internet. &lt;br /&gt;
&lt;br /&gt;
To strengthen our defences against these kinds of attacks, it’s a good idea to start by our assessing our '''digital shadows'''. These shadows - can tell a story about us: who we are, were we live and hang out, what we are interested in, and who our friends and colleagues are. &lt;br /&gt;
&lt;br /&gt;
This can expose us to several threats. In particular, it is the publicly available traces we leave behind that expose us to online harassment. &lt;br /&gt;
&lt;br /&gt;
However, there are also many '''strategies''' and '''tools''' we can use to shape or control our digital shadows, to increase our privacy, and ultimately to be more secure, both online and offline - without being less vocal or reducing our activity online.  &lt;br /&gt;
&lt;br /&gt;
Some examples of these include controlling the amount of data we give away by consciously stripping valuable information from content and metadata; trying the art of self doxxing; and thinking about ways to play with and break up our online identity.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== '''What is a digital shadow?''' ====&lt;br /&gt;
&lt;br /&gt;
Our digital shadows can be defined as the stories data tells about us. These digital shadows are created by trillions of bits of data, digital traces we leave everyday when we connect to the Internet, our mobile phone and online services. Our digital shadows have a life of their own, are affected by others and change in unpredictable ways. Our digital shadows grow continuously, can be permanent permanent and we have little control over them. These traces are a spectre of our past and present activities, which melt together in a permanent and ever-changing profile.&lt;br /&gt;
&lt;br /&gt;
''How are these trillion bits of data created?'' The devices and the software we use to browse the Internet, access websites, connect to social networking platforms like Facebook and Twitter, publish blog posts, receive phone calls, send SMS messages or emails, chat, or buy things online, all create specific bits of data about us. These bits of data can include our name, location, contacts, pictures, messages, tweets and likes, but also the brand of our computer, length of our phone calls and information about which websites we visit. These data traces can be put out there by ourselves as well as other people. &lt;br /&gt;
&lt;br /&gt;
''How do we share data?'' In some cases we '''actively '''share data – for example when we share photos on Facebook, book a flight ticket online or contribute to a wiki. Other people can also actively share data about us, by tagging us in pictures, mentioning us in tweets or simply by communicating with us. In other cases, we give away data without necessarily realising it, or consenting to it. &lt;br /&gt;
Our browsing habits and IP address are shared when we visit a website by means of &amp;quot;cookies&amp;quot; and other tracking technologies, which are active in the background. These technologies are embedded in the websites we visit, and the information shared is collected for a wide range of purposes,  from website analytics to advertising. Our mobile phone apps also collect data on us without our active knowledge or consent – for example, the photos we take usually have location data embedded in them. These tracking technologies enable  web services to identify and follow us as we move from one service to another - from our internet browser to the IM (instant messaging) app in our smartphone, from downloading e-books in our readers to publishing pictures from the latest protest we have covered.&lt;br /&gt;
&lt;br /&gt;
''What is data?'' Data can be broken into three parts: ''content'', ''metadata'' and ''noise''. '''Content''' is the content of our messages, blogs, tweets and phone calls; it is our pictures and videos. '''Metadata''' is data about data, information that is needed for the technological infrastructure to work. Metadata enables our email to be delivered, help find files on our computer and permit mobile communication. Metadata can be our email address, phone number, location, time and date when a message was sent or stored. '''Noise''' is the data that is created by either the manufacturing process or by the workings of the infrastructure. For example, every camera has an SD card to record and store pictures. Every SD card has unique scratches that were created by the machines producing the SD cards. These scratches make small changes to the data that are not visible to the eye but can be recognized by computers.&lt;br /&gt;
&lt;br /&gt;
==== '''Who is collecting our data, and why?''' ====   &lt;br /&gt;
&lt;br /&gt;
We might wonder about the importance of one picture or one message, or think there is so much data out there that nobody knows what to do with it. However, data collection and data analysis has become very sophisticated. &lt;br /&gt;
&lt;br /&gt;
The data traces you leave are collected, analysed and sorted by various parties to create digital shadows, or '''profiles'''. Every time a new piece of data is collected, it can be identified and added to your profile. These profiles are ever-expanding, and give those who create them or who have access to them an immense insight into who you are. &lt;br /&gt;
&lt;br /&gt;
Data is collected by companies, governments and individuals for a variety of purposes. It can be bought and sold; it can be used to control; or it can be used to create harassment strategies.&lt;br /&gt;
&lt;br /&gt;
Our digital shadows or profiles can be used to gain insight into who we are, what we do and where we have been. This data can then be used to make predictions on what we might do or where we might be in future. For example, if someone knows that we are an outspoken blogger on gender issues in country x, they know that we will probably be present at a conference on blogging and women held in that country. Profiles can also give potential harassers the ability to harass us across different platforms.  &lt;br /&gt;
&lt;br /&gt;
Anyone could potentially have access to our digital shadow – including communications service providers, law enforcement agencies and commercial companies, as well as groups and individuals running their own servers. We can't know exactly what is happening to our digital shadow, and that itself is a problem. &lt;br /&gt;
&lt;br /&gt;
However, there are tools and tactics we can use to manage our digital shadows and to limit their ramifications in terms of profiling and surveillance. This will be discussed in the rest of this section.&lt;br /&gt;
&lt;br /&gt;
==== '''Exploring our own digital shadow''' ====&lt;br /&gt;
&lt;br /&gt;
As we mentioned before, anyone can potentially access to our digital shadow – including communications service providers, law enforcement agencies and  companies, as well as groups and individuals running their own servers.  We cannot know precisely what happens to our digital shadow and that itself is a problem. But there are tools and tactics to manage our digital shadow and to limit its ramifications in terms of  profiling and surveillance.&lt;br /&gt;
&lt;br /&gt;
Some good places to start are:&lt;br /&gt;
&lt;br /&gt;
* Exploring our individual digital shadow with '''Trace My Shadow''' – https://myshadow.org/trace-my-shadow – a tool launched by Tactical Tech, accompanied by a website that offers a lot of tips on how to protect our privacy and control our digital shadow: https://myshadow.org&lt;br /&gt;
* Identifying and materialising social networks across our online and physical activities: John Fass, researcher and designer at the Royal College of Art, has created some activities to materialise our social networks and browser history &amp;lt;u&amp;gt;' ''[insert link].'''&amp;lt;/u&amp;gt; &lt;br /&gt;
* Seeing through the eyes of our mobile phone by installing a tool called '''openpath.cc'''. Some of our apps can see the same things. Read the Terms of Service carefully and explore if you can change the access settings in your phone. On an iPhone we can change the permissions for each app under its privacy setting.&lt;br /&gt;
&lt;br /&gt;
==== '''Controlling what we share: content and metadata''' ====&lt;br /&gt;
&lt;br /&gt;
The good news is that we can partly control what content and metadata we give away. &lt;br /&gt;
&lt;br /&gt;
When we publish content on the web, it is always a good idea to ask ourselves if what we are posting is public or personal and who could have access to it. Even if the information is connected to a public event and not to our personal lives, the names we mention or the images we upload may contribute to a picture about who we are, what we are doing, where we are doing it and so on. This could be used by people who wish to target us. &lt;br /&gt;
&lt;br /&gt;
This does not mean that we should silence ourselves – by taking some basic measures, we can limit our risks by increasing the level of the effort that would be required to attack us or our contacts.&lt;br /&gt;
&lt;br /&gt;
* When '''sharing personal details about our life''', we can use private profiles that can only be accessed by selected contacts. When using private profiles on commercial social media, we should be aware of the regular changes to the privacy policies of that platform. This can have an impact on how “private” our profiles are. There have been cases where privacy settings have been changed, exposing pictures, content and the conversations of private groups.&lt;br /&gt;
&lt;br /&gt;
* When '''writing or posting images about public events''' on the web and on publicly accessible social network profiles, we should ask ourselves if the information we spread about single individuals, places and other details could be used to identify and/or attack someone. It is always a good idea to ask for '''permission''' to write about individuals and perhaps also to post information on public events only after they are finished.&lt;br /&gt;
&lt;br /&gt;
*  '''Faces in pictures can be anonymised''' with a tool called ObscuraCam, a free camera application for Android devices.  https://guardianproject.info/apps/obscuracam&lt;br /&gt;
&lt;br /&gt;
* '''When giving personal information to a web service''', it’s best to use HTTPS so that the communication channel is secure (see the section on security measures for more on this). &lt;br /&gt;
&lt;br /&gt;
* '''Use strong passwords''', and '''use different passwords''' for each web service you use - if you you the same password for multiple services and someone intercepts your password for one of these services, they could use it to access your other accounts.&lt;br /&gt;
&lt;br /&gt;
* When '''registering a device''' or software such as Microsoft Office, Libre Office, Adobe Acrobat and others, not usingy our real name can help prevent the metadata created when using this device or software from being connected to you. You can also '''switch off the GPS tracker''' in your phone or camera.&lt;br /&gt;
&lt;br /&gt;
* Some file types contain more metadata than others, so '''when publishing contents online''' you can change files from ones that contain a lot of metadata (such as .doc and .jpeg) to ones that don’t (such as .txt and .png), or we can use plain text.&lt;br /&gt;
&lt;br /&gt;
*  '''Remove metadata from image files''' by using Metanull for Windows: https://securityinabox.org/en/lgbti-africa/metanull/windows&lt;br /&gt;
&lt;br /&gt;
* For '''editing or removing hidden data from PDF files''', Windows or MAC OS users can use programs such as Adobe Acrobat XI Pro (for which a trial version is available). GNU/Linux users can use PDF MOD, a free and open source tool. However, it doesn’t remove the creation or modification timestamp, and it also doesn’t remove the information about the type of device used to create the PDF. &lt;br /&gt;
&lt;br /&gt;
* For more on '''removing metadata from different file formats''', see Tactical Tech's https://securityinabox.org/en/lgbti-mena/remove-metadata.&lt;br /&gt;
&lt;br /&gt;
* You can '''prevent the tracking and collection of metadata''' through your browser by installing add-ons like '''Privacy Badger''' or Adblock Plus, as well as by monitoring our privacy settings and deleting cookies on a regular basis.&lt;br /&gt;
&lt;br /&gt;
* Using '''Tor''' will '''hide specific metadata like our IP address''', thereby increasing our anonymity online.&lt;br /&gt;
&lt;br /&gt;
===='''Social domains'''====&lt;br /&gt;
&lt;br /&gt;
As security expert Bruce Schneier explains, “Security is a chain, and a single weak link can break the entire system”.&lt;br /&gt;
&lt;br /&gt;
Each of us belongs to several '''social domains''' - our work or advocacy networks, our family networks, friends, and sports teams. &lt;br /&gt;
&lt;br /&gt;
Some of these networks may be more secure than others. For example, we may tend to have a more secure communication practices for our work or advocacy activities, but less secure practices for interacting with friends on a social network. Areas where these domains intersect can turn into a threat to our security. &lt;br /&gt;
&lt;br /&gt;
If we use a single identity in all our domains, it becomes easier to gather information about us and to identify our vulnerabilities. For example, if we reveal in a social network that we like a particular kind of game and that we download files with a p2p program like Emule, an attacker who wants to investigate our work or advocacy activities might trick us into downloading a game which is infected with spyware. &lt;br /&gt;
&lt;br /&gt;
This attacker is interested in our advocacy activities, but knows that we have increased privacy and security measures for that part of our lives. The attacker also knows that our love of games is a digital weak spot as this network is not encrypted. Thus the attacker can exploit this part of our lives to gain access to another, more secure part. &lt;br /&gt;
&lt;br /&gt;
This is only possible, however, if our work identity and our Emule profile can be connected to the same person; and this is why separating our social domains can be useful. More on how to do this will be addressed later on, when we talk about identity management.&lt;br /&gt;
&lt;br /&gt;
==== '''Self-Doxing''' ====&lt;br /&gt;
&lt;br /&gt;
'''Doxing''' (also written as &amp;quot;doxxing&amp;quot;, or &amp;quot;D0xing&amp;quot;, a word derived from &amp;quot;Documents&amp;quot;, or &amp;quot;Docx&amp;quot;) describes tracing or gathering information about someone using sources that are freely available on the internet. This method depends on the ability of the attacker to recognise valuable information about their target, and to use this information for their own ends. &lt;br /&gt;
&lt;br /&gt;
Doxing is premised on the idea that &amp;quot;The more you know about your target, the easier it will be to find his or her flaws”.&lt;br /&gt;
&lt;br /&gt;
Harassers and stalkers use several tools and techniques to gather information about their targets, but since these tools and techniques are mostly public and easy to use, we can also use them ourselves. &amp;quot;Self-doxing&amp;quot; ourselves can help us to make informed decisions about what we share online, and how. Of course, these same instruments can also be used to learn more than is immediately obvious about someone we have met online before we give them our full trust.&lt;br /&gt;
&lt;br /&gt;
'''Methods used for doxing''' include exploring archives, yellow pages, phone directories and other publicly available information; querying common search engines like Google or DuckDuckGo (https://duckduckgo.com); looking for a person's profile in specific services; searching for information in public forums and mailing lists; or looking for images that the target has shared (and for instance may have also published in another, more personal, account). But it can also simply consist in looking up the public information on the owner of a website, through a simple &amp;quot;whois search&amp;quot; (see the section on &amp;quot;Creating a site of one’s own&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
We can use these same tools to explore what can be easily found out about us by others. &lt;br /&gt;
&lt;br /&gt;
Before we start exploring these web services and looking for our digital self, a good idea is to use anonymisation tools like Torbrowser.&lt;br /&gt;
&lt;br /&gt;
* Useful tips on how to self-dox are available here: https://lilithlela.cyberguerrilla.org/?page_id=93870 &lt;br /&gt;
* For more about (self-)doxing tools and techniques, visit: https://modelviewculture.com/pieces/investigation-online-gathering-information-to-assess-risk &lt;br /&gt;
* A useful (and creepy!) tool to learn what traces we have left behind in our Facebook account is Ubisoft’s '''Digital Shadow''', a Facebook app which illustrates what third parties can know about us through our Facebook profiles: https://digitalshadow.com&lt;br /&gt;
&lt;br /&gt;
==== '''Can we remove our digital past? Creating new identities''' ====&lt;br /&gt;
''&lt;br /&gt;
&amp;quot;Once something is on the internet it will stay on the internet, as the internet does not forget&amp;quot;.'' &lt;br /&gt;
&lt;br /&gt;
We may think that deleting certain sensitive data from social networks and web services may be enough to protect ourselves, but metadata cannot be deleted as easily.  And using just one identity through our whole life - in all our work and personal domains - creates a bulk of information that could be used to profile or attack us. &lt;br /&gt;
&lt;br /&gt;
One option to avoid this is to leave an old identity behind and create a new one or several new ones - one for each of our social domains. We might also choose to use our real identity in some areas, and our new alternative identities in others. &lt;br /&gt;
&lt;br /&gt;
* When we create a new identity, we should select the contacts for each one carefully, and avoid sharing contacts with other identities we use for different activities. This effectively creates separate social domains, with separate accounts, mail addresses, browser profiles, apps, and possibly even devices.&lt;br /&gt;
&lt;br /&gt;
* It's important to make sure that our various identities are not linked in any way to each other, or to our real identity. Remember that some of these connections can be tenuous: for example, did you sign up for a new, pseudonymous Gmail account using your real phone number? &lt;br /&gt;
&lt;br /&gt;
* Treating each of our extra identities as potentially disposable can be useful, as they can be discarded easily if it is compromised.  &lt;br /&gt;
&lt;br /&gt;
* Disposable identities can be created for new acquaintances where appropriate – introductory profiles we can use to get to know somebody before we include them in a more trusted network.&lt;br /&gt;
 &lt;br /&gt;
To learn more about how to separate different identities into separate profiles, read the section on “Managing multiple online identities”.&lt;br /&gt;
&lt;br /&gt;
==== '''Deleting identities''' ====&lt;br /&gt;
&lt;br /&gt;
If we decide to separate our domains by creating multiple identities, one of the first decisions we should make is whether to delete or keep the identity or identities that we already have.  &lt;br /&gt;
&lt;br /&gt;
To do this, we can start by investigating the traces of our existing identity or identities. (for methods and tools for following your own digital traces, see &amp;quot;Exploring your digital shadow&amp;quot; and &amp;quot;Self-Doxing&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
If we want to delete existing accounts:&lt;br /&gt;
* The '''Suicide Machine''' (http://suicidemachine.org/) is a tool that facilitate the process of deleting social network profiles. The Suicide Machine was forced to stop deleting Facebook accounts, but instructions on how to do this are here: https://www.facebook.com/help/224562897555674&lt;br /&gt;
* '''AccountKiller''' (https://www.accountkiller.com) has  instructions on how to remove accounts or public profiles on most popular websites.&lt;br /&gt;
* '''JustDelete Me''' (http://justdelete.me) is a directory of direct links to delete accounts from web services.&lt;br /&gt;
&lt;br /&gt;
==== '''Mapping our social domains''' ====&lt;br /&gt;
To separate our social domains, it's helpful to first map them out and identify which ones could expose us most to cross-domain attacks. &lt;br /&gt;
&lt;br /&gt;
We can do this by thinking about our different activities and networks, and reflecting how sensitive each of these is. This will enable us to better separate the domains that are sensitive from those that are not.&lt;br /&gt;
&lt;br /&gt;
Partitioning one’s digital life into separate social (or &amp;quot;security&amp;quot;) domains requires some thinking. &lt;br /&gt;
&lt;br /&gt;
Polish computer security researcher Joanna Rutkowska has worked extensively on this, to the point that she developed  a security-oriented Linux distribution based on the concept of “security by isolation” (called Qubes OS). In this system, each social domain is isolated in a separate virtual machine. While Rutkowska's scheme is quite sophisticated and focused on her operating system, it can give us interesting insights on how to start thinking about separating our domains. &lt;br /&gt;
&lt;br /&gt;
The three basic domains Rutkowska identifies for herself are “work”, “personal”, and “red” (the untrusted, insecure area).&lt;br /&gt;
&lt;br /&gt;
* The '''work''' domain includes her work email, where she keeps her work PGP keys, where she prepares reports, slides, papers, etc. She also has a less-trusted “work-pub” domain for things like accepting LinkedIn invites or downloading pictures for her presentations. To add to this, she has a “work-admin” and a “work-blog” domain, in order to get a further level of security for managing her company’s servers and for writing on her blog.&lt;br /&gt;
&lt;br /&gt;
* The '''personal''' domain includes all the non-work-related stuff - such as personal email and calendar, holiday photos, videos, etc.  She adds to this with a special domain called “very-personal”, which she uses for the communication with her partner when she is away from home. The couple uses encrypted mails to communicate, and she has separate PGP keys for this purpose.&lt;br /&gt;
&lt;br /&gt;
* The '''red''' domain, on the other hand, is totally untrusted. This is where her disposable identities or profiles belong. Rutkowska uses this domain to do everything that doesn’t fit into other domains, and which doesn’t require her to provide any sensitive information.&lt;br /&gt;
&lt;br /&gt;
* Besides these three main domains, Rutkowska has several other separate domains. One is dedicated to '''shopping''', for accessing e-commerce sites. What defines this domain is access to her credit card numbers and her personal address (for shipping). Then there is the '''vault''' domain, the ultimately trusted place where she generates and keeps all her passwords (using KeePassX) and master GPG keys. Finally, she has a domain for all the Qubes development (&amp;quot;qubes-dev&amp;quot;), one for '''accounting''', and another one for '''work archives'''.&lt;br /&gt;
&lt;br /&gt;
Of course we don’t have to separate our domains in such a complex way, and using Qubes Os to keep them separated is just one solution – and one that requires a powerful machine to run on. Yet Rutkowska’s reflections on domain mapping can be an enlightening starting point to analyse our activities, and to separate our social domains for enhanced security.&lt;br /&gt;
&lt;br /&gt;
* Joanna Rutkowska’s article on security domains can be found here: http://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html&lt;br /&gt;
&lt;br /&gt;
=== '''2. Assessing risks and potentials: how to choose which online identity fits our purpose''' ===&lt;br /&gt;
&lt;br /&gt;
==== &amp;quot;'''Real&amp;quot; or virtual identity?''' ====&lt;br /&gt;
&lt;br /&gt;
Once we have identified our different social domains and the digital activities and contacts that go with them, what we need to do is decide if we want to differentiate our identities accordingly, or if we'd rather stick to our official name and true face for each of them. &lt;br /&gt;
&lt;br /&gt;
We may want to keep our work connected to our legal or &amp;quot;real&amp;quot; identity, or think that our activism should be anonymous, but these are decisions that need to be thought about carefully.&lt;br /&gt;
&lt;br /&gt;
For example, a journalist who finds it convenient to use her real identity for her writing may decide to stay in contact with her personal domain through a nickname, so that nobody can connect the two spheres together. &lt;br /&gt;
&lt;br /&gt;
On the other hand, if an activist decides that she wants to use a pseudonym for her online activities, she should consider that she will be showing her face in all her connected activities in the real world, such as speaking at conferences or participating in demonstrations. Her online pseudonym will therefore be linked to her face; but her face could also be linked to her real name on social networks, and her online activist identity unmasked. &lt;br /&gt;
&lt;br /&gt;
In assessing which identity to use in a given context, it's helpful to consider the following questions:&lt;br /&gt;
&lt;br /&gt;
* Would my job, livelihood or safety be at risk if my real identity were known in this context?&lt;br /&gt;
&lt;br /&gt;
* Would my mental health or stability be affected if my participation in X were known?&lt;br /&gt;
&lt;br /&gt;
* Would my family or other loved ones be harmed in any way if my real identity became known in this context?&lt;br /&gt;
&lt;br /&gt;
* Am I able and willing to maintain separate identities safely?&lt;br /&gt;
&lt;br /&gt;
Once we have '''assessed our risk,''' we can then consider different strategies for separating our identities online. &lt;br /&gt;
&lt;br /&gt;
For more on assessing risk, visit: https://ssd.eff.org/en/module/introduction-threat-modeling  &lt;br /&gt;
&lt;br /&gt;
==== '''Strategies for separating identities online''' ====&lt;br /&gt;
&lt;br /&gt;
'''strategies''' for maintaining separate identities can range range full transparency to full anonymity.&lt;br /&gt;
&lt;br /&gt;
Author Kate Harding talks about her decision to start writing under her real name, dismissing the recommendations that are generally given to bloggers to follow practices like “writing under a pseudonym, making that pseudonym male or gender-neutral if you’re one of them lady bloggers... masking one’s personal information, being circumspect about publishing identifying details, and not writing anything that might inflame the crazies”. &lt;br /&gt;
&lt;br /&gt;
Instead of putting responsibility on women, Harding says, problems of harassment should be handled by society as a whole, including men. However, she also acknowledges that the decision is dangerous one.&lt;br /&gt;
http://kateharding.net/2007/04/14/on-being-a-no-name-blogger-using-her-real-name&lt;br /&gt;
&lt;br /&gt;
In &amp;quot;The Girl's Guide to Staying Safe Online,&amp;quot; Sady Doyle writes that while becoming visible &amp;quot;creates a specific vulnerability&amp;quot;, giving up on our online activities is exactly what the misogynists and harassers expect from us - and so the best way to ‘stay safe’ online may simply be to stay online. &amp;quot;After all: If there’s no one left willing to complain about the harassment, what are the odds that it’s going to change?”&lt;br /&gt;
http://inthesetimes.com/article/12311/the_girls_guide_to_staying_safe_online&lt;br /&gt;
&lt;br /&gt;
As such, we have several options available to us: We can attempt to participate online anonymously. We can use a &amp;quot;persistent pseudonym&amp;quot;.  We can identify fully with our real or legal name, or we can divide our online lives, using our real or legal name sometimes and a pseudonym at other times. The following section will explore the pros and cons of each option, so we can determine which options are best for each one of us.&lt;br /&gt;
&lt;br /&gt;
==== '''Anonymity''' ====&lt;br /&gt;
Total anonymity can be both isolating and difficult to maintain, but is useful in settings where we don't need to gain other people's trust, when there are few or no people we can trust, or when we don't want to expose others in our life to risks. &lt;br /&gt;
&lt;br /&gt;
Anonymity may be a good choice in certain specific situations, such as researching or participating in message boards about health issues, or when sharing sensitive information. We may wish to set up a one-time account, using a pseudonym, to comment on a blog or news site, or a one-time email account or chat session to discuss sensitive information with others.&lt;br /&gt;
&lt;br /&gt;
On anonymity, Vani, a human rights activist, writes: “I am a regular social network user. I voice my opinions on a range of topics. But I remain faceless and nameless”. [http://internetdemocracy.in/media/women-bloggers-seek-safety-in-anonymity speaks of their participation on social networks anonymously]&lt;br /&gt;
&lt;br /&gt;
But while anonymity is a good option in many situations, it can also be dangerous in some countries, where it can signal to the state police that the author thinks they are doing something wrong. This strategy can also be lonely: “Anonymity also isolates you”, a blogger writes. “Can you have a network to protect you and also be anonymous at the same time? Would visibility be a better strategy for you?”&lt;br /&gt;
&lt;br /&gt;
Anonymity differs from &amp;quot;persistent pseudonymity&amp;quot;. When we adopt anonymity as a strategy we may use pseudonyms, but these pseudonyms are not used across different networks or social domains, and some may only be used once and then discarded. For more information on how to be anonymous online, see '''Anonymizing tools'''.&lt;br /&gt;
&lt;br /&gt;
==== '''Persistent Pseudonymity''' ====&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity involves using a pseudonym consistently over a period of time. &lt;br /&gt;
&lt;br /&gt;
The Oxford English Dictionary defines a pseudonym as &amp;quot;a fictitious name, especially one used by an author.&amp;quot; In the age of the internet, a pseudonym may also be referred to as a &amp;quot;nickname&amp;quot; or &amp;quot;handle&amp;quot;, though the latter can also be tied to a person's legal identity. &lt;br /&gt;
&lt;br /&gt;
Jillian C. York, in a blog post for the Electronic Frontier Foundation, writes: &amp;quot;There are myriad reasons why individuals may wish to use a name other than the one they were born with. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent discrimination or they may use a name that’s easier to pronounce or spell in a given culture.&amp;quot;&lt;br /&gt;
https://www.eff.org/deeplinks/2011/07/case-pseudonyms&lt;br /&gt;
&lt;br /&gt;
Pseudonymous speech has played a critical role throughout history, says York. &amp;quot;From the literary efforts of George Eliot and Mark Twain to the explicitly political advocacy of Publius in the Federalist Papers or Junius' letters to the Public Advertiser in 18th century London, people have contributed strongly to public debate under pseudonyms and continue to do so to this day.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
A pseudonym can be name-shaped (e.g., &amp;quot;Jane Doe&amp;quot;) or not. At time of writing, some websites - including Facebook - require that users use their &amp;quot;authentic identity,&amp;quot; which typically means using your legal name or the name by which you are commonly known. This policy has caused some users, such as a group of drag performers in California, to lose their Facebook accounts. If we choose to use a pseudonym on social networks, it is important to understand that a risk of doing so is being reported for using a &amp;quot;fake name&amp;quot; and having one's account deleted. A strategy for avoiding that is using a name-shaped pseudonym.&lt;br /&gt;
https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community&lt;br /&gt;
&lt;br /&gt;
Persistent pseudonymity also offers us '''visibility'''. Visibility allows us to network with others, and by pinning our voice to a particular name we can develop an '''online reputation'''. An online reputation allows others to decide whether we are worthy of trust, and is therefore a crucial aspect in trust-based online communities. Reputation can be developed by consistently using a nickname or pseudonym that can either be connected to our legal identity, or not. The choice to connect our online reputation to our &amp;quot;real&amp;quot; name should be taken individually, according to needs and context. &lt;br /&gt;
&lt;br /&gt;
It is also possible to maintain multiple pseudonyms (and reputations) for different purposes. For example, a person involved in the gaming community and LGBTQI rights activism may wish to maintain separate identities for each purpose, and can build trust within each community separately doing so.&lt;br /&gt;
&lt;br /&gt;
==== '''Collective Identity''' ====&lt;br /&gt;
&lt;br /&gt;
Another way to be anonymous is through collective participation. This could mean a number of things, from a private group or mailing list that puts out collective statements, to a shared Twitter account. While the same security concerns apply, working from behind a collective identity means having the power of the crowd behind you, and can be a good option if you don't wish to reveal your identity. &lt;br /&gt;
&lt;br /&gt;
==== Comparing strategies ====&lt;br /&gt;
&lt;br /&gt;
Whatever choice we make, what is important is that we keep our domains effectively separated. &lt;br /&gt;
&lt;br /&gt;
No matter how many domains we identify in our digital life, and how many corresponding identities we create, on the internet every identity - even the one bearing our real or legal name - becomes a “virtual” persona and should be managed carefully. &lt;br /&gt;
&lt;br /&gt;
''The pros and cons of the various identity options:''&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Risk'''&lt;br /&gt;
!'''Reputation'''&lt;br /&gt;
!'''Effort'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Real Name'''&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Total Anonymity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Consistent Pseudonimity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Collective Identity'''&lt;br /&gt;
|&amp;quot;-&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|&amp;quot;+&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}                                                                                                                              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Real name'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Using your &amp;quot;real world&amp;quot; identity online means that you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': Others can easily identify you; gaining reputation and trust is easier. &lt;br /&gt;
&lt;br /&gt;
*''Effort'': requires little effort.&lt;br /&gt;
&lt;br /&gt;
'''Total anonymity '''&lt;br /&gt;
&lt;br /&gt;
*''Risk:'' can be beneficial at times, but can also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': few opportunities to gain trust and reputation, or to network with others.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': difficult; requires caution. Might also require the use of anonymisation tools (for example Tor.)&lt;br /&gt;
&lt;br /&gt;
'''Persistent pseudonymity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': Pseudonym could be linked to our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': A persistent pseudonym that others can use to identify us across platforms is a good way to gain reputation and trust.&lt;br /&gt;
&lt;br /&gt;
*''Effort'': Maintenance requires some effort, particularly if we are also using our real name elsewhere.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Collective Identity'''&lt;br /&gt;
&lt;br /&gt;
*''Risk'': possible exposure of our real world identity.&lt;br /&gt;
&lt;br /&gt;
*''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
&lt;br /&gt;
*''Effort'': Although secure communications are still important, requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
=== '''4. Creating a new online identity''' ===&lt;br /&gt;
&lt;br /&gt;
==== '''What’s in a name?''' ====&lt;br /&gt;
&lt;br /&gt;
The practice of naming varies greatly from one culture to another. While names, in one form or another, have existed across cultures for milennia,  the concept of a &amp;quot;legal name&amp;quot; is a fairly new one. &lt;br /&gt;
&lt;br /&gt;
Different countries regulate the practice of naming in different ways; for example, in Morocco, names must be chosen from a government-approved list, while in Germany a name must be clearly reflective of the baby's gender. &lt;br /&gt;
&lt;br /&gt;
On the internet, platforms that have &amp;quot;real name&amp;quot; policies tend to base this judgement on an individual's legal name, rather than allowing them to identify as they choose. This can be problematic, not only for individuals trying to remain anonymous, but also for transgender individuals, individuals with mononyms, and others.&lt;br /&gt;
&lt;br /&gt;
Because of such restrictions, it can be beneficial to select a &amp;quot;name-shaped&amp;quot; name when choosing a pseudonym. If we want to use commercial social networks, it is better to use a credible name and surname rather than more imaginative ones. Many companies will require that we use both a first name and surname, or a name that doesn't contain any slang terms or profanities.&lt;br /&gt;
&lt;br /&gt;
Once we have decided on a name, a surname, and a username for our virtual persona, we should do thorough research - perhaps also using doxing tools and techniques (see the section on Self-Doxing) - to find out if someone else is already using that name. After all, if we wish to develop our own reputation, we don’t want to be confused with someone else, especially if they don’t share our views of the world!&lt;br /&gt;
&lt;br /&gt;
==== '''Writing our own story''' ==== &lt;br /&gt;
&lt;br /&gt;
The practice of “story telling” (and of creating a social mask, for that matter) is an old one, and creating a new persona with a story makes it a lot easier to maintain the role. &lt;br /&gt;
&lt;br /&gt;
We can base our story on a “known” person’s story, a superhero, a fictional character from our favourite novel, or adopt a “group identity” like Anonymous/Anonymiss or the Guerrilla Girls. If we feel particularly inspired, we can invent a new story.&lt;br /&gt;
&lt;br /&gt;
The main point is that when we create an identity we should conceive a whole virtual persona, an avatar that needs to be nurtured and developed in order to become credible. &lt;br /&gt;
&lt;br /&gt;
This page offers some helpful tips for inventing a new identity: http://anonymissexpress.tumblr.com/post/117939311235/you-may-have-noticed&lt;br /&gt;
&lt;br /&gt;
==== '''Creating a credible persona''' ====&lt;br /&gt;
&lt;br /&gt;
A virtual persona or identity can't be just a name with a mail address and a series of web accounts. If we keep all our normal identifying traits - such as our gender, job, attitude or the way we write - it might be possible for someone to connect the dots and connect our pseudonymous personas with our real identity. &lt;br /&gt;
&lt;br /&gt;
* ''Linguistic fingerprint'': One of the things to consider is our '''linguistic fingerprint'''. This could be identified through a so-called &amp;quot;stylometric analysis&amp;quot; using tools that are increasingly usable, even for non-experts, that make it possible to identify the author of a particular text.  We can, for example, give away our real identity through our particular way of writing certain words, our typical typos, and our style and tone.  To change this, we can start by using a spell-checker in our word processor to check for consistent typos. We could also think about adopting a different writing attitude. To keep it simple, we could adopt one simple rule for each persona, e.g. making them shout by only using capital letters, or be a low-talker with a lower-case style, or very excitable, with a lot of exclamation marks, or a spelling criminal, always putting apostrophes in the wrong place or mistyping words. What we decide to do with our writing style should match the character we choose for our new identity. &lt;br /&gt;
&lt;br /&gt;
* ''Work'': To be sure that our pseudonymous avatar cannot be tracked back to us, our persona should have a job that is different from ours, but not so different that we don’t know anything about that field: for example, they shouldn’t be a surgeon if we don’t know anything about anatomy! &lt;br /&gt;
&lt;br /&gt;
*''Skills and interests'': Similar considerations should be made to select our persona's skills and the main topics they focus on and write about. These can, of course, overlap - for example a journalist who writes about national politics may have an alternative identity that talks about national politics as well, but only casually (and their main interest will be something different, like carpentry or feminism or food).&lt;br /&gt;
&lt;br /&gt;
*''Psychological attitude'': As for psychological attitude, a good rule of thumb is to give our persona depth by creating some &amp;quot;weak spots&amp;quot; - but choosing them carefully so that, if the weak spot is attacked, we are able to weather the strikes and even have some fun in the process. For example, if we have a very strong sense of humour, we could choose a severe lack of humour as our persona's biggest weakness, so that if that weakness comes under attack we can enjoy impersonating a humourless persona without really being psychologically harmed. &lt;br /&gt;
&lt;br /&gt;
What is most important is to remember that on the internet, each one of our identities - even the one connected to our real name - is a “virtual” identity, and it is always better to decide what character traits we want to expose in each of them.  Creating a somewhat fictional character can be a good idea even for our “real” online identity.&lt;br /&gt;
&lt;br /&gt;
More about how to create a rounded character for our identities here: https://lilithlela.cyberguerrilla.org/?page_id=94049&lt;br /&gt;
&lt;br /&gt;
==== '''Creating online profiles''' ====&lt;br /&gt;
&lt;br /&gt;
Once we have created several personas, it's important keep them separate in both our physical and digital lives. While keeping notes on our identities might help ensure that we remember our story, there are technical measures we can take to make sure that our profiles stay separate. &lt;br /&gt;
&lt;br /&gt;
A good start is to create different '''browser profiles''', '''mailboxes''' and '''social network accounts''' for each of our identities. A good rule of thumb is to always use different apps for each account/identity and, if possible, to separate our identities per device or operating system (see '''6. A different machine for each identity''').&lt;br /&gt;
&lt;br /&gt;
==== Creating separate browser profiles and mailboxes ====&lt;br /&gt;
&lt;br /&gt;
''Browser profiles:'' To create multiple profiles with Firefox, visit: https://developer.mozilla.org/en-US/docs/Mozilla/Multiple_Firefox_Profiles  . For Google Chrome, visit: https://support.google.com/chrome/answer/2364824&lt;br /&gt;
&lt;br /&gt;
''Mailboxes:'' When creating a new mailbox, it is always a good idea to connect to the server’s website with '''Torbrowser''' and, if a contact email address is required, to think about using a disposable email address instead.&lt;br /&gt;
&lt;br /&gt;
===='''Disposable email addresses''' ====&lt;br /&gt;
&lt;br /&gt;
For some activities and social domains we need to manage rounded personas, in order to gain a strong reputation and trust from other members of the community. In some cases, however, all we need is a '''disposable email address''' that we only need to use once or few times, for example for opening an account in an untrusted platform.&lt;br /&gt;
&lt;br /&gt;
Even if we decide to have just one identity online, using disposable email addresses prevents sites from building up a history of our activities and ensures that if that account gets compromised we can simply delete it and create a new one, keeping our digital life intact.&lt;br /&gt;
&lt;br /&gt;
* ''Creating a disposable email address'': There are many services that offer disposable email addresses. Some of the most privacy-oriented are:''' '''https://anonbox.net'''&amp;lt;nowiki/&amp;gt;''', offered by the Chaos Computer Club, and '''https://www.guerrillamail.com'''&lt;br /&gt;
&lt;br /&gt;
* ''Tools to generate personal details'': Making the process of creating a disposable account easier, '''Fakena.me''' (https://fakena.me) is a privacy-oriented '&amp;quot;fake name generator&amp;quot; that provides everything for you - from a credible name, birth date and (US-based) address, to a user name and password and a link to the connected guerrillamail mailbox.  Another similar service, called '''Instant Internet Decoy''' (https://decoys.me) creates convincing but entirely fictional people who have birthdays, locations in several countries, families and even answers to common security questions.&lt;br /&gt;
&lt;br /&gt;
* ''Using existing disposable email addresses'': We can also make use of existing fake or disposable email accounts. '''BugMeNot'''(http://bugmenot.com) allows people to share their email logins and passwords created for platforms with free registration, for anyone to use.&lt;br /&gt;
&lt;br /&gt;
==== '''Mail aliases''' ====&lt;br /&gt;
&lt;br /&gt;
Another option is to create a '''mail alias''' - a different email address that is connected to our main mailbox. The advantages of this approach are that this email account will not expire, and if it gets compromised we can just dispose of it and create a new one. But of course if the alias receives a lot of spam, it will fill our main mailbox.&lt;br /&gt;
&lt;br /&gt;
While not every mail service allows users to create mail aliases, this service is offered to every mail user of '''Riseup '''(https://we.riseup.net) and '''Autistici/Inventati '''(https://www.autistici.org), two secure, autonomous servers that are particularly focused on the right to privacy and anonymity.&lt;br /&gt;
&lt;br /&gt;
==== '''Managing our identities on social networks''' ====&lt;br /&gt;
&lt;br /&gt;
Note: When we use social networking platforms, we should always access them with a secure HTTPS connection. &lt;br /&gt;
&lt;br /&gt;
When creating an account for a new persona on a '''social networking platform''', use the browser profile you have created for that persona. Make sure to check the '''privacy settings''' so that you know what you are making public, who can see what you post, who can contact you, who can look you up and what your contacts can do (can they tag you in pictures? can they write on your &amp;quot;wall&amp;quot;?)&lt;br /&gt;
&lt;br /&gt;
Also be very careful about the''' profile information''' you provide, as well as the profile picture and cover photo you use, as these are generally publicly available to anyone who looks for us in that social network, regardless of our privacy settings.&lt;br /&gt;
&lt;br /&gt;
It's also crucial to make sure your contacts do not overlap with your other identities, and to make sure your different identities don't &amp;quot;follow&amp;quot; one another. It is particularly not a good idea to follow your pseudonymous accounts with your &amp;quot;real&amp;quot; identity. If someone is looking to unmask one of your pseudonymous personas, the first thing they will look for is who the account follows, and who follows the account. For the same reason, we should avoid reposting posts or other content published by one account with another account.&lt;br /&gt;
&lt;br /&gt;
Most social networking platforms will display your location where they can. This function is generally provided when we interact with the platform using a GPS-enabled phone, but it can also happen if we are connecting from other devices - for example the network our computer is connected to may also provide location data. It's always a good idea to double-check your settings - particularly on photo and video sharing sites. &lt;br /&gt;
&lt;br /&gt;
Photos and videos can also reveal a lot of information without you realising it. Many cameras will embed metadata into your photos, which can include the date, time and location of the photo, camera type, etc. Photo and video sharing sites may publish this information when we upload content to their sites.&lt;br /&gt;
&lt;br /&gt;
If we access social networking platforms via mobile apps, it is better to use a different app for each separate account, so as not to post something to the wrong account by mistake. There are several apps which can be used to manage social networking platforms - you just need to choose a different one for each identity, to reduce the risk of giving away our real identity.&lt;br /&gt;
&lt;br /&gt;
Another trick to hide our trails is to publish from our various accounts at different times of the day. Some social networks, like Facebook, allow users to schedule the publication time of their posts, while for others, like Twitter, there are several apps that can do the job for us.&lt;br /&gt;
* To schedule a post on Facebook, read:https://www.facebook.com/help/389849807718635&lt;br /&gt;
&lt;br /&gt;
* There are several apps to schedule a post on Twitter and other social networks, like Buffer – https://buffer.com – or Postcron https://postcron.com&lt;br /&gt;
Two further good hints for using social networks with multiple identities are to follow other people who could reasonably be considered the owners of our fake account, and to write (and hashtag on Twitter) posts about events that we are not attending, especially if they are taking place far away from us, to further distance our personal identity from our pseudonymous identities. It may also be fun to publish and then delete posts that look like we have exposed our identity, so as to further confuse anyone who may try to track us down.&lt;br /&gt;
&lt;br /&gt;
Finally, whatever social network we decide to use, we should always read its terms of service to check if they suit our purposes well. And if we find them too complicated, we can check the website Terms of Service; Didn’t Read (https://tosdr.org), where terms of service of many social networks and web services are easily summarized for common mortals.&lt;br /&gt;
&lt;br /&gt;
==== '''Alternative social networks''' ====&lt;br /&gt;
&lt;br /&gt;
For the sheer number of their users, mainstream commercial social networks like Facebook or Twitter are extremely useful if our aim is to publicize as widely as possible an event we are organizing or a project we are launching. Nevertheless, when we advertise our initiatives, we should remember that these platforms have very strict terms of service that could justify their decision to terminate our accounts if they find that our contents infringe their rules (for more, read: http://www.aljazeera.com/indepth/opinion/2013/05/20135175216204375.html)&lt;br /&gt;
&lt;br /&gt;
Moreover, as is well known, with commercial social networks users are not the costumers, but the product, because they are profiled and sold to advertisers. If we add to this the ever-changing terms of service and policy and the interactions with other apps and features that make it very difficult to understand clearly what happens to our data, the best solution is to avoid commercial social networks as much as possible, and to limit their use to specific projects we want to publicize to a wide audience.&lt;br /&gt;
&lt;br /&gt;
But social networks are not always profiling their users: there are alternatives that give much more freedom to their users and don't profile them.&lt;br /&gt;
&lt;br /&gt;
On of these, '''Ello''', explicitly states in its manifesto that “You are not a product” and has become famous, particularly in the trans* community, for not requiring real names, a rarity amongst commercial social networks. Consequently, its number of users has grown and this can be a good alternative to mainstream commercial social networks for achieving the critical mass of readers we need to spread our ideas and initiatives. Nevertheless, Ello is still a commercial project, and there are alternatives that are community-based, distributed rather than centralized, based on free and open-source software and privacy-friendly. Among these, '''Diaspora '''(https://joindiaspora.com), '''Friendica '''([https://friendica.com)and https://friendica.com)] and '''Crabgrass '''(https://we.riseup.net) are especially worth mentioning.&lt;br /&gt;
&lt;br /&gt;
Other similar sites may be popular in different regions, so we way wish to explore other options. Before choosing one, we should consider the following points:&lt;br /&gt;
* Does it provide connection over '''SSL''' (like ''HTTPS'') for all uses of the site, rather than just during login? Are there no problems related to encryption, such as problems related to encryption certificates?&lt;br /&gt;
* How are your content and personal data treated in the End User Licence Agreement and Privacy Policy or Data Use Policy? With whom are they shared? For a useful add-on which helps users understand the Terms of Service of many popular sites, see '''Terms of Service; Didn't Read''' – https://tosdr.org&lt;br /&gt;
* What privacy options are provided for users? Can we choose to share our videos securely with a small number of individuals, or are they all public by default?&lt;br /&gt;
* '''Is the geographical location of the servers known?''' Under which territorial jurisdiction do they fall? Where is the company registered? How does this information relate to the privacy and security of our email activity and information?&lt;br /&gt;
&lt;br /&gt;
==== '''Creating a site of one’s own''' ====&lt;br /&gt;
&lt;br /&gt;
Some of us may be content with the tools we have discussed so far, and writing in our social network accounts, especially if we have found a more privacy-friendly option (see '''5.3 Alternative social networks'''), may be all we need to voice our opinions and to''' '''interact with a network of people (or with several networks, if we are using different identities when writing online). On the other hand, we may want a more independent platform to spread our ideas, plans or creations, and to do that we can create a website or a blog.&lt;br /&gt;
&lt;br /&gt;
Creating a '''blog''' is as easy as signing up in a web service and choosing a name and a nice theme for our blog, and there are several blogging platforms around that are both user-friendly and free, like '''Wordpress.com'''. Equally based on the free and open-source blogging tool Wordpress, but with some tweaks for additional user privacy, there are two security-oriented platforms that are managed by autonomous servers: Autistici/Inventati’s (A/I) '''Noblogs '''– [http://noblogs.org/ http://noblogs.org] – and Nadir’s '''BlackBlogs '''– [http://blackblogs.org/ http://blackblogs.org]. To open them, all that is needed is to have an email account hosted in an autonomous server (see &amp;lt;nowiki/&amp;gt;https://www.autistici.org/en/links.html &amp;lt;nowiki/&amp;gt;and &amp;lt;nowiki/&amp;gt;https://blackblogs.org/policy &amp;lt;nowiki/&amp;gt;respectively for a complete list).&lt;br /&gt;
&lt;br /&gt;
All these platforms offer enough space for normal blogging activities and are very easy to use, but if we want to actively create our site from scratch, perhaps because we want a complex graphic layout or need to install particular tools that are not offered by Wordpress and its plugins, what we really should do is find some space in a server for our '''website''' and perhaps to associate it to our domain of choice.&lt;br /&gt;
* Webhosting services are many, but since they generally aren’t free, the options to stay completely anonymous are reduced to creating a website with '''A/I''', which by default does not connect the users of its services with real identities. To learn more about Autistici/Inventati’s webhosting service, visit: https://www.autistici.org/en/services/website.html&lt;br /&gt;
&lt;br /&gt;
If we want to have our own '''domain''', bypassing payments and identifications may get difficult unless we use Bitcoin or another anonymous payment system, and the personal data we will provide will not only be stored in the registrar’s internal archives, but by default will also be recorded in a database that can be easily queried by anybody through a simple command (whois) or on several websites such as Gandi: Whois (https://www.gandi.net/whois). To avoid this, we can register our domain giving the data of an association and using a prepaid credit card that is not connected to our data (if available in our country), or else we can use a registrar like Gandi.net ([https://www.gandi.net/ https://www.gandi.net]) that offers private domain registration for individuals whenever possible.&lt;br /&gt;
&lt;br /&gt;
=== '''5. Managing collective online identities''' ===&lt;br /&gt;
&lt;br /&gt;
==== '''Collective virtual personas''' ====&lt;br /&gt;
&lt;br /&gt;
From General Ludd to Captain Swing, from the Guerrilla Girls to Luther Blissett to Anonymous, for centuries several groups and like-minded people have participated anonymously in historic protest movements or have created ground-breaking and provoking artworks or pranks attributing them to a collective pseudonym that, besides hiding their identity as individuals, has shrouded their feats in an aura of myth and almost magical power.&lt;br /&gt;
&lt;br /&gt;
Several essays have been written on the topic, and the fascination of pseudonymity and shapeshifting has perhaps its roots in the dawn of humanity, but what counts is that we can choose to adopt a collective identity that already exists, like Anonymous/Anonymiss, or create a new one that we want to share with our own group or with the rest of the world.&lt;br /&gt;
* A very interesting study on multiple identities online is anthropologist Gabriella Coleman’s book ''Hacker, Hoaxer, Whistleblower, Spy. The Many Faces of Anonymous ''(2014), based on an anthropological research on how Anonymous has become a well-known and powerful collective identity with multiple faces and attitudes.&lt;br /&gt;
&lt;br /&gt;
* In her PhD dissertation ''Networked Disruption. Rethinking Oppositions in Art, Hacktivism and the Business of Social Networking ''(2011), Tatiana Bazzichelli also describes how multiple identities have been used to disrupt the fundamental notions of power and hegemony on which Western culture is based, and how this works in the web today.&lt;br /&gt;
&lt;br /&gt;
==== '''Managing collective identities... or simple collective accounts''' ====&lt;br /&gt;
&lt;br /&gt;
While the collaboration of many individuals can help creating a rich collective identity that is even more credible, given the many character traits we can think up with an enthusiastic, imaginative group of people, managing a collective project may have some further security and technological challenges we should keep in mind.&lt;br /&gt;
&lt;br /&gt;
As we stressed above, security is a chain, and a single weak link can break the entire system. Therefore, our security and anonymity depend on the precautions each member of our group takes. We may decide that we don’t want to be absolutely anonymous, that our close friends can know about our collective activities, and the degree of security we may want to attain for our group depends on the possible threats we face and on our adversaries’ power and skills. Nonetheless, there are some important assets we would certainly not want to loose, like for instance the password to our collective mailbox or to our group’s social network accounts. Therefore, if we decide that we are going to share those passwords with the whole group, we’d better train each member on how to store a password securely or make sure that they have learnt the password by heart and don’t keep it on a post-it next to their desk at work (see '''3.2 Creating and using strong passwords''').&lt;br /&gt;
&lt;br /&gt;
Whenever possible, we should try to use services that provide for different accounts and passwords. For example, instead of using a single mailbox for contact, we may create a mailing list that allows non-subscribed people to write to it and have all the members of the group subscribe to it, so that if someone writes to the group they can all read the e-mail in their own mailbox rather than in a collective one with a dangerously shared password. Similarly, if coordination really needs to happen through Facebook, it is much better to share information in a dedicated group rather than do everything within a collective account (which also risks to be deleted due to violation of the terms of service, see '''2.3 Persistent Pseudonymity''' and '''5.2 Managing our identities on social networks''').&lt;br /&gt;
&lt;br /&gt;
=== '''6. A different machine for each identity''' ===&lt;br /&gt;
&lt;br /&gt;
If we use the same operating system for our several identities, no matter how carefully we separate our profiles, we can still make a human mistake, for example connecting to a pseudonymous account through the browser profile we have assigned to our true identity, or get infected by a malware that allows our attacker to monitor all we do online, with all our identities, and connect dots together.&lt;br /&gt;
&lt;br /&gt;
Both risks can be limited by using a virtual machine for each of our domains, and by reserving yet another virtual machine to opening fishy attachments in order to avoid a malware infection.&lt;br /&gt;
&lt;br /&gt;
As the name suggests, a virtual machine (VM) is basically a simulated computer with its own OS which runs as software on our physical computer. We can think of a VM as a &amp;lt;em&amp;gt;computer within a computer&amp;lt;/em&amp;gt;. Installing and running a virtual machine is not very complicated, and there is very good documentation around. For our purposes of anonymization, the best available option is to install '''Virtualbox''', an open-source, cross-platform virtual machine monitor (https://www.virtualbox.org), and to run Whonix in a virtual machine created with Virtualbox.&lt;br /&gt;
&lt;br /&gt;
==== '''Whonix: compartmentalizing our identities through a secure virtual machine''' ====&lt;br /&gt;
&lt;br /&gt;
'''Whonix '''(https://www.whonix.org) is an operating system that aims at protecting our anonymity, privacy and security by helping us use your applications anonymously. A web browser, IRC client, word processor and more come pre-configured with security in mind. It is a complete operating system designed to be used in a virtual machine. It is Free Software and based on '''Tor''', '''Debian''' GNU/Linux and '''security by isolation'''. &lt;br /&gt;
&lt;br /&gt;
Whonix’s website offers a wide documentation, ranging from very clear installation and usage instructions to thorough recommendations on security and the risks we may run: https://www.whonix.org/wiki/Documentation&lt;br /&gt;
&lt;br /&gt;
==== '''Tails: a live system that leaves no traces''' ====&lt;br /&gt;
&lt;br /&gt;
Using virtual machines, Whonix in particular, is a good idea if we have our own computer where we are free to install whatever we want, especially if it is a powerful machine. But if we use an older box or just connect to the internet from cybercafes, installing a virtual machine becomes unsustainable. In this case, we may turn to a live Linux distribution, a USB-stick with a Linux operating system installed on it that runs in the computer we are using as soon as we switch it on.&lt;br /&gt;
&lt;br /&gt;
A particularly secure live distribution focused on security and anonymity is '''Tails''', or '''The Amnesic Incognito Live System''', a free and open-source Debian-based Linux distribution that can be started on almost any computer from a DVD, USB stick, or SD card and forces all its outgoing connections to go through Tor, blocking direct, non-anonymous connections.&lt;br /&gt;
&lt;br /&gt;
When we launch Tails, we have a complete operating system that, just as Whonix, comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. With Tails, we can access the internet, communicate, and do all we need anonymously and securely and, after the computer is shut down, the system will leave no traces on the machine unless we ask it to do so.&lt;br /&gt;
&lt;br /&gt;
As with Torbrowser, it is not advisable to use the same Tails session to perform two tasks or endorse two contextual identities that we really want to keep separate from another, for example hiding our location to check our personal email and publishing a document on our pseudonymous blog.&lt;br /&gt;
&lt;br /&gt;
The first reason is that Tor tends to reuse the same circuits, for example amongst a same browsing session, making it easier for a powerful adversary to correlate the several browsing requests as part of a same circuit and possibly made by a same user. Second, in case of a security hole or a misuse in using Tails or one of its applications, information about our session could be leaked. That could reveal that the same person was behind the various actions made during the session.&lt;br /&gt;
&lt;br /&gt;
T''he solution to both threats is to shut down and restart Tails every time we are using a new identity''.&lt;br /&gt;
&lt;br /&gt;
==== '''Security by isolation: Qubes OS''' ====&lt;br /&gt;
&lt;br /&gt;
There are three approaches to digital security: the first one is '''security by obscurity''', which is based on encryption, strong passwords and similar measures and acts as a first line of defence, as a deterrent that will discourage random attacks but is not likely to stop someone who is directly targeting us; then there is '''security by correctness''', whereby software developers try to get rid of bugs that make their code vulnerable. But modern software is very complex, and it is almost impossible to do this job perfectly. Therefore, the most pessimistic, and realistic, approach is '''security by isolation''', which gives for granted that security measures can be vulnerable and focuses on harm reduction by stopping possible attackers from accessing the whole system that we want to secure.&lt;br /&gt;
&lt;br /&gt;
In order to implement security by isolation, for instance, '''Whonix''' is divided into two parts: Whonix-Workstation, which is the system we access for our work, and Whonix-Gateway, which routes all internet traffic through Tor and, by being isolated from the workstation, averts many threats posed by malware, misbehaving applications, and user error.&lt;br /&gt;
&lt;br /&gt;
But while Whonix needs a virtual machine to run on and its main focus is anonymization, there is an operating system that has security by isolation as its main purpose and that can make life a lot easier to someone who manages several social domains and/or identities in her digital life.&lt;br /&gt;
&lt;br /&gt;
Called '''Qubes OS''' – https://www.qubes-os.org – and developed by computer security researcher Joanna Rutkowska, Qubes is a free and open-source security-oriented operating system based on '''Fedora''', a Linux distribution, and '''Xen''', a virtual machine monitor (or hypervisor), that allows us to separate the various parts of our digital life into securely isolated virtual machines. Qubes keeps the things we do on our computer securely isolated in these different VMs so that if one virtual machine gets compromised, the other won’t be affected. This way, we can do everything on a single physical computer without having to worry that one successful cyberattack harms our whole system, potentially revealing all the connections among our several identities.&lt;br /&gt;
&lt;br /&gt;
A plus of Qubes OS for the purposes of multiple identities management is its user-friendly window manager, that assigns a different colour to each domain. Thus, the colour of the frame makes each window clearly recognizable as belonging to the domain corresponding to that colour and prevents potential human mistakes in the management of our identities.&lt;br /&gt;
&lt;br /&gt;
==== '''Tails, Whonix, Qubes OS: how to choose''' ====&lt;br /&gt;
&lt;br /&gt;
The three tools we have described in the last few paragraphs – Whonix, Tails and Qubes OS – all allow us to use a completely separate operating system for managing our alternate identities, and can be quite useful to make sure that we don’t reveal our true identity while we use the anonymous one(s). Still better, if we can afford it, would be to have a different machine for each of our identities, as well as an air-gapped one to store our most sensitive data. Of course, the choice depends on the resources we can dedicate to securing our digital life and on our threat-model, especially on the adversaries we expect to face: if we are pretty sure that in our country harassers work together with the regime to slander (or worse) people like us, we may want to be absolutely sure that none of our data is leaked and – if we have enough funds or are connected to a network of hacktivists – we may decide to ask for an expert’s help to check that we have taken all the necessary measures to keep doing an efficient work and to stop any ill-intentioned actors from tampering with our data. On the other hand, if we feel sufficiently protected by our community and/or by our government, and we expect our adversaries not to be very skilled in technological matters, perhaps all we need is to separate our browser profiles and mailboxes, to use a secure HTTPS connection and some basic common sense and to keep developing a network of support for vocal women online.&lt;br /&gt;
&lt;br /&gt;
If we think that using a different operating system is really necessary, or that it can be helpful to keep things logically and graphically separated (or we just want to explore all the possibilities we have for the fun of it!), we should assess our resources and our needs in order to identify the best solution for us.&lt;br /&gt;
&lt;br /&gt;
''Comparison between Tails, Whonix and Qubes Os:''&lt;br /&gt;
{|&lt;br /&gt;
!&lt;br /&gt;
!'''Tails'''&lt;br /&gt;
!'''Whonix'''&lt;br /&gt;
!'''Qubes OS'''&lt;br /&gt;
|-&lt;br /&gt;
|'''Required hardware/software'''&lt;br /&gt;
|&amp;quot;x86 compatible and/or Virtual Machines; DVD, USB stick, or SD card for booting the system&amp;quot;&lt;br /&gt;
|&amp;quot;x86 compatible pc with VirtualBox&amp;quot;&lt;br /&gt;
|&amp;quot;a powerful pc capable of running Qubes OS&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''System requirements'''&lt;br /&gt;
|&amp;quot;lowest&amp;quot;&lt;br /&gt;
|&amp;quot;high&amp;quot;&lt;br /&gt;
|&amp;quot;highest&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Difficulty to install'''&lt;br /&gt;
|&amp;quot;medium&amp;quot;&lt;br /&gt;
|&amp;quot;medium&amp;quot;&lt;br /&gt;
|&amp;quot;easy&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Difficulty to configure'''&lt;br /&gt;
|&amp;quot;low&amp;quot;&lt;br /&gt;
|&amp;quot;medium&amp;quot;&lt;br /&gt;
|&amp;quot;high&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Learning curve'''&lt;br /&gt;
|&amp;quot;low&amp;quot;&lt;br /&gt;
|&amp;quot;low&amp;quot;&lt;br /&gt;
|&amp;quot;high&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Anonymization by default'''&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|&amp;quot;no&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Security by isolation'''&lt;br /&gt;
|&amp;quot;no&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Pre-installed applications'''&lt;br /&gt;
|&amp;quot;nice selection&amp;quot;&lt;br /&gt;
|&amp;quot;not many&amp;quot;&lt;br /&gt;
|&amp;quot;not many, and some, like Tor or Virtualbox cannot be installed at all&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|'''Persistence'''&lt;br /&gt;
|&amp;quot;no (available option)&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|&amp;quot;yes&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
As we can see in the table above, '''Tails''' just needs a normal computer and a DVD or a bootable device to launch the system, but installing the system in this device, as well as having the DVD, USB stick or SD card actually boot in the computer we are using, can be tricky, and we may need some external help. After that, though, using Tails is pretty easy, and if what we need to do with our alternate persona needs a focus on ''anonymization'', then it may be worthwhile to overcome the initial obstacle. Tails is a good option also if we have few resources, if we don’t have a computer of our own, or if we often use computers at internet cafes and want to be safer. One particular advantage of Tails is that after we have switched the computer off, we leave no traces and everything we have done vanishes into thin air. But if on the other hand we need ''persistence'', i.e. we want to keep some files we have created or downloaded in our USB stick or we have changed some system settings and want to keep them also in the future, we need to enable this option when we start the system. Last but not least, Tails is an established, respected project that has been developed for many years and is used by a wide community of people.&lt;br /&gt;
&lt;br /&gt;
If what we need is both ''anonymity'' and ''security by isolation'' and we have a good machine – https://www.whonix.org/wiki/System_Requirements – where we can run Virtualbox, installing '''Whonix''' in one or more virtual machines, according to the number of our alternative identities, seems a good solution that caters to all our needs and also offers an excellent documentation: https://www.whonix.org/wiki/Documentation. Nevertheless, Whonix, like Qubes Os, is a relatively recent project and the community using it is still rather small.&lt;br /&gt;
&lt;br /&gt;
'''Qubes OS''' is a good choice if we want to keep all our activities inside our own computer without having to install anything else and if what we are trying to do is to effectively ''separate'' our identities rather than anonymize our activities in the web. It requires a very powerful computer – http://qubes-os.org/trac/wiki/SystemRequirements – and this can be a hindrance, but if we feel that we really need to protect ourselves against possible cyberattacks, the investment may be worth its while.&lt;br /&gt;
&lt;br /&gt;
To sum up, none of these tools protects us from every threat, and we shouldn’t look at them as a magic potion that will make us invulnerable. Nevertheless, by using any of them, according to our needs and resources, we will raise the level of effort that an attacker will need to harm us, thus making an attack less likely.&lt;br /&gt;
&lt;br /&gt;
For a wider comparison among these and other systems, go to: https://www.whonix.org/wiki/Comparison_with_Others&amp;lt;nowiki/&amp;gt;&amp;lt;nowiki/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Safe_Mailing_list&amp;diff=1247</id>
		<title>Safe Mailing list</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Safe_Mailing_list&amp;diff=1247"/>
				<updated>2015-05-27T14:13:15Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''How can I set up a secure mailing list? Should our mailing list apply social rules, moderation and netiquette? What are good ways of administrating mailing lists as safe spaces for discussion and exchange?''&lt;br /&gt;
&lt;br /&gt;
== Setting up a Safe Space Mailing list ==&lt;br /&gt;
&lt;br /&gt;
Mailing lists are one of the oldest forms of social networks. They allow you to discuss, organise, share information, exchange video, audio and pictures. A mailing list is a list of addresses to which the same information is being sent.  The most common types of mailing lists are announcement lists and discussion lists. The below section will help you in the steps to setting up a safe space mailing list.&lt;br /&gt;
&lt;br /&gt;
==== Case study: Techie Feminist Mailing lists ==== &lt;br /&gt;
&lt;br /&gt;
FemTechNet&lt;br /&gt;
Fembot&lt;br /&gt;
Queer Geek Feminism&lt;br /&gt;
Femmehack&lt;br /&gt;
TransHackFeminist&lt;br /&gt;
GTI Participants&lt;br /&gt;
Ada initiative mailing list&lt;br /&gt;
Lady tech mafia&lt;br /&gt;
Cyberfeministas&lt;br /&gt;
&lt;br /&gt;
== Methodology ==&lt;br /&gt;
&lt;br /&gt;
If you have decided that you need a secure communication channel for your collective and that you do not want to use corporate services, there are many alternative services to choose from that are recommended for human rights defenders. For example: Riseup, Aktivix or Autistici/Inventati (A/I Collective), all those options are free but they still prioritise security and user privacy. &lt;br /&gt;
&lt;br /&gt;
[https://help.riseup.net/ Riseup] is a tech collective which provides secure communication tools for people working on liberatory social change.  They have many feminist and queer oriented lists and therefore are a great collective to host your mailing list. To see some of the existing public mailing lists go to:  https://lists.riseup.net/www/.&lt;br /&gt;
&lt;br /&gt;
Other tech collectives also offer mailing-lists and email addresses. [http://www.autistici.org/en/index.html Autistici/Inventati (A/I Collective)] and [https://aktivix.org/ Aktivix] are two other great examples, and the former also offers a dedicated newsletter service for groups that want to send regular news to a high number of recipients. To read about their services visit [http://www.autistici.org/en/services/lists.html%20 Autistici lists] and [https://lists.aktivix.org/mailman/listinfo Aktivix lists information].&lt;br /&gt;
&lt;br /&gt;
=== Open or closed list === &lt;br /&gt;
&lt;br /&gt;
Once you are ready to create your mailing list you need to decide whether it will be an open or closed list. An open list allows anyone to subscribe, receive announcements or participate in the discussion. A list becomes really public when it is advertised to the world and anyone can request subscription. For example  the mailing list run by [http://femtechnet.newschool.edu/mailman/listinfo/femtechnet FemTechNet]. &lt;br /&gt;
&lt;br /&gt;
But a list mustn't be necessarily publicized and can be run on a need-to-know basis. In other words, you can choose not to advertise your list publicly and to keep it invitation-only. You could have for instance a publicized list which is closed i.e. a list that people know about (literally everyone!), but which requires approval as mentioned above. A closed list is limited to the subscribed email addresses that will have been approved by you or your collective. In deciding what is best, check if choosing to keep a list open to new subscriptions automatically implies that the archives of the list are available to anyone on the web and will eventually end up on search engines (such as Google). In some cases, as in the mailing list service offered by Riseup, the archives of a closed list are only accessible to those who have the subscription password while the archives of a closed list can be accessed by everybody. In other cases, as A/I's platform you can choose whether you keep the archives public or not independently of your choice to keep your list open to new subscriptions.&lt;br /&gt;
&lt;br /&gt;
If you intend to talk about sensitive issues (and talking about feminist related topics is often a sensitive issue!) or if trust within the group is important for creating your safe space, you might want to set up a closed list and to keep your archives closed. If you do choose to leave your archives accessible, it is important to inform everyone subscribed to the list that any delicate topic or personal detail that pops up in your discussions will be potentially visible to anybody.&lt;br /&gt;
&lt;br /&gt;
=== Invitations and new additions === &lt;br /&gt;
&lt;br /&gt;
Once you have your list set up, start inviting people. If friends are suggesting to add more people to the list, ask them to explain to the list the reasons why such and such person should be added. If you get a green light from your collective, add this person to your mailing list. Working through the web of trust is a good practice to follow when setting up a mailing list. Also, make sure you have a discussion on who can be part of this list. If you set up a feminist list, who can be part of this list? Do you for instance allow feminist men to be part of the list? If so, will you be setting up a policy for your list on the acceptable behavior? (See below for how to set up a policy) These are important questions that you need to discuss with your group. But don’t be too harsh on yourself and your group and know that you can always revisit these decisions if at some point you and your collective feel you want to change your collective mailing list agreement.&lt;br /&gt;
&lt;br /&gt;
=== Mailing list policies ===&lt;br /&gt;
&lt;br /&gt;
Agreeing on a mailing list policy from the start will save you a lot of time and difficult conversations. Publishing your policy and the ways in which to report violations of the policy, even if it is a closed list, might be helpful in creating the online safe space you want everyone to enjoy. The policy can provide guidelines for everyone using the list, on how to behave. It can address tensions like the fact that expression of emotion is an important feminist principle, but losing your temper and attacking someone you don't agree with on the list is not ok. &lt;br /&gt;
&lt;br /&gt;
Having a visible and explicit policy will send a strong signal of the value of creating a safe space on a mailing list. The geekfeminism wiki is a great example of a [http://geekfeminism.wikia.com/wiki/Statement_of_purpose/Women-only_communities women-only policy for online communities]. They also have a similar policy or [http://geekfeminism.wikia.com/wiki/Statement_of_purpose:_communities_including_men%20 agreement for online communities that includes men]. Check them out and adapt them to your needs, beliefs and desires. &lt;br /&gt;
&lt;br /&gt;
To make sure that the policy does not get forgotten, you can regularly remind it to the subscribers. The [https://adainitiative.org/ Ada Initiative mailing list], for example, adds a link to each email sent on the list. Below is what you see:&lt;br /&gt;
&lt;br /&gt;
''Policies for behavior on this list: &lt;br /&gt;
http://geekfeminism.wikia.com/wiki/Statement_of_purpose/Women-only_communities&lt;br /&gt;
http://sf.adacamp.org/attendee-information/policies/#ahp&lt;br /&gt;
Contact Adacamp-alumni-owner@lists.adainitiative.org to report violations&lt;br /&gt;
Please avoid gendered assumptions and language about the list as a whole (eg &amp;quot;XX&amp;quot;, &amp;quot;ovaries&amp;quot;, &amp;quot;ladies&amp;quot;)&lt;br /&gt;
To subscribe, go to: http://lists.adainitiative.org/listinfo.cgi/adacamp-alumni-adainitiative.org''&lt;br /&gt;
&lt;br /&gt;
=== Administration and moderation ===&lt;br /&gt;
&lt;br /&gt;
Administering the list involves handling subscriptions and moderating content. One person can be responsible for doing it but if your list suddenly becomes very chatty, this might be too demanding for just one person to do.  You can also choose to have more than one administrator of the list. A list can even be collectively managed. As a general rule, moderation has three main goals. First, a well-moderated community will be more productive and &lt;br /&gt;
efficient in generating and distributing valuable information and knowledge to its members (subscribers). Moderation will also increase the accessibility and openness of online communities enabling respectful dialogue among its members. Finally, a good moderation will do its work making as few demands as possible on the infrastructure and on participants. &lt;br /&gt;
&lt;br /&gt;
Before trying to figure out which moderation better suits you, you should think about internet access and expectations from list members. Depending on where you are located, some people on the list might not have regular access to the internet and this needs to be factored in when taking the decision. Some tensions will inevitably arise from the collective administering process and therefore you and your collective need to think carefully about the ways in which you will handle these tensions. Are we ready to wait for a few days to have new members added to the list? If each message needs admin approval, are we ready to accept waiting for the message to be approved for a few days, a week, more? Since administering a list is a great way to learn, is it only those who are tech savvy that might manage it or should we rather allow for learning to happen? If your expectations are clear, the possibility for tensions and conflicts to emerge will be minimized.&lt;br /&gt;
&lt;br /&gt;
As a case in point, the [http://spooncollective.org/ Spoon Collective], a discussion list active in the 90s, adopted a strategy of central collective &amp;quot;ownership&amp;quot;.  Everyone on the list had administration rights and so the responsibility of managing the list could be shared amongst members. This is a strategy that can be best used when you are part of a close collective. It also requires trust that all members will care enough to manage it collectively.&lt;br /&gt;
&lt;br /&gt;
=== Encrypted mailing lists ===&lt;br /&gt;
&lt;br /&gt;
If you want a high level of security, there is the possibility of encrypting mailing lists. However, it is important to understand that this requires every participants to the list to already use PGP (Pretty Good Privacy)/GPG. This type of list, based on a software named [http://schleuder2.nadir.org/ Schleuder] and developed by the German Tech Collective Nadir.org, is designed to serve as a tool for group communication, but this time with a strong emphasis on security. Schleuder list is a GPG-enabled mailing list and the list takes care of all de- and encryption among others. If you and your group feel you are able to install software in a server or can ask help from your community and you are all ready to use an encrypted mailing list, visit [http://schleuder2.nadir.org/ Schleuder].&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Safe_Mailing_list&amp;diff=1246</id>
		<title>Safe Mailing list</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Safe_Mailing_list&amp;diff=1246"/>
				<updated>2015-05-27T14:11:24Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;''How can I set up a secure mailing list? Should our mailing list apply social rules, moderation and netiquette? What are good ways of administrating mailing lists as safe spaces for discussion and exchange?''&lt;br /&gt;
&lt;br /&gt;
== Setting up a Safe Space Mailing list ==&lt;br /&gt;
&lt;br /&gt;
Mailing lists are one of the oldest forms of social networks. They allow you to discuss, organise, share information, exchange video, audio and pictures. A mailing list is a list of addresses to which the same information is being sent.  The most common types of mailing lists are announcement lists and discussion lists. The below section will help you in the steps to setting up a safe space mailing list.&lt;br /&gt;
&lt;br /&gt;
==== Case study: Techie Feminist Mailing lists ==== &lt;br /&gt;
&lt;br /&gt;
FemTechNet&lt;br /&gt;
Fembot&lt;br /&gt;
Queer Geek Feminism&lt;br /&gt;
Femmehack&lt;br /&gt;
TransHackFeminist&lt;br /&gt;
GTI Participants&lt;br /&gt;
Ada initiative mailing list&lt;br /&gt;
Lady tech mafia&lt;br /&gt;
Cyberfeministas&lt;br /&gt;
&lt;br /&gt;
== Methodology ==&lt;br /&gt;
&lt;br /&gt;
If you have decided that you need a secure communication channel for your collective and that you do not want to use corporate services, there are many alternative services to choose from that are recommended for human rights defenders. For example: Riseup, Aktivix or Autistici/Inventati (A/I Collective), all those options are free but they still prioritise security and user privacy. &lt;br /&gt;
&lt;br /&gt;
[https://help.riseup.net/ Riseup] is a tech collective which provides secure communication tools for people working on liberatory social change.  They have many feminist and queer oriented lists and therefore are a great collective to host your mailing list. To see some of the existing public mailing lists go to:  https://lists.riseup.net/www/.&lt;br /&gt;
&lt;br /&gt;
Other tech collectives also offer mailing-lists and email addresses. [http://www.autistici.org/en/index.html Autistici/Inventati (A/I Collective)] and [https://aktivix.org/ Aktivix] are two other great examples, and the former also offers a dedicated newsletter service for groups that want to send regular news to a high number of recipients. To read about their services visit [http://www.autistici.org/en/services/lists.html%20 Austitici lists] and [https://lists.aktivix.org/mailman/listinfo Aktivix lists information].&lt;br /&gt;
&lt;br /&gt;
=== Open or closed list === &lt;br /&gt;
&lt;br /&gt;
Once you are ready to create your mailing list you need to decide whether it will be an open or closed list. An open list allows anyone to subscribe, receive announcements or participate in the discussion. A list becomes really public when it is advertised to the world and anyone can request subscription. For example  the mailing list run by [http://femtechnet.newschool.edu/mailman/listinfo/femtechnet FemTechNet]. &lt;br /&gt;
&lt;br /&gt;
But a list mustn't be necessarily publicized and can be run on a need-to-know basis. In other words, you can choose not to advertise your list publicly and to keep it invitation-only. You could have for instance a publicized list which is closed i.e. a list that people know about (literally everyone!), but which requires approval as mentioned above. A closed list is limited to the subscribed email addresses that will have been approved by you or your collective. In deciding what is best, check if choosing to keep a list open to new subscriptions automatically implies that the archives of the list are available to anyone on the web and will eventually end up on search engines (such as Google). In some cases, as in the mailing list service offered by Riseup, the archives of a closed list are only accessible to those who have the subscription password while the archives of a closed list can be accessed by everybody. In other cases, as A/I's platform you can choose whether you keep the archives public or not independently of your choice to keep your list open to new subscriptions.&lt;br /&gt;
&lt;br /&gt;
If you intend to talk about sensitive issues (and talking about feminist related topics is often a sensitive issue!) or if trust within the group is important for creating your safe space, you might want to set up a closed list and to keep your archives closed. If you do choose to leave your archives accessible, it is important to inform everyone subscribed to the list that any delicate topic or personal detail that pops up in your discussions will be potentially visible to anybody.&lt;br /&gt;
&lt;br /&gt;
=== Invitations and new additions === &lt;br /&gt;
&lt;br /&gt;
Once you have your list set up, start inviting people. If friends are suggesting to add more people to the list, ask them to explain to the list the reasons why such and such person should be added. If you get a green light from your collective, add this person to your mailing list. Working through the web of trust is a good practice to follow when setting up a mailing list. Also, make sure you have a discussion on who can be part of this list. If you set up a feminist list, who can be part of this list? Do you for instance allow feminist men to be part of the list? If so, will you be setting up a policy for your list on the acceptable behavior? (See below for how to set up a policy) These are important questions that you need to discuss with your group. But don’t be too harsh on yourself and your group and know that you can always revisit these decisions if at some point you and your collective feel you want to change your collective mailing list agreement.&lt;br /&gt;
&lt;br /&gt;
=== Mailing list policies ===&lt;br /&gt;
&lt;br /&gt;
Agreeing on a mailing list policy from the start will save you a lot of time and difficult conversations. Publishing your policy and the ways in which to report violations of the policy, even if it is a closed list, might be helpful in creating the online safe space you want everyone to enjoy. The policy can provide guidelines for everyone using the list, on how to behave. It can address tensions like the fact that expression of emotion is an important feminist principle, but losing your temper and attacking someone you don't agree with on the list is not ok. &lt;br /&gt;
&lt;br /&gt;
Having a visible and explicit policy will send a strong signal of the value of creating a safe space on a mailing list. The geekfeminism wiki is a great example of a [http://geekfeminism.wikia.com/wiki/Statement_of_purpose/Women-only_communities women-only policy for online communities]. They also have a similar policy or [http://geekfeminism.wikia.com/wiki/Statement_of_purpose:_communities_including_men%20 agreement for online communities that includes men]. Check them out and adapt them to your needs, beliefs and desires. &lt;br /&gt;
&lt;br /&gt;
To make sure that the policy does not get forgotten, you can regularly remind it to the subscribers. The [https://adainitiative.org/ Ada Initiative mailing list], for example, adds a link to each email sent on the list. Below is what you see:&lt;br /&gt;
&lt;br /&gt;
''Policies for behavior on this list: &lt;br /&gt;
http://geekfeminism.wikia.com/wiki/Statement_of_purpose/Women-only_communities&lt;br /&gt;
http://sf.adacamp.org/attendee-information/policies/#ahp&lt;br /&gt;
Contact Adacamp-alumni-owner@lists.adainitiative.org to report violations&lt;br /&gt;
Please avoid gendered assumptions and language about the list as a whole (eg &amp;quot;XX&amp;quot;, &amp;quot;ovaries&amp;quot;, &amp;quot;ladies&amp;quot;)&lt;br /&gt;
To subscribe, go to: http://lists.adainitiative.org/listinfo.cgi/adacamp-alumni-adainitiative.org''&lt;br /&gt;
&lt;br /&gt;
=== Administration and moderation ===&lt;br /&gt;
&lt;br /&gt;
Administering the list involves handling subscriptions and moderating content. One person can be responsible for doing it but if your list suddenly becomes very chatty, this might be too demanding for just one person to do.  You can also choose to have more than one administrator of the list. A list can even be collectively managed. As a general rule, moderation has three main goals. First, a well-moderated community will be more productive and &lt;br /&gt;
efficient in generating and distributing valuable information and knowledge to its members (subscribers). Moderation will also increase the accessibility and openness of online communities enabling respectful dialogue among its members. Finally, a good moderation will do its work making as few demands as possible on the infrastructure and on participants. &lt;br /&gt;
&lt;br /&gt;
Before trying to figure out which moderation better suits you, you should think about internet access and expectations from list members. Depending on where you are located, some people on the list might not have regular access to the internet and this needs to be factored in when taking the decision. Some tensions will inevitably arise from the collective administering process and therefore you and your collective need to think carefully about the ways in which you will handle these tensions. Are we ready to wait for a few days to have new members added to the list? If each message needs admin approval, are we ready to accept waiting for the message to be approved for a few days, a week, more? Since administering a list is a great way to learn, is it only those who are tech savvy that might manage it or should we rather allow for learning to happen? If your expectations are clear, the possibility for tensions and conflicts to emerge will be minimized.&lt;br /&gt;
&lt;br /&gt;
As a case in point, the [http://spooncollective.org/ Spoon Collective], a discussion list active in the 90s, adopted a strategy of central collective &amp;quot;ownership&amp;quot;.  Everyone on the list had administration rights and so the responsibility of managing the list could be shared amongst members. This is a strategy that can be best used when you are part of a close collective. It also requires trust that all members will care enough to manage it collectively.&lt;br /&gt;
&lt;br /&gt;
=== Encrypted mailing lists ===&lt;br /&gt;
&lt;br /&gt;
If you want a high level of security, there is the possibility of encrypting mailing lists. However, it is important to understand that this requires every participants to the list to already use PGP (Pretty Good Privacy)/GPG. This type of list, based on a software named [http://schleuder2.nadir.org/ Schleuder] and developed by the German Tech Collective Nadir.org, is designed to serve as a tool for group communication, but this time with a strong emphasis on security. Schleuder list is a GPG-enabled mailing list and the list takes care of all de- and encryption among others. If you and your group feel you are able to install software in a server or can ask help from your community and you are all ready to use an encrypted mailing list, visit [http://schleuder2.nadir.org/ Schleuder].&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Manual_introduction&amp;diff=1169</id>
		<title>Manual introduction</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Manual_introduction&amp;diff=1169"/>
				<updated>2015-05-27T10:36:57Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: /* What you need to know before using this manual */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;_TOC_&lt;br /&gt;
== Aims of the manual ==&lt;br /&gt;
&lt;br /&gt;
This manual is the result of conversations among many different actors (be it GTI participants and facilitators, the multiple authors and reviewers of this manual, from the global south and global north among which are women, queer, trans* and men) about what it means to include a gender perspective into privacy and digital security.  It is informed by the numerous documented stories and creative practices of grassroots activists who have been using and developing appropriated and liberating technologies while ensuring gender justice, privacy and security.  The strengh of this manual comes from the diversity and heterogeneity of grassroots experiences which derive from daily practices with technologies (be those digital or social ones). From dreaming about technologies to developing them, from using them to contributing to their governance. Imagining liberating technologies where everybody is truly welcomed and respected is not a women's and trans* persons' only task, it is a duty for anybody involved in creating an inclusive, accessible, decentralised and neutral internet. &lt;br /&gt;
&lt;br /&gt;
This manual aims at addressing how to better manage our online identity and how to build and promote safe spaces on the internet and in the physical world. Since we understand that including those fast evolving privacy and digital security practices into our already very busy lives as human rights defenders and activists is not an easy task, we believe in the importance of crafting collective mechanisms of support to keep advancing together, empower each other while keeping it zen in order to have our tech work for us.&lt;br /&gt;
&lt;br /&gt;
When attempting to include privacy and digital security practices in our lives, it is fundamental to look at its relationship with gender. But first, what are gender roles? Gender roles are a set of societal norms dictating what types of behaviors are generally considered acceptable for a person in relation to their actual or perceived biological sex. These are usually centered around binary conceptions of femininity and masculinity, although there are myriad variations and gray scales in between. The first step for including gender consists in acknowledging the gender roles that society attributes to us at birth and during the rest of our lives and that generate stereotypes that can become prejudices. The latter can result into specific threats and violence against women, queer or non binary persons along the technological cycle i.e. from the moment a technology is assembled to the disposal of such a technology (such as e-waste). Gender gaps, discrimination and specific Violence Against Women (VAW) are happening along this process in a structural way that influences our experience of and with Information and Communication Technologies (ICTs).&lt;br /&gt;
&lt;br /&gt;
Including gender into privacy and security also requires an intersectional approach that engages with the diversity of cultures, social status, gender identification, sexual orientations, race, ethnicities and other power structures that create various forms and levels of inequality for individuals and communities into their access to security tools and practices. When we speak about including gender along the realms of privacy and digital security:&lt;br /&gt;
&lt;br /&gt;
- we need to take into account the technological cycles from production to assemblage to disposal, as within this cycle a set of structural violences against women is embedded.&lt;br /&gt;
&lt;br /&gt;
- we need to understand how different women in different conditions find ways of accessing technologies, even if they are not supposed to or supported in doing so, and how they can protect themselves and others in the process.&lt;br /&gt;
&lt;br /&gt;
- we need to tackle specific gender-based online violence and build capacity on the ground so that women, trans* and queer can protect and strengthen their freedom of opinion and expression.&lt;br /&gt;
&lt;br /&gt;
- we ought to remember that it consists in researching the herstory and making women, trans* and queer experiences in the management and development of technologies visible, be those digital ones, or appropriated technologies such as permaculture or health and self-care technologies for instance.&lt;br /&gt;
&lt;br /&gt;
- We need to understand that it means enabling a greater participation of women, trans* and queer into institutions contributing to the governance of Internet as well as inside companies and organisations delivering services for supporting our networking and online identity. &lt;br /&gt;
&lt;br /&gt;
- We need to acknowledge that gender gaps, discrimination and VAW are structural and that structures (economic status, gender, sexual orientations, etc.) influence the conditions of women, trans* and queer in relation to their experience of and with ICTs.   &lt;br /&gt;
&lt;br /&gt;
To foster enthusiasm for privacy and digital security along a gender and intersectional frame requires an integrated approach linking those to our well being (self-care) and physical security as human right defenders and our feminists and queer activism. This includes exposing the many invisible contributions that sustain digital security communities, avoid frustrated expectations, gain self confidence and loose fear through Do-It-With-Others (DIWO) processes, among others. Accordingly, adapted, updated and targeted resources and training methodologies focusing on specific threats and strengths is necessary in order to activate curiosity and a better understanding through contextual references. &lt;br /&gt;
&lt;br /&gt;
Because of all this, including gender through a holistic and intersectional approach is also about asking ourselves when we choose to use a specific technology if those are liberating or alienating ones for other groups and individuals. Liberating technologies could be defined as appropriated technologies that do not harm and are fairly produced and distributed, are rooted in the free software and free culture principles and are designed by default against gender based violence, surveillance, opacity and programmed obsolescence. &lt;br /&gt;
&lt;br /&gt;
Nowadays, what is closer to feminist and liberating practices on the Internet are the Feminist Principles on the Internet developed by the Association for Progressive Communications (APC) in 2014, when they gathered a group of Woman Human Rights Defenders and feminist activists to a Global Meeting on Gender, Sexuality and the Internet with the mandate to come up with a first list of principles. Those are about the ways in which the Internet can be a transformative public and political space for women, trans* persons, queer and feminists. It situates tech-related violence on the continuum of gender-based violence making clear the structural aspect of violence linking, expanding and/or mirroring online attitudes with offline prejudices. The principles also highlight surveillance and lack of privacy as patriarchal tools, whether they are used by the state, private individuals or corporations, to control women's and trans* persons' bodies and thoughts.&lt;br /&gt;
&lt;br /&gt;
== What is this manual about? ==&lt;br /&gt;
&lt;br /&gt;
The internet is an amazing space to explore, learn, speak up, listen and communicate with people across the world. Unfortunately, it has also become a contentious space. There is a pushback against people who speak against, question or challenge dominant discourses, especially if those deal with gender and sexual orientations. When planning to be active on the internet as a vocal women, a woman human rights defender, a trans* person and/or a feminist, it’s a good idea to start from an assessment of the traces we leave behind us on the Internet, our digital shadow and the social domains that are spread across our online and physical activities. These two aspects can tell very accurate stories about us; who we are, were we live and hang out, what we are interested in and who our friends are. Because those traces and online identity can expose us to several threats, this manual is about presenting you different strategies you can adopt and tools you can use in order to shape or control your digital shadow and social domains in order to obtain a greater privacy and security online. The first part of this manual will enable you to understand the traces you leave behind on the Internet, your digital shadow and metadata, which are the risks and empowering potential of different online identities (real names, pseudonyms, collective names and anonymity), how you can create new online identities and manage alone or with others various on-line identities. &lt;br /&gt;
&lt;br /&gt;
Once, you have learnt about the possible impact your online identities can have on your life, work and activism, and how you can develop strategies and use tools to mitigate possible risks and enhance possible strengths, the manual will introduce you to how to build safe spaces for you and your organisation, but also how to develop safe spaces and spaces of resistance in mixed environments. Finally, it will present how to create safe spaces in the physical world where women and trans* persons can learn about privacy, digital security and technologies in general in order to be empowered and further contribute to those fields. Safe spaces have been used by marginalized groups and communities for many decades now. They have been a way to care for oneself and for a collective, to design and craft strategies and tactics of resistance and to create an oasis of peace in what sometimes can be a tiring struggle for change. Safe spaces have taken different meanings and bear different names depending on a variety of factors, be they geographical, temporal, spatial, cultural or social, among others. This chapter will enable you to become a moderator well aware of the fundamentals of netiquette and how to contribute to the creation and enforcement of social rules within online communities. You will learn the fundamentals about how to build safe spaces online and offline, gain knowledge on process and methodologies to reclaim and resist in mixed-environment spaces and become aware of current initiatives and processes that can be replicated in your community, organization or collective in order to turn them into safer spaces.&lt;br /&gt;
&lt;br /&gt;
== How to use this manual? ==&lt;br /&gt;
&lt;br /&gt;
This manual serves as a reference guide for women, trans* and queer grassroots activists who want to improve their privacy and digital security practices along gender and intersectional lines. This manual has been designed to be used in three different, but  inter-related ways. First, there is a shorter printed (and PDF) version which contains the most essential elements of how to include gender in privacy and digital security practices. If you are new to this topic, we recommend you start reading the printed (or PDF) manual. The brevity of the printed manual is a great way to get familiar with the topic. Second, there is an online wiki, which complements the printed/PDF material. The wiki goes more in depth and at more length in explaining concepts on how to manage identities online and build safe spaces, in addition to giving examples and instructions on how to turn abstract concepts into practice. Third, the idea with the manual is its evolving and participatory nature. The wiki consists in an evolving document where people from the Gender and Tech Institute community will be given access to the wiki to add content, examples and more sections over the coming months. This wiki also aims at creating a repository of critical resources for women's human rights defenders and activists from the global south and the global north. Documentation about and storytelling on including gender in digital security and privacy practices are particularly lacking and therefore the need to create a reference that can be regularly updated is of prime importance. Through this wiki and its participatory nature, we also hope to create a dialogue between different practices, frameworks and geographies, as well as to build an international community around these issues.&lt;br /&gt;
&lt;br /&gt;
== What you need to know before using this manual ==&lt;br /&gt;
&lt;br /&gt;
Before reading this manual and using the recommendend tools and tactics, it is important to remember that every technology has its risks and therefore precautions ought to be taken to minimise these risks. &lt;br /&gt;
&lt;br /&gt;
The first step we should take before connecting our devices to the internet, is to reflect on the data we have stored on our devices and elsewhere: What kind of data do we produce and/or manage? With whom do we produce this data? Where is this data stored? Which devices or online platforms hold our data? Most importantly, how sensitive is our data and what would happen if this particular data suddenly disappeared or was seen and copied by a third party? To learn more about mapping our data, read: https://gendersec.tacticaltech.org/wiki/index.php/Step_0#Mapping_your_data&lt;br /&gt;
&lt;br /&gt;
Once we've mapped our data, the next step is securing them.&lt;br /&gt;
&lt;br /&gt;
When our data is stored online, on the &amp;quot;cloud&amp;quot;, it is crucial to choose '''strong passwords''', or better '''passphrases''', and to use a different one for each of your accounts. For more information on the importance of strong passwords and how to store them, read Security in a Box's chapter on [https://securityinabox.org/en/guide/passwords passwords] and the [https://ssd.eff.org/en/module/creating-strong-passwords EFF's howto]. A good tool to generate and store strong passwords is '''[https://securityinabox.org/en/guide/keepass/windows KeePassX]'''. A technique to create strong passphrases that are also easy to remember consists in creating a random group of words that don’t make any sense together by using simple, physical dice. Read more about the [https://firstlook.org/theintercept/2015/03/26/passphrases-can-memorize-attackers-cant-guess. '''Diceware''' techique]. &lt;br /&gt;
&lt;br /&gt;
Another very important measure we should take when going online, especially if we are transmitting personal data and passwords, is to always use a '''secure SSL connection''', which ensures that our data cannot be seen by anyone as it travels from our computer to the website we are visiting or to the service we are using. To do so, when we access a website we should type HTTPS instead of HTTP before the url of the website we want to visit. If we receive an error or the HTTPS is replaced by HTTP again, this means that the website is not offering a secure connection. To make sure that we always connect securely to websites when this option is offered, we can install '''[https://www.eff.org/https-everywhere HTTPS Everywhere]''', a Firefox, Chrome, and Opera extension developed by the Electronic Frontier Foundation that encrypts our communications with many major websites. &lt;br /&gt;
&lt;br /&gt;
Likewise, when we create an account with an online service (e.g. our mailbox or a chat network) that we will access through a specific client or app, we should check the features of the service to make sure that it offers a secure connection and configure our clients accordingly by activating the '''TLS/SSL''' option.&lt;br /&gt;
&lt;br /&gt;
Some activities are riskier than others, and in some cases SSL is not enough: we may have good reasons to hide our physical location and our usage of the internet, and to do so we could decide to anonymise our connections through '''[https://www.torproject.org Tor]''', an anonymity network that hides both the location of our connection and what we do on the internet by routing communications through a distributed network of servers run by volunteers all over the world. By consistently using Tor, no one can link our IP address to us, not even the mail server we use. For further information on how to use Tor, see the [https://www.torproject.org TOR project website]. &lt;br /&gt;
&lt;br /&gt;
An easy tool to anonymise our connections when browsing the internet is '''Torbrowser''', the most recommended and rigorously tested tool for keeping our online activities anonymous. For more information on Torbrowser and instructions for Windows users, visit: https://securityinabox.org/en/guide/anonymity-and-circumvention For instructions for Mac OSX users, visit: https://ssd.eff.org/en/module/how-use-tor-mac-os-x&lt;br /&gt;
&lt;br /&gt;
Also the choice of the mail server we use for our contact mail address is important. There are several '''secure servers''' that offer a good service, like the Swiss commercial service Kolab Now (https://kolabnow.com). But the main point is to find a service that offers a secure connection (HTTPS instead of HTTP) and that is compatible with our actual needs. If you think that using a grass-roots service instead of a commercial one is closer to your view of the world, you can open a mail account with an autonomous server such as '''Riseup''' (a site used by activists with a clear set of political principles) or '''Autistici/Inventati''' (A/I). Riseup provides email addresses to activists based on a trust system. You can either get two invite codes from friends who already have Riseup accounts or wait for Riseup to approve your detailed request (which can take a long time). For more info visit: https://user.riseup.net/forms/new_user/first To obtain a mailbox with A/I, you just have to read their policy and manifesto and, if you agree with their principles, fill in a form explaining why you are asking for this service and in which way you share the collective's fundamental principles. To learn more about A/I, visit: http://www.autistici.org/en/about.html&lt;br /&gt;
&lt;br /&gt;
Finally, nothing is secure if we only think about technology and we neglect our '''well-being'''. If we are exhausted, stressed or burnt out, we might make mistakes that impair our security. Read more about this in the Tactical Technology Collective's manual on holistic security: https://tacticaltech.org/holistic-security and this essay on The Psychological Underpinnings of Security Training: https://www.level-up.cc/resources-for-trainers/holistic/psychological-underpinnings-security-training.&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Manual_introduction&amp;diff=1168</id>
		<title>Manual introduction</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Manual_introduction&amp;diff=1168"/>
				<updated>2015-05-27T10:31:00Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: /* How to use this manual? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;_TOC_&lt;br /&gt;
== Aims of the manual ==&lt;br /&gt;
&lt;br /&gt;
This manual is the result of conversations among many different actors (be it GTI participants and facilitators, the multiple authors and reviewers of this manual, from the global south and global north among which are women, queer, trans* and men) about what it means to include a gender perspective into privacy and digital security.  It is informed by the numerous documented stories and creative practices of grassroots activists who have been using and developing appropriated and liberating technologies while ensuring gender justice, privacy and security.  The strengh of this manual comes from the diversity and heterogeneity of grassroots experiences which derive from daily practices with technologies (be those digital or social ones). From dreaming about technologies to developing them, from using them to contributing to their governance. Imagining liberating technologies where everybody is truly welcomed and respected is not a women's and trans* persons' only task, it is a duty for anybody involved in creating an inclusive, accessible, decentralised and neutral internet. &lt;br /&gt;
&lt;br /&gt;
This manual aims at addressing how to better manage our online identity and how to build and promote safe spaces on the internet and in the physical world. Since we understand that including those fast evolving privacy and digital security practices into our already very busy lives as human rights defenders and activists is not an easy task, we believe in the importance of crafting collective mechanisms of support to keep advancing together, empower each other while keeping it zen in order to have our tech work for us.&lt;br /&gt;
&lt;br /&gt;
When attempting to include privacy and digital security practices in our lives, it is fundamental to look at its relationship with gender. But first, what are gender roles? Gender roles are a set of societal norms dictating what types of behaviors are generally considered acceptable for a person in relation to their actual or perceived biological sex. These are usually centered around binary conceptions of femininity and masculinity, although there are myriad variations and gray scales in between. The first step for including gender consists in acknowledging the gender roles that society attributes to us at birth and during the rest of our lives and that generate stereotypes that can become prejudices. The latter can result into specific threats and violence against women, queer or non binary persons along the technological cycle i.e. from the moment a technology is assembled to the disposal of such a technology (such as e-waste). Gender gaps, discrimination and specific Violence Against Women (VAW) are happening along this process in a structural way that influences our experience of and with Information and Communication Technologies (ICTs).&lt;br /&gt;
&lt;br /&gt;
Including gender into privacy and security also requires an intersectional approach that engages with the diversity of cultures, social status, gender identification, sexual orientations, race, ethnicities and other power structures that create various forms and levels of inequality for individuals and communities into their access to security tools and practices. When we speak about including gender along the realms of privacy and digital security:&lt;br /&gt;
&lt;br /&gt;
- we need to take into account the technological cycles from production to assemblage to disposal, as within this cycle a set of structural violences against women is embedded.&lt;br /&gt;
&lt;br /&gt;
- we need to understand how different women in different conditions find ways of accessing technologies, even if they are not supposed to or supported in doing so, and how they can protect themselves and others in the process.&lt;br /&gt;
&lt;br /&gt;
- we need to tackle specific gender-based online violence and build capacity on the ground so that women, trans* and queer can protect and strengthen their freedom of opinion and expression.&lt;br /&gt;
&lt;br /&gt;
- we ought to remember that it consists in researching the herstory and making women, trans* and queer experiences in the management and development of technologies visible, be those digital ones, or appropriated technologies such as permaculture or health and self-care technologies for instance.&lt;br /&gt;
&lt;br /&gt;
- We need to understand that it means enabling a greater participation of women, trans* and queer into institutions contributing to the governance of Internet as well as inside companies and organisations delivering services for supporting our networking and online identity. &lt;br /&gt;
&lt;br /&gt;
- We need to acknowledge that gender gaps, discrimination and VAW are structural and that structures (economic status, gender, sexual orientations, etc.) influence the conditions of women, trans* and queer in relation to their experience of and with ICTs.   &lt;br /&gt;
&lt;br /&gt;
To foster enthusiasm for privacy and digital security along a gender and intersectional frame requires an integrated approach linking those to our well being (self-care) and physical security as human right defenders and our feminists and queer activism. This includes exposing the many invisible contributions that sustain digital security communities, avoid frustrated expectations, gain self confidence and loose fear through Do-It-With-Others (DIWO) processes, among others. Accordingly, adapted, updated and targeted resources and training methodologies focusing on specific threats and strengths is necessary in order to activate curiosity and a better understanding through contextual references. &lt;br /&gt;
&lt;br /&gt;
Because of all this, including gender through a holistic and intersectional approach is also about asking ourselves when we choose to use a specific technology if those are liberating or alienating ones for other groups and individuals. Liberating technologies could be defined as appropriated technologies that do not harm and are fairly produced and distributed, are rooted in the free software and free culture principles and are designed by default against gender based violence, surveillance, opacity and programmed obsolescence. &lt;br /&gt;
&lt;br /&gt;
Nowadays, what is closer to feminist and liberating practices on the Internet are the Feminist Principles on the Internet developed by the Association for Progressive Communications (APC) in 2014, when they gathered a group of Woman Human Rights Defenders and feminist activists to a Global Meeting on Gender, Sexuality and the Internet with the mandate to come up with a first list of principles. Those are about the ways in which the Internet can be a transformative public and political space for women, trans* persons, queer and feminists. It situates tech-related violence on the continuum of gender-based violence making clear the structural aspect of violence linking, expanding and/or mirroring online attitudes with offline prejudices. The principles also highlight surveillance and lack of privacy as patriarchal tools, whether they are used by the state, private individuals or corporations, to control women's and trans* persons' bodies and thoughts.&lt;br /&gt;
&lt;br /&gt;
== What is this manual about? ==&lt;br /&gt;
&lt;br /&gt;
The internet is an amazing space to explore, learn, speak up, listen and communicate with people across the world. Unfortunately, it has also become a contentious space. There is a pushback against people who speak against, question or challenge dominant discourses, especially if those deal with gender and sexual orientations. When planning to be active on the internet as a vocal women, a woman human rights defender, a trans* person and/or a feminist, it’s a good idea to start from an assessment of the traces we leave behind us on the Internet, our digital shadow and the social domains that are spread across our online and physical activities. These two aspects can tell very accurate stories about us; who we are, were we live and hang out, what we are interested in and who our friends are. Because those traces and online identity can expose us to several threats, this manual is about presenting you different strategies you can adopt and tools you can use in order to shape or control your digital shadow and social domains in order to obtain a greater privacy and security online. The first part of this manual will enable you to understand the traces you leave behind on the Internet, your digital shadow and metadata, which are the risks and empowering potential of different online identities (real names, pseudonyms, collective names and anonymity), how you can create new online identities and manage alone or with others various on-line identities. &lt;br /&gt;
&lt;br /&gt;
Once, you have learnt about the possible impact your online identities can have on your life, work and activism, and how you can develop strategies and use tools to mitigate possible risks and enhance possible strengths, the manual will introduce you to how to build safe spaces for you and your organisation, but also how to develop safe spaces and spaces of resistance in mixed environments. Finally, it will present how to create safe spaces in the physical world where women and trans* persons can learn about privacy, digital security and technologies in general in order to be empowered and further contribute to those fields. Safe spaces have been used by marginalized groups and communities for many decades now. They have been a way to care for oneself and for a collective, to design and craft strategies and tactics of resistance and to create an oasis of peace in what sometimes can be a tiring struggle for change. Safe spaces have taken different meanings and bear different names depending on a variety of factors, be they geographical, temporal, spatial, cultural or social, among others. This chapter will enable you to become a moderator well aware of the fundamentals of netiquette and how to contribute to the creation and enforcement of social rules within online communities. You will learn the fundamentals about how to build safe spaces online and offline, gain knowledge on process and methodologies to reclaim and resist in mixed-environment spaces and become aware of current initiatives and processes that can be replicated in your community, organization or collective in order to turn them into safer spaces.&lt;br /&gt;
&lt;br /&gt;
== How to use this manual? ==&lt;br /&gt;
&lt;br /&gt;
This manual serves as a reference guide for women, trans* and queer grassroots activists who want to improve their privacy and digital security practices along gender and intersectional lines. This manual has been designed to be used in three different, but  inter-related ways. First, there is a shorter printed (and PDF) version which contains the most essential elements of how to include gender in privacy and digital security practices. If you are new to this topic, we recommend you start reading the printed (or PDF) manual. The brevity of the printed manual is a great way to get familiar with the topic. Second, there is an online wiki, which complements the printed/PDF material. The wiki goes more in depth and at more length in explaining concepts on how to manage identities online and build safe spaces, in addition to giving examples and instructions on how to turn abstract concepts into practice. Third, the idea with the manual is its evolving and participatory nature. The wiki consists in an evolving document where people from the Gender and Tech Institute community will be given access to the wiki to add content, examples and more sections over the coming months. This wiki also aims at creating a repository of critical resources for women's human rights defenders and activists from the global south and the global north. Documentation about and storytelling on including gender in digital security and privacy practices are particularly lacking and therefore the need to create a reference that can be regularly updated is of prime importance. Through this wiki and its participatory nature, we also hope to create a dialogue between different practices, frameworks and geographies, as well as to build an international community around these issues.&lt;br /&gt;
&lt;br /&gt;
== What you need to know before using this manual ==&lt;br /&gt;
&lt;br /&gt;
Before reading this manual and using the recommendend tools and tactics, it is important to remember that every technology has its risks and therefore precautions ought to be taken to minimise the risks. &lt;br /&gt;
&lt;br /&gt;
The first step we should take before connecting our devices to the internet, is to reflect on the data we have stored on our devices and elsewhere: What kind of data do we produce and/or manage? With whom do we produce these data? Where are these data stored? Which devices or online platforms hold our data? Most importantly, how sensitive are our data and what would happen if this particular data suddenly disappeared or was seen and copied by a third party? To learn more about mapping our data, read: https://gendersec.tacticaltech.org/wiki/index.php/Step_0#Mapping_your_data&lt;br /&gt;
&lt;br /&gt;
Once we've mapped our data, the next step is securing them.&lt;br /&gt;
&lt;br /&gt;
When our data is stored online, on the &amp;quot;cloud&amp;quot;, it is crucial to choose '''strong passwords''', or better '''passphrases''', and to use a different one for each of your accounts. For more information on the importance of strong passwords and how to store them, read Security in a Box's chapter on [https://securityinabox.org/en/guide/passwords passwords] and the [https://ssd.eff.org/en/module/creating-strong-passwords EFF's howto]. A good tool to generate and store strong passwords is '''[https://securityinabox.org/en/guide/keepass/windows KeePassX]'''. A technique to create strong passphrases that are also easy to remember consists in creating a random group of words that don’t make any sense together by using simple, physical dice. Read more about the [https://firstlook.org/theintercept/2015/03/26/passphrases-can-memorize-attackers-cant-guess. '''Diceware''' techique]. &lt;br /&gt;
&lt;br /&gt;
Another very important measure we should take when going online, especially if we are transmitting personal data and passwords, is to always use a '''secure SSL connection''', which ensures that our data cannot be seen by anyone as they travel from our computer to the website we are visiting or to the service we are using. To do so, when we access a website we should type HTTPS instead of HTTP befor the url of the website we want to visit. If we receive an error or the HTTPS is replaced by HTTP again, this means that the website is not offering a secure connection. To make sure that we always connect securely to websites when this option is offered, we can install '''[https://www.eff.org/https-everywhere HTTPS Everywhere]''', a Firefox, Chrome, and Opera extension developed by the Electronic Frontier Foundation that encrypts our communications with many major websites. &lt;br /&gt;
&lt;br /&gt;
Likewise, when we create an account with an online service (e.g. our mailbox or a chat network) that we will access through a specific client or app, we should check the features of the service to make sure that it offers a secure connection and configure our clients accordingly by activating the '''TLS/SSL''' option.&lt;br /&gt;
&lt;br /&gt;
Some activities are riskier than others, and in some cases SSL is not enough: we may have good reasons to hide our physical location and our usage of the internet, and to do so we could decide to anonymise our connections through '''[https://www.torproject.org Tor]''', an anonymity network that conceals both the location of our connection and what we do on the internet by routing communications through a distributed network of servers run by volunteers all over the world. By consistently using Tor, no one can link our IP address to us, not even the mail server we use. For further information on how to use Tor, see the [https://www.torproject.org TOR project website]. &lt;br /&gt;
&lt;br /&gt;
An easy tool to anonymise our connections when browsing the internet is '''Torbrowser''', the most recommended and rigorously tested tool for keeping our online activities anonymous. For more information on Torbrowser and instructions for Windows users, visit: https://securityinabox.org/en/guide/anonymity-and-circumvention For instructions for Mac OSX users, visit: https://ssd.eff.org/en/module/how-use-tor-mac-os-x&lt;br /&gt;
&lt;br /&gt;
Also the choice of the mail server we use for our contact mail address is important. There are several '''secure servers''' that offer a good service, like the Swiss commercial service Kolab Now (https://kolabnow.com). But the main point is to find a service that offers a secure connection (HTTPS instead of HTTP) and that is compatible with our actual needs. If you think that using a grass-roots service instead of a commercial one is closer to your view of the world, you can open a mail account with an autonomous server such as '''Riseup''' (a site used by activists with a clear set of political principles) or '''Autistici/Inventati''' (A/I). Riseup provides email addresses to activists based on a trust system. You can either get two invite codes from friends who already have Riseup accounts or wait for Riseup to approve your detailed request (which can take a long time). For more info visit: https://user.riseup.net/forms/new_user/first To obtain a mailbox with A/I, you just have to read their policy and manifesto and, if you agree with their principles, fill in a form explaining why you are asking for this service and in which way you share the collective's fundamental principles. To learn more about A/I, visit: http://www.autistici.org/en/about.html&lt;br /&gt;
&lt;br /&gt;
Finally, nothing is secure if we only think about technology and we neglect our '''well-being'''. If we are exhausted, stressed or burnt out, we might make mistakes that impair our security. Read more about this in the Tactical Technology Collective's manual on holistic security: https://tacticaltech.org/holistic-security and this essay on The Psychological Underpinnings of Security Training: https://www.level-up.cc/resources-for-trainers/holistic/psychological-underpinnings-security-training.&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Manual_introduction&amp;diff=1167</id>
		<title>Manual introduction</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Manual_introduction&amp;diff=1167"/>
				<updated>2015-05-27T10:27:52Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: /* What is this manual about? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;_TOC_&lt;br /&gt;
== Aims of the manual ==&lt;br /&gt;
&lt;br /&gt;
This manual is the result of conversations among many different actors (be it GTI participants and facilitators, the multiple authors and reviewers of this manual, from the global south and global north among which are women, queer, trans* and men) about what it means to include a gender perspective into privacy and digital security.  It is informed by the numerous documented stories and creative practices of grassroots activists who have been using and developing appropriated and liberating technologies while ensuring gender justice, privacy and security.  The strengh of this manual comes from the diversity and heterogeneity of grassroots experiences which derive from daily practices with technologies (be those digital or social ones). From dreaming about technologies to developing them, from using them to contributing to their governance. Imagining liberating technologies where everybody is truly welcomed and respected is not a women's and trans* persons' only task, it is a duty for anybody involved in creating an inclusive, accessible, decentralised and neutral internet. &lt;br /&gt;
&lt;br /&gt;
This manual aims at addressing how to better manage our online identity and how to build and promote safe spaces on the internet and in the physical world. Since we understand that including those fast evolving privacy and digital security practices into our already very busy lives as human rights defenders and activists is not an easy task, we believe in the importance of crafting collective mechanisms of support to keep advancing together, empower each other while keeping it zen in order to have our tech work for us.&lt;br /&gt;
&lt;br /&gt;
When attempting to include privacy and digital security practices in our lives, it is fundamental to look at its relationship with gender. But first, what are gender roles? Gender roles are a set of societal norms dictating what types of behaviors are generally considered acceptable for a person in relation to their actual or perceived biological sex. These are usually centered around binary conceptions of femininity and masculinity, although there are myriad variations and gray scales in between. The first step for including gender consists in acknowledging the gender roles that society attributes to us at birth and during the rest of our lives and that generate stereotypes that can become prejudices. The latter can result into specific threats and violence against women, queer or non binary persons along the technological cycle i.e. from the moment a technology is assembled to the disposal of such a technology (such as e-waste). Gender gaps, discrimination and specific Violence Against Women (VAW) are happening along this process in a structural way that influences our experience of and with Information and Communication Technologies (ICTs).&lt;br /&gt;
&lt;br /&gt;
Including gender into privacy and security also requires an intersectional approach that engages with the diversity of cultures, social status, gender identification, sexual orientations, race, ethnicities and other power structures that create various forms and levels of inequality for individuals and communities into their access to security tools and practices. When we speak about including gender along the realms of privacy and digital security:&lt;br /&gt;
&lt;br /&gt;
- we need to take into account the technological cycles from production to assemblage to disposal, as within this cycle a set of structural violences against women is embedded.&lt;br /&gt;
&lt;br /&gt;
- we need to understand how different women in different conditions find ways of accessing technologies, even if they are not supposed to or supported in doing so, and how they can protect themselves and others in the process.&lt;br /&gt;
&lt;br /&gt;
- we need to tackle specific gender-based online violence and build capacity on the ground so that women, trans* and queer can protect and strengthen their freedom of opinion and expression.&lt;br /&gt;
&lt;br /&gt;
- we ought to remember that it consists in researching the herstory and making women, trans* and queer experiences in the management and development of technologies visible, be those digital ones, or appropriated technologies such as permaculture or health and self-care technologies for instance.&lt;br /&gt;
&lt;br /&gt;
- We need to understand that it means enabling a greater participation of women, trans* and queer into institutions contributing to the governance of Internet as well as inside companies and organisations delivering services for supporting our networking and online identity. &lt;br /&gt;
&lt;br /&gt;
- We need to acknowledge that gender gaps, discrimination and VAW are structural and that structures (economic status, gender, sexual orientations, etc.) influence the conditions of women, trans* and queer in relation to their experience of and with ICTs.   &lt;br /&gt;
&lt;br /&gt;
To foster enthusiasm for privacy and digital security along a gender and intersectional frame requires an integrated approach linking those to our well being (self-care) and physical security as human right defenders and our feminists and queer activism. This includes exposing the many invisible contributions that sustain digital security communities, avoid frustrated expectations, gain self confidence and loose fear through Do-It-With-Others (DIWO) processes, among others. Accordingly, adapted, updated and targeted resources and training methodologies focusing on specific threats and strengths is necessary in order to activate curiosity and a better understanding through contextual references. &lt;br /&gt;
&lt;br /&gt;
Because of all this, including gender through a holistic and intersectional approach is also about asking ourselves when we choose to use a specific technology if those are liberating or alienating ones for other groups and individuals. Liberating technologies could be defined as appropriated technologies that do not harm and are fairly produced and distributed, are rooted in the free software and free culture principles and are designed by default against gender based violence, surveillance, opacity and programmed obsolescence. &lt;br /&gt;
&lt;br /&gt;
Nowadays, what is closer to feminist and liberating practices on the Internet are the Feminist Principles on the Internet developed by the Association for Progressive Communications (APC) in 2014, when they gathered a group of Woman Human Rights Defenders and feminist activists to a Global Meeting on Gender, Sexuality and the Internet with the mandate to come up with a first list of principles. Those are about the ways in which the Internet can be a transformative public and political space for women, trans* persons, queer and feminists. It situates tech-related violence on the continuum of gender-based violence making clear the structural aspect of violence linking, expanding and/or mirroring online attitudes with offline prejudices. The principles also highlight surveillance and lack of privacy as patriarchal tools, whether they are used by the state, private individuals or corporations, to control women's and trans* persons' bodies and thoughts.&lt;br /&gt;
&lt;br /&gt;
== What is this manual about? ==&lt;br /&gt;
&lt;br /&gt;
The internet is an amazing space to explore, learn, speak up, listen and communicate with people across the world. Unfortunately, it has also become a contentious space. There is a pushback against people who speak against, question or challenge dominant discourses, especially if those deal with gender and sexual orientations. When planning to be active on the internet as a vocal women, a woman human rights defender, a trans* person and/or a feminist, it’s a good idea to start from an assessment of the traces we leave behind us on the Internet, our digital shadow and the social domains that are spread across our online and physical activities. These two aspects can tell very accurate stories about us; who we are, were we live and hang out, what we are interested in and who our friends are. Because those traces and online identity can expose us to several threats, this manual is about presenting you different strategies you can adopt and tools you can use in order to shape or control your digital shadow and social domains in order to obtain a greater privacy and security online. The first part of this manual will enable you to understand the traces you leave behind on the Internet, your digital shadow and metadata, which are the risks and empowering potential of different online identities (real names, pseudonyms, collective names and anonymity), how you can create new online identities and manage alone or with others various on-line identities. &lt;br /&gt;
&lt;br /&gt;
Once, you have learnt about the possible impact your online identities can have on your life, work and activism, and how you can develop strategies and use tools to mitigate possible risks and enhance possible strengths, the manual will introduce you to how to build safe spaces for you and your organisation, but also how to develop safe spaces and spaces of resistance in mixed environments. Finally, it will present how to create safe spaces in the physical world where women and trans* persons can learn about privacy, digital security and technologies in general in order to be empowered and further contribute to those fields. Safe spaces have been used by marginalized groups and communities for many decades now. They have been a way to care for oneself and for a collective, to design and craft strategies and tactics of resistance and to create an oasis of peace in what sometimes can be a tiring struggle for change. Safe spaces have taken different meanings and bear different names depending on a variety of factors, be they geographical, temporal, spatial, cultural or social, among others. This chapter will enable you to become a moderator well aware of the fundamentals of netiquette and how to contribute to the creation and enforcement of social rules within online communities. You will learn the fundamentals about how to build safe spaces online and offline, gain knowledge on process and methodologies to reclaim and resist in mixed-environment spaces and become aware of current initiatives and processes that can be replicated in your community, organization or collective in order to turn them into safer spaces.&lt;br /&gt;
&lt;br /&gt;
== How to use this manual? ==&lt;br /&gt;
&lt;br /&gt;
This manual serves as a reference guide for women, trans* and queer grassroots activists who want to improve their privacy and digital security practices along gender and intersectional lines. This manual has been designed to be used in three different, but  inter-related ways. First, there is a shorter printed (and PDF) version which contains the most essential elements of how to include gender in privacy and digital security practices. If you are new to this topic, we recommend you start reading the printed (or PDF) manual. The brievity of the printed manual is a great way to get accustomed with the topic. Second, there is an online wiki, which complement the printed/pdf material. The wiki goes more in depth and at more length in explaining concepts on how to manage identities online and building safe spaces in addition to giving examples and instructions on how to transform abstract concetps into practice. Third, the idea with the manual is its evolving and participatory nature. The wiki consists in an evolving document where people from the Gender and Tech Institute community will be given access to the wiki to add content, examples and more sections over the coming months. This wiki also aims at creating a repository of critical resources for women's human rights defenders and activists from the global south and the global north. Documentation about and storytelling on including gender in digital security and privacy practices are particularly lacking and therefore the need to create a reference that can be regularly updated is of prime importance. Through this wiki and its participatory nature we also hope to create a dialogue between different practices, frameworks and geographies as to build an international community around these issues.&lt;br /&gt;
&lt;br /&gt;
== What you need to know before using this manual ==&lt;br /&gt;
&lt;br /&gt;
Before reading this manual and using the recommendend tools and tactics, it is important to remember that every technology has its risks and therefore precautions ought to be taken to minimise the risks. &lt;br /&gt;
&lt;br /&gt;
The first step we should take before connecting our devices to the internet, is to reflect on the data we have stored on our devices and elsewhere: What kind of data do we produce and/or manage? With whom do we produce these data? Where are these data stored? Which devices or online platforms hold our data? Most importantly, how sensitive are our data and what would happen if this particular data suddenly disappeared or was seen and copied by a third party? To learn more about mapping our data, read: https://gendersec.tacticaltech.org/wiki/index.php/Step_0#Mapping_your_data&lt;br /&gt;
&lt;br /&gt;
Once we've mapped our data, the next step is securing them.&lt;br /&gt;
&lt;br /&gt;
When our data is stored online, on the &amp;quot;cloud&amp;quot;, it is crucial to choose '''strong passwords''', or better '''passphrases''', and to use a different one for each of your accounts. For more information on the importance of strong passwords and how to store them, read Security in a Box's chapter on [https://securityinabox.org/en/guide/passwords passwords] and the [https://ssd.eff.org/en/module/creating-strong-passwords EFF's howto]. A good tool to generate and store strong passwords is '''[https://securityinabox.org/en/guide/keepass/windows KeePassX]'''. A technique to create strong passphrases that are also easy to remember consists in creating a random group of words that don’t make any sense together by using simple, physical dice. Read more about the [https://firstlook.org/theintercept/2015/03/26/passphrases-can-memorize-attackers-cant-guess. '''Diceware''' techique]. &lt;br /&gt;
&lt;br /&gt;
Another very important measure we should take when going online, especially if we are transmitting personal data and passwords, is to always use a '''secure SSL connection''', which ensures that our data cannot be seen by anyone as they travel from our computer to the website we are visiting or to the service we are using. To do so, when we access a website we should type HTTPS instead of HTTP befor the url of the website we want to visit. If we receive an error or the HTTPS is replaced by HTTP again, this means that the website is not offering a secure connection. To make sure that we always connect securely to websites when this option is offered, we can install '''[https://www.eff.org/https-everywhere HTTPS Everywhere]''', a Firefox, Chrome, and Opera extension developed by the Electronic Frontier Foundation that encrypts our communications with many major websites. &lt;br /&gt;
&lt;br /&gt;
Likewise, when we create an account with an online service (e.g. our mailbox or a chat network) that we will access through a specific client or app, we should check the features of the service to make sure that it offers a secure connection and configure our clients accordingly by activating the '''TLS/SSL''' option.&lt;br /&gt;
&lt;br /&gt;
Some activities are riskier than others, and in some cases SSL is not enough: we may have good reasons to hide our physical location and our usage of the internet, and to do so we could decide to anonymise our connections through '''[https://www.torproject.org Tor]''', an anonymity network that conceals both the location of our connection and what we do on the internet by routing communications through a distributed network of servers run by volunteers all over the world. By consistently using Tor, no one can link our IP address to us, not even the mail server we use. For further information on how to use Tor, see the [https://www.torproject.org TOR project website]. &lt;br /&gt;
&lt;br /&gt;
An easy tool to anonymise our connections when browsing the internet is '''Torbrowser''', the most recommended and rigorously tested tool for keeping our online activities anonymous. For more information on Torbrowser and instructions for Windows users, visit: https://securityinabox.org/en/guide/anonymity-and-circumvention For instructions for Mac OSX users, visit: https://ssd.eff.org/en/module/how-use-tor-mac-os-x&lt;br /&gt;
&lt;br /&gt;
Also the choice of the mail server we use for our contact mail address is important. There are several '''secure servers''' that offer a good service, like the Swiss commercial service Kolab Now (https://kolabnow.com). But the main point is to find a service that offers a secure connection (HTTPS instead of HTTP) and that is compatible with our actual needs. If you think that using a grass-roots service instead of a commercial one is closer to your view of the world, you can open a mail account with an autonomous server such as '''Riseup''' (a site used by activists with a clear set of political principles) or '''Autistici/Inventati''' (A/I). Riseup provides email addresses to activists based on a trust system. You can either get two invite codes from friends who already have Riseup accounts or wait for Riseup to approve your detailed request (which can take a long time). For more info visit: https://user.riseup.net/forms/new_user/first To obtain a mailbox with A/I, you just have to read their policy and manifesto and, if you agree with their principles, fill in a form explaining why you are asking for this service and in which way you share the collective's fundamental principles. To learn more about A/I, visit: http://www.autistici.org/en/about.html&lt;br /&gt;
&lt;br /&gt;
Finally, nothing is secure if we only think about technology and we neglect our '''well-being'''. If we are exhausted, stressed or burnt out, we might make mistakes that impair our security. Read more about this in the Tactical Technology Collective's manual on holistic security: https://tacticaltech.org/holistic-security and this essay on The Psychological Underpinnings of Security Training: https://www.level-up.cc/resources-for-trainers/holistic/psychological-underpinnings-security-training.&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Manual_introduction&amp;diff=1163</id>
		<title>Manual introduction</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Manual_introduction&amp;diff=1163"/>
				<updated>2015-05-27T10:20:29Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;_TOC_&lt;br /&gt;
== Aims of the manual ==&lt;br /&gt;
&lt;br /&gt;
This manual is the result of conversations among many different actors (be it GTI participants and facilitators, the multiple authors and reviewers of this manual, from the global south and global north among which are women, queer, trans* and men) about what it means to include a gender perspective into privacy and digital security.  It is informed by the numerous documented stories and creative practices of grassroots activists who have been using and developing appropriated and liberating technologies while ensuring gender justice, privacy and security.  The strengh of this manual comes from the diversity and heterogeneity of grassroots experiences which derive from daily practices with technologies (be those digital or social ones). From dreaming about technologies to developing them, from using them to contributing to their governance. Imagining liberating technologies where everybody is truly welcomed and respected is not a women's and trans* persons' only task, it is a duty for anybody involved in creating an inclusive, accessible, decentralised and neutral internet. &lt;br /&gt;
&lt;br /&gt;
This manual aims at addressing how to better manage our online identity and how to build and promote safe spaces on the internet and in the physical world. Since we understand that including those fast evolving privacy and digital security practices into our already very busy lives as human rights defenders and activists is not an easy task, we believe in the importance of crafting collective mechanisms of support to keep advancing together, empower each other while keeping it zen in order to have our tech work for us.&lt;br /&gt;
&lt;br /&gt;
When attempting to include privacy and digital security practices in our lives, it is fundamental to look at its relationship with gender. But first, what are gender roles? Gender roles are a set of societal norms dictating what types of behaviors are generally considered acceptable for a person in relation to their actual or perceived biological sex. These are usually centered around binary conceptions of femininity and masculinity, although there are myriad variations and gray scales in between. The first step for including gender consists in acknowledging the gender roles that society attributes to us at birth and during the rest of our lives and that generate stereotypes that can become prejudices. The latter can result into specific threats and violence against women, queer or non binary persons along the technological cycle i.e. from the moment a technology is assembled to the disposal of such a technology (such as e-waste). Gender gaps, discrimination and specific Violence Against Women (VAW) are happening along this process in a structural way that influences our experience of and with Information and Communication Technologies (ICTs).&lt;br /&gt;
&lt;br /&gt;
Including gender into privacy and security also requires an intersectional approach that engages with the diversity of cultures, social status, gender identification, sexual orientations, race, ethnicities and other power structures that create various forms and levels of inequality for individuals and communities into their access to security tools and practices. When we speak about including gender along the realms of privacy and digital security:&lt;br /&gt;
&lt;br /&gt;
- we need to take into account the technological cycles from production to assemblage to disposal, as within this cycle a set of structural violences against women is embedded.&lt;br /&gt;
&lt;br /&gt;
- we need to understand how different women in different conditions find ways of accessing technologies, even if they are not supposed to or supported in doing so, and how they can protect themselves and others in the process.&lt;br /&gt;
&lt;br /&gt;
- we need to tackle specific gender-based online violence and build capacity on the ground so that women, trans* and queer can protect and strengthen their freedom of opinion and expression.&lt;br /&gt;
&lt;br /&gt;
- we ought to remember that it consists in researching the herstory and making women, trans* and queer experiences in the management and development of technologies visible, be those digital ones, or appropriated technologies such as permaculture or health and self-care technologies for instance.&lt;br /&gt;
&lt;br /&gt;
- We need to understand that it means enabling a greater participation of women, trans* and queer into institutions contributing to the governance of Internet as well as inside companies and organisations delivering services for supporting our networking and online identity. &lt;br /&gt;
&lt;br /&gt;
- We need to acknowledge that gender gaps, discrimination and VAW are structural and that structures (economic status, gender, sexual orientations, etc.) influence the conditions of women, trans* and queer in relation to their experience of and with ICTs.   &lt;br /&gt;
&lt;br /&gt;
To foster enthusiasm for privacy and digital security along a gender and intersectional frame requires an integrated approach linking those to our well being (self-care) and physical security as human right defenders and our feminists and queer activism. This includes exposing the many invisible contributions that sustain digital security communities, avoid frustrated expectations, gain self confidence and loose fear through Do-It-With-Others (DIWO) processes, among others. Accordingly, adapted, updated and targeted resources and training methodologies focusing on specific threats and strengths is necessary in order to activate curiosity and a better understanding through contextual references. &lt;br /&gt;
&lt;br /&gt;
Because of all this, including gender through a holistic and intersectional approach is also about asking ourselves when we choose to use a specific technology if those are liberating or alienating ones for other groups and individuals. Liberating technologies could be defined as appropriated technologies that do not harm and are fairly produced and distributed, are rooted in the free software and free culture principles and are designed by default against gender based violence, surveillance, opacity and programmed obsolescence. &lt;br /&gt;
&lt;br /&gt;
Nowadays, what is closer to feminist and liberating practices on the Internet are the Feminist Principles on the Internet developed by the Association for Progressive Communications (APC) in 2014, when they gathered a group of Woman Human Rights Defenders and feminist activists to a Global Meeting on Gender, Sexuality and the Internet with the mandate to come up with a first list of principles. Those are about the ways in which the Internet can be a transformative public and political space for women, trans* persons, queer and feminists. It situates tech-related violence on the continuum of gender-based violence making clear the structural aspect of violence linking, expanding and/or mirroring online attitudes with offline prejudices. The principles also highlight surveillance and lack of privacy as patriarchal tools, whether they are used by the state, private individuals or corporations, to control women's and trans* persons' bodies and thoughts.&lt;br /&gt;
&lt;br /&gt;
== What is this manual about? ==&lt;br /&gt;
&lt;br /&gt;
The internet is an amazing space to explore, learn, speak up, listen and communicate with people across the world. Unfortunately, it has also become a contentious space. There is a pushback against people who speak against, question or challenge dominant discourses, moreover if those deal with gender and sexual orientations. When planning to be active on the internet as a vocal women, a woman human rights defender, a trans-persons and/or a feminist it’s a good idea to start from an assessment of the traces we leave behind us on the Internet, our digital shadow and the social domains that are spread across our online and physical activities. These two aspects can tell very accurate stories about us; who we are, were we live and hang out, what we are interested in and who our friends are. Because those traces and on-line identity can expose us to several threats, this manual is about presenting you different strategies you can adopt and tools you can use in order to shape or control your digital shadow and social domains in order to obtain a greater privacy and security on-line. The first part of this manual will enable you to understand the traces you leave behind on the Internet, your digital shadow and metadata, which are the risks and empowering potential of different on-line identities (real names, pseudonyms, collective names and anonymity), how you can create new on-line identities and manage alone or with others various on-line identities. &lt;br /&gt;
&lt;br /&gt;
Once, you have learn about the possible impact your online identities can have on your life, work and activism, and how you can develop strategies and use tools to mitigate possible risks and enhance possible strengths, the manual will introduce you to how build safe spaces for you and your organisation, but also how to develop safe spaces and spaces of resistance in mixed environments. Finally it will present how to create safe spaces in the physical world where women and trans persons can learn about privacy, digital security and technologies in general in order to get empowered and further contribute to those fields.  Safe spaces have been used by marginalized groups and communities for many decades now. They have been a way to care for one-self and for a collective, to design and craft strategies and tactics of resistance and to create an oasis of peace in what sometimes can be a tiring struggle for resistance. Safe spaces have taken different meanings and bear different names depending on a variety of factors be it geographical, temporal, spatial, cultural and social, among others. This chapter will enable you to become a moderator well aware of fundamentals of net-etiquette and how to contribute to the creation and enforcement of social rules within online communities. You will learn the fundamentals about how to build Safe spaces online and offline, gain knowledge on process and methodologies to reclaim and resist into mixed environments spaced and become aware of current initiatives and processes that can be replicated in your community, organization, collective in order to become a safer space.&lt;br /&gt;
 &lt;br /&gt;
== How to use this manual? ==&lt;br /&gt;
&lt;br /&gt;
This manual serves as a reference guide for women, trans* and queer grassroots activists who want to improve their privacy and digital security practices along gender and intersectional lines. This manual has been designed to be used in three different, but  inter-related ways. First, there is a shorter printed (and PDF) version which contains the most essential elements of how to include gender in privacy and digital security practices. If you are new to this topic, we recommend you start reading the printed (or PDF) manual. The brievity of the printed manual is a great way to get accustomed with the topic. Second, there is an online wiki, which complement the printed/pdf material. The wiki goes more in depth and at more length in explaining concepts on how to manage identities online and building safe spaces in addition to giving examples and instructions on how to transform abstract concetps into practice. Third, the idea with the manual is its evolving and participatory nature. The wiki consists in an evolving document where people from the Gender and Tech Institute community will be given access to the wiki to add content, examples and more sections over the coming months. This wiki also aims at creating a repository of critical resources for women's human rights defenders and activists from the global south and the global north. Documentation about and storytelling on including gender in digital security and privacy practices are particularly lacking and therefore the need to create a reference that can be regularly updated is of prime importance. Through this wiki and its participatory nature we also hope to create a dialogue between different practices, frameworks and geographies as to build an international community around these issues.&lt;br /&gt;
&lt;br /&gt;
== What you need to know before using this manual ==&lt;br /&gt;
&lt;br /&gt;
Before reading this manual and using the recommendend tools and tactics, it is important to remember that every technology has its risks and therefore precautions ought to be taken to minimise the risks. &lt;br /&gt;
&lt;br /&gt;
The first step we should take before connecting our devices to the internet, is to reflect on the data we have stored on our devices and elsewhere: What kind of data do we produce and/or manage? With whom do we produce these data? Where are these data stored? Which devices or online platforms hold our data? Most importantly, how sensitive are our data and what would happen if this particular data suddenly disappeared or was seen and copied by a third party? To learn more about mapping our data, read: https://gendersec.tacticaltech.org/wiki/index.php/Step_0#Mapping_your_data&lt;br /&gt;
&lt;br /&gt;
Once we've mapped our data, the next step is securing them.&lt;br /&gt;
&lt;br /&gt;
When our data is stored online, on the &amp;quot;cloud&amp;quot;, it is crucial to choose '''strong passwords''', or better '''passphrases''', and to use a different one for each of your accounts. For more information on the importance of strong passwords and how to store them, read Security in a Box's chapter on [https://securityinabox.org/en/guide/passwords passwords] and the [https://ssd.eff.org/en/module/creating-strong-passwords EFF's howto]. A good tool to generate and store strong passwords is '''[https://securityinabox.org/en/guide/keepass/windows KeePassX]'''. A technique to create strong passphrases that are also easy to remember consists in creating a random group of words that don’t make any sense together by using simple, physical dice. Read more about the [https://firstlook.org/theintercept/2015/03/26/passphrases-can-memorize-attackers-cant-guess. '''Diceware''' techique]. &lt;br /&gt;
&lt;br /&gt;
Another very important measure we should take when going online, especially if we are transmitting personal data and passwords, is to always use a '''secure SSL connection''', which ensures that our data cannot be seen by anyone as they travel from our computer to the website we are visiting or to the service we are using. To do so, when we access a website we should type HTTPS instead of HTTP befor the url of the website we want to visit. If we receive an error or the HTTPS is replaced by HTTP again, this means that the website is not offering a secure connection. To make sure that we always connect securely to websites when this option is offered, we can install '''[https://www.eff.org/https-everywhere HTTPS Everywhere]''', a Firefox, Chrome, and Opera extension developed by the Electronic Frontier Foundation that encrypts our communications with many major websites. &lt;br /&gt;
&lt;br /&gt;
Likewise, when we create an account with an online service (e.g. our mailbox or a chat network) that we will access through a specific client or app, we should check the features of the service to make sure that it offers a secure connection and configure our clients accordingly by activating the '''TLS/SSL''' option.&lt;br /&gt;
&lt;br /&gt;
Some activities are riskier than others, and in some cases SSL is not enough: we may have good reasons to hide our physical location and our usage of the internet, and to do so we could decide to anonymise our connections through '''[https://www.torproject.org Tor]''', an anonymity network that conceals both the location of our connection and what we do on the internet by routing communications through a distributed network of servers run by volunteers all over the world. By consistently using Tor, no one can link our IP address to us, not even the mail server we use. For further information on how to use Tor, see the [https://www.torproject.org TOR project website]. &lt;br /&gt;
&lt;br /&gt;
An easy tool to anonymise our connections when browsing the internet is '''Torbrowser''', the most recommended and rigorously tested tool for keeping our online activities anonymous. For more information on Torbrowser and instructions for Windows users, visit: https://securityinabox.org/en/guide/anonymity-and-circumvention For instructions for Mac OSX users, visit: https://ssd.eff.org/en/module/how-use-tor-mac-os-x&lt;br /&gt;
&lt;br /&gt;
Also the choice of the mail server we use for our contact mail address is important. There are several '''secure servers''' that offer a good service, like the Swiss commercial service Kolab Now (https://kolabnow.com). But the main point is to find a service that offers a secure connection (HTTPS instead of HTTP) and that is compatible with our actual needs. If you think that using a grass-roots service instead of a commercial one is closer to your view of the world, you can open a mail account with an autonomous server such as '''Riseup''' (a site used by activists with a clear set of political principles) or '''Autistici/Inventati''' (A/I). Riseup provides email addresses to activists based on a trust system. You can either get two invite codes from friends who already have Riseup accounts or wait for Riseup to approve your detailed request (which can take a long time). For more info visit: https://user.riseup.net/forms/new_user/first To obtain a mailbox with A/I, you just have to read their policy and manifesto and, if you agree with their principles, fill in a form explaining why you are asking for this service and in which way you share the collective's fundamental principles. To learn more about A/I, visit: http://www.autistici.org/en/about.html&lt;br /&gt;
&lt;br /&gt;
Finally, nothing is secure if we only think about technology and we neglect our '''well-being'''. If we are exhausted, stressed or burnt out, we might make mistakes that impair our security. Read more about this in the Tactical Technology Collective's manual on holistic security: https://tacticaltech.org/holistic-security and this essay on The Psychological Underpinnings of Security Training: https://www.level-up.cc/resources-for-trainers/holistic/psychological-underpinnings-security-training.&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Manual_introduction&amp;diff=1155</id>
		<title>Manual introduction</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Manual_introduction&amp;diff=1155"/>
				<updated>2015-05-27T10:14:05Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;_TOC_&lt;br /&gt;
== Aims of the manual ==&lt;br /&gt;
&lt;br /&gt;
This manual is the result of conversations among many different actors (be it GTI participants and facilitators, the multiple authors and reviewers of this manual, from the global south and global north among which are women, queer, trans* and men) about what it means to include a gender perspective into privacy and digital security.  It is informed by the numerous documented stories and creative practices of grassroots activists who have been using and developing appropriated and liberating technologies while ensuring gender justice, privacy and security.  The strengh of this manual comes from the diversity and heterogeneity of grassroots experiences which derive from daily practices with technologies (be those digital or social ones). From dreaming about technologies to developing them, from using them to contributing to their governance. Imagining liberating technologies where everybody is truly welcomed and respected is not a women's and trans* persons' only task, it is a duty for anybody involved in creating an inclusive, accessible, decentralised and neutral internet. &lt;br /&gt;
&lt;br /&gt;
This manual aims at addressing how to better manage our online identity and how to build and promote safe spaces on the internet and in the physical world. Since we understand that including those fast evolving privacy and digital security practices into our already very busy lives as human rights defenders and activists is not an easy task, we believe in the importance of crafting collective mechanisms of support to keep advancing together, empower each other while keeping it zen in order to have our tech work for us.&lt;br /&gt;
&lt;br /&gt;
When attempting to include privacy and digital security practices in our lives, it is fundamental to look at its relationship with gender. But first, what are gender roles? Gender roles are a set of societal norms dictating what types of behaviors are generally considered acceptable for a person in relation to their actual or perceived biological sex. These are usually centered around binary conceptions of femininity and masculinity, although there are myriad variations and gray scales in between. The first step for including gender consists in acknowledging the gender roles that society attribute to us at birth and during the rest of our lives and that generate stereotypes that can become prejudices. The latter can result into specific threats and violence against women, queer or non binary persons along the technological cycle i.e. from the moment a technology is assembled to the disposal of such a technology (such as e-waste).  Gender gaps, discrimination and specific Violence Against Women are happening along this process in a structural way that influence our experience of and with Information and Communication Technologies (ICTs).&lt;br /&gt;
&lt;br /&gt;
Including gender into privacy and security also requires an intersectional approach that engages with the diversity of cultures, social status, gender identification, sexual orientations, race, ethnicities and other power structures that create various forms and levels of inequality for individuals and communities into their access to security tools and practices. When we speak about including gender along the realms of privacy and digital security:&lt;br /&gt;
&lt;br /&gt;
- we need to take into account the technological cycles from production to assemblage to disposal, as within this cycle, a set of structural violences against women is embedded.&lt;br /&gt;
&lt;br /&gt;
- we need to understand how different women in different conditions find ways of accessing technologies, even if they are not supposed to or supported in doing so, and how they can protect themselves and others in the process.&lt;br /&gt;
&lt;br /&gt;
- we need to tackle specific gender-based online violence and build capacity on the ground so that women, trans* and queer can protect and strengthen their freedom of opinion and expression.&lt;br /&gt;
&lt;br /&gt;
- we ought to remember that it consists in researching the herstory and making women, trans* and queer experiences in the management and development of technologies visible, be those digital ones, or appropriated technologies such as permaculture or health and self-care technologies for instance.&lt;br /&gt;
&lt;br /&gt;
- We need to understand that it means enabling a greater participation of women, trans* and queer into institutions contributing to the governance of Internet inasmuch as inside companies/organisations delivering services for supporting our networking and online identity. &lt;br /&gt;
&lt;br /&gt;
- We need to acknowledge that gender gaps, discrimination and VAW is structural and that structures (economic status, gender, sexual orientations, etc.) influence the conditions of women, trans* and queer in relation to their experience of and with ICTs.   &lt;br /&gt;
&lt;br /&gt;
To foster enthusiasm for privacy and digital security along a gender and intersectional frame requires an integrated approach linking those to our well being (self-care) and physical security as human right defenders and our feminists and queer activism. This includes exposing the many invisible contributions that sustain digital security communities, avoid frustrated expectations, gain self confidence and loose fear through Do It With Others (DIWO) processes, among others. Accordingly, adapted, updated and targeted resources and training methodologies focusing on specific threats and strengths is necessary in order to activate curiosity and a better understanding through contextual references. &lt;br /&gt;
&lt;br /&gt;
Because of all this, including gender through a holistic and intersectional approach is also about asking ourselves when we choose to use a specific technology if those are liberating or alienating ones for other groups and individuals. Liberating technologies could be defined as appropriated technologies that do not harm and are fairly produced and distributed, are rooted in the free software and free culture principles and are designed by default against gender based violence, surveillance, opacity and programmed obsolescence. &lt;br /&gt;
&lt;br /&gt;
Nowadays, what is closer to feminist and liberating practices on the Internet are the Feminist Principles on the Internet developed by the Association for Progressive Communications (APC) in 2014 when they gathered a group of Woman Human Rights Defenders and feminist activists to a Global Meeting on Gender, Sexuality and the Internet with the mandate to come up with a first list of principles. Those are about the ways in which the Internet can be a transformative public and political space for women, trans-persons, queer and feminists. It situates tech-related violence on the continuum of gender-based violence making clear the structural aspect of violence linking, expanding and/or mirroring online attitudes with offline prejudices. The principles also highlight surveillance and lack of privacy as patriarchal tools, whether they are used by the state, private individuals or corporations, to control women and trans-persons bodies and thoughts.&lt;br /&gt;
&lt;br /&gt;
== What is this manual about? ==&lt;br /&gt;
&lt;br /&gt;
The internet is an amazing space to explore, learn, speak up, listen and communicate with people across the world. Unfortunately, it has also become a contentious space. There is a pushback against people who speak against, question or challenge dominant discourses, moreover if those deal with gender and sexual orientations. When planning to be active on the internet as a vocal women, a woman human rights defender, a trans-persons and/or a feminist it’s a good idea to start from an assessment of the traces we leave behind us on the Internet, our digital shadow and the social domains that are spread across our online and physical activities. These two aspects can tell very accurate stories about us; who we are, were we live and hang out, what we are interested in and who our friends are. Because those traces and on-line identity can expose us to several threats, this manual is about presenting you different strategies you can adopt and tools you can use in order to shape or control your digital shadow and social domains in order to obtain a greater privacy and security on-line. The first part of this manual will enable you to understand the traces you leave behind on the Internet, your digital shadow and metadata, which are the risks and empowering potential of different on-line identities (real names, pseudonyms, collective names and anonymity), how you can create new on-line identities and manage alone or with others various on-line identities. &lt;br /&gt;
&lt;br /&gt;
Once, you have learn about the possible impact your online identities can have on your life, work and activism, and how you can develop strategies and use tools to mitigate possible risks and enhance possible strengths, the manual will introduce you to how build safe spaces for you and your organisation, but also how to develop safe spaces and spaces of resistance in mixed environments. Finally it will present how to create safe spaces in the physical world where women and trans persons can learn about privacy, digital security and technologies in general in order to get empowered and further contribute to those fields.  Safe spaces have been used by marginalized groups and communities for many decades now. They have been a way to care for one-self and for a collective, to design and craft strategies and tactics of resistance and to create an oasis of peace in what sometimes can be a tiring struggle for resistance. Safe spaces have taken different meanings and bear different names depending on a variety of factors be it geographical, temporal, spatial, cultural and social, among others. This chapter will enable you to become a moderator well aware of fundamentals of net-etiquette and how to contribute to the creation and enforcement of social rules within online communities. You will learn the fundamentals about how to build Safe spaces online and offline, gain knowledge on process and methodologies to reclaim and resist into mixed environments spaced and become aware of current initiatives and processes that can be replicated in your community, organization, collective in order to become a safer space.&lt;br /&gt;
 &lt;br /&gt;
== How to use this manual? ==&lt;br /&gt;
&lt;br /&gt;
This manual serves as a reference guide for women, trans* and queer grassroots activists who want to improve their privacy and digital security practices along gender and intersectional lines. This manual has been designed to be used in three different, but  inter-related ways. First, there is a shorter printed (and PDF) version which contains the most essential elements of how to include gender in privacy and digital security practices. If you are new to this topic, we recommend you start reading the printed (or PDF) manual. The brievity of the printed manual is a great way to get accustomed with the topic. Second, there is an online wiki, which complement the printed/pdf material. The wiki goes more in depth and at more length in explaining concepts on how to manage identities online and building safe spaces in addition to giving examples and instructions on how to transform abstract concetps into practice. Third, the idea with the manual is its evolving and participatory nature. The wiki consists in an evolving document where people from the Gender and Tech Institute community will be given access to the wiki to add content, examples and more sections over the coming months. This wiki also aims at creating a repository of critical resources for women's human rights defenders and activists from the global south and the global north. Documentation about and storytelling on including gender in digital security and privacy practices are particularly lacking and therefore the need to create a reference that can be regularly updated is of prime importance. Through this wiki and its participatory nature we also hope to create a dialogue between different practices, frameworks and geographies as to build an international community around these issues.&lt;br /&gt;
&lt;br /&gt;
== Disclamer before using this manual? ==&lt;br /&gt;
&lt;br /&gt;
Before reading this manual and using the recommendend tools and tactics, it is important to remember that every technology has its risks and therefore precautions ought to be taken to minimise the risks. &lt;br /&gt;
&lt;br /&gt;
The first step we should take before connecting our devices to the internet, is to reflect on the data we have stored on our devices and elsewhere: What kind of data do we produce and/or manage? With whom do we produce these data? Where are these data stored? Which devices or online platforms hold our data? Most importantly, how sensitive are our data and what would happen if this particular data suddenly disappeared or was seen and copied by a third party? To learn more about mapping our data, read: https://gendersec.tacticaltech.org/wiki/index.php/Step_0#Mapping_your_data&lt;br /&gt;
&lt;br /&gt;
Once we've mapped our data, the next step is securing them.&lt;br /&gt;
&lt;br /&gt;
When our data is stored online, on the &amp;quot;cloud&amp;quot;, it is crucial to choose '''strong passwords''', or better '''passphrases''', and to use a different one for each of your accounts. For more information on the importance of strong passwords and how to store them, read Security in a Box's chapter on [https://securityinabox.org/en/guide/passwords passwords] and the [https://ssd.eff.org/en/module/creating-strong-passwords EFF's howto]. A good tool to generate and store strong passwords is '''[https://securityinabox.org/en/guide/keepass/windows KeePassX]'''. A technique to create strong passphrases that are also easy to remember consists in creating a random group of words that don’t make any sense together by using simple, physical dice. Read more about the [https://firstlook.org/theintercept/2015/03/26/passphrases-can-memorize-attackers-cant-guess. '''Diceware''' techique]. &lt;br /&gt;
&lt;br /&gt;
Another very important measure we should take when going online, especially if we are transmitting personal data and passwords, is to always use a '''secure SSL connection''', which ensures that our data cannot be seen by anyone as they travel from our computer to the website we are visiting or to the service we are using. To do so, when we access a website we should type HTTPS instead of HTTP befor the url of the website we want to visit. If we receive an error or the HTTPS is replaced by HTTP again, this means that the website is not offering a secure connection. To make sure that we always connect securely to websites when this option is offered, we can install '''[https://www.eff.org/https-everywhere HTTPS Everywhere]''', a Firefox, Chrome, and Opera extension developed by the Electronic Frontier Foundation that encrypts our communications with many major websites. &lt;br /&gt;
&lt;br /&gt;
Likewise, when we create an account with an online service (e.g. our mailbox or a chat network) that we will access through a specific client or app, we should check the features of the service to make sure that it offers a secure connection and configure our clients accordingly by activating the '''TLS/SSL''' option.&lt;br /&gt;
&lt;br /&gt;
Some activities are riskier than others, and in some cases SSL is not enough: we may have good reasons to hide our physical location and our usage of the internet, and to do so we could decide to anonymise our connections through '''[https://www.torproject.org Tor]''', an anonymity network that conceals both the location of our connection and what we do on the internet by routing communications through a distributed network of servers run by volunteers all over the world. By consistently using Tor, no one can link our IP address to us, not even the mail server we use. For further information on how to use Tor, see the [https://www.torproject.org TOR project website]. &lt;br /&gt;
&lt;br /&gt;
An easy tool to anonymise our connections when browsing the internet is '''Torbrowser''', the most recommended and rigorously tested tool for keeping our online activities anonymous. For more information on Torbrowser and instructions for Windows users, visit: https://securityinabox.org/en/guide/anonymity-and-circumvention For instructions for Mac OSX users, visit: https://ssd.eff.org/en/module/how-use-tor-mac-os-x&lt;br /&gt;
&lt;br /&gt;
Also the choice of the mail server we use for our contact mail address is important. There are several '''secure servers''' that offer a good service, like the Swiss commercial service Kolab Now (https://kolabnow.com). But the main point is to find a service that offers a secure connection (HTTPS instead of HTTP) and that is compatible with our actual needs. If you think that using a grass-roots service instead of a commercial one is closer to your view of the world, you can open a mail account with an autonomous server such as '''Riseup''' (a site used by activists with a clear set of political principles) or '''Autistici/Inventati''' (A/I). Riseup provides email addresses to activists based on a trust system. You can either get two invite codes from friends who already have Riseup accounts or wait for Riseup to approve your detailed request (which can take a long time). For more info visit: https://user.riseup.net/forms/new_user/first To obtain a mailbox with A/I, you just have to read their policy and manifesto and, if you agree with their principles, fill in a form explaining why you are asking for this service and in which way you share the collective's fundamental principles. To learn more about A/I, visit: http://www.autistici.org/en/about.html&lt;br /&gt;
&lt;br /&gt;
Finally, nothing is secure if we only think about technology and we neglect our '''well-being'''. If we are exhausted, stressed or burnt out, we might make mistakes that impair our security. Read more about this in the Tactical Technology Collective's manual on holistic security: https://tacticaltech.org/holistic-security and this essay on The Psychological Underpinnings of Security Training: https://www.level-up.cc/resources-for-trainers/holistic/psychological-underpinnings-security-training.&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Manual_introduction&amp;diff=1153</id>
		<title>Manual introduction</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Manual_introduction&amp;diff=1153"/>
				<updated>2015-05-27T10:10:11Z</updated>
		
		<summary type="html">&lt;p&gt;Floriana: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;_TOC_&lt;br /&gt;
== Aims of the manual ==&lt;br /&gt;
&lt;br /&gt;
This manual is the result of conversations among many different actors (be it GTI participants and facilitators, the multiple authors and reviewers of this manual, from the global south and global north among which are women, queer, trans* and men) about what it means to include a gender perspective into privacy and digital security.  It is informed by the numerous documented stories and creative practices of grassroots activists who have been using and developing appropriated and liberating technologies while ensuring gender justice, privacy and security.  The strengh of this manual comes from the diversity and heterogeneity of grassroots experiences which derive from daily practices with technologies (be those digital or social ones). From dreaming about technologies to developing them, from using them to contributing to their governance. Imagining liberating technologies where everybody is truly welcomed and respected is not a women and trans persons only task, it is a duty for anybody involved in creating an inclusive, accessible, decentralised and neutral internet. &lt;br /&gt;
&lt;br /&gt;
This manual aims at addressing how to better manage our online identity and how to build and promote safe spaces on the internet and in the physical world. Since we understand that including those fast evolving privacy and digital security practices into our already very busy lives as human rights defenders and activists is not an easy task, we believe in the importance of crafting collective mechanisms of support to keep advancing together, empower each other while keeping it zen in order to have our tech work for us.&lt;br /&gt;
&lt;br /&gt;
When attempting to include privacy and digital security practices in our lives, it is fundamental to look at its relationship with gender. But first, what are gender roles? Gender roles are a set of societal norms dictating what types of behaviors are generally considered acceptable for a person in relation to their actual or perceived biological sex. These are usually centered around binary conceptions of femininity and masculinity, although there are myriad variations and gray scales in between. The first step for including gender consists in acknowledging the gender roles that society attribute to us at birth and during the rest of our lives and that generate stereotypes that can become prejudices. The latter can result into specific threats and violence against women, queer or non binary persons along the technological cycle i.e. from the moment a technology is assembled to the disposal of such a technology (such as e-waste).  Gender gaps, discrimination and specific Violence Against Women are happening along this process in a structural way that influence our experience of and with Information and Communication Technologies (ICTs).&lt;br /&gt;
&lt;br /&gt;
Including gender into privacy and security also requires an intersectional approach that engages with the diversity of cultures, social status, gender identification, sexual orientations, race, ethnicities and other power structures that create various forms and levels of inequality for individuals and communities into their access to security tools and practices. When we speak about including gender along the realms of privacy and digital security:&lt;br /&gt;
&lt;br /&gt;
- we need to take into account the technological cycles from production to assemblage to disposal, as within this cycle, a set of structural violences against women is embedded.&lt;br /&gt;
&lt;br /&gt;
- we need to understand how different women in different conditions find ways of accessing technologies, even if they are not supposed to or supported in doing so, and how they can protect themselves and others in the process.&lt;br /&gt;
&lt;br /&gt;
- we need to tackle specific gender-based online violence and build capacity on the ground so that women, trans* and queer can protect and strengthen their freedom of opinion and expression.&lt;br /&gt;
&lt;br /&gt;
- we ought to remember that it consists in researching the herstory and making women, trans* and queer experiences in the management and development of technologies visible, be those digital ones, or appropriated technologies such as permaculture or health and self-care technologies for instance.&lt;br /&gt;
&lt;br /&gt;
- We need to understand that it means enabling a greater participation of women, trans* and queer into institutions contributing to the governance of Internet inasmuch as inside companies/organisations delivering services for supporting our networking and online identity. &lt;br /&gt;
&lt;br /&gt;
- We need to acknowledge that gender gaps, discrimination and VAW is structural and that structures (economic status, gender, sexual orientations, etc.) influence the conditions of women, trans* and queer in relation to their experience of and with ICTs.   &lt;br /&gt;
&lt;br /&gt;
To foster enthusiasm for privacy and digital security along a gender and intersectional frame requires an integrated approach linking those to our well being (self-care) and physical security as human right defenders and our feminists and queer activism. This includes exposing the many invisible contributions that sustain digital security communities, avoid frustrated expectations, gain self confidence and loose fear through Do It With Others (DIWO) processes, among others. Accordingly, adapted, updated and targeted resources and training methodologies focusing on specific threats and strengths is necessary in order to activate curiosity and a better understanding through contextual references. &lt;br /&gt;
&lt;br /&gt;
Because of all this, including gender through a holistic and intersectional approach is also about asking ourselves when we choose to use a specific technology if those are liberating or alienating ones for other groups and individuals. Liberating technologies could be defined as appropriated technologies that do not harm and are fairly produced and distributed, are rooted in the free software and free culture principles and are designed by default against gender based violence, surveillance, opacity and programmed obsolescence. &lt;br /&gt;
&lt;br /&gt;
Nowadays, what is closer to feminist and liberating practices on the Internet are the Feminist Principles on the Internet developed by the Association for Progressive Communications (APC) in 2014 when they gathered a group of Woman Human Rights Defenders and feminist activists to a Global Meeting on Gender, Sexuality and the Internet with the mandate to come up with a first list of principles. Those are about the ways in which the Internet can be a transformative public and political space for women, trans-persons, queer and feminists. It situates tech-related violence on the continuum of gender-based violence making clear the structural aspect of violence linking, expanding and/or mirroring online attitudes with offline prejudices. The principles also highlight surveillance and lack of privacy as patriarchal tools, whether they are used by the state, private individuals or corporations, to control women and trans-persons bodies and thoughts.&lt;br /&gt;
&lt;br /&gt;
== What is this manual about? ==&lt;br /&gt;
&lt;br /&gt;
The internet is an amazing space to explore, learn, speak up, listen and communicate with people across the world. Unfortunately, it has also become a contentious space. There is a pushback against people who speak against, question or challenge dominant discourses, moreover if those deal with gender and sexual orientations. When planning to be active on the internet as a vocal women, a woman human rights defender, a trans-persons and/or a feminist it’s a good idea to start from an assessment of the traces we leave behind us on the Internet, our digital shadow and the social domains that are spread across our online and physical activities. These two aspects can tell very accurate stories about us; who we are, were we live and hang out, what we are interested in and who our friends are. Because those traces and on-line identity can expose us to several threats, this manual is about presenting you different strategies you can adopt and tools you can use in order to shape or control your digital shadow and social domains in order to obtain a greater privacy and security on-line. The first part of this manual will enable you to understand the traces you leave behind on the Internet, your digital shadow and metadata, which are the risks and empowering potential of different on-line identities (real names, pseudonyms, collective names and anonymity), how you can create new on-line identities and manage alone or with others various on-line identities. &lt;br /&gt;
&lt;br /&gt;
Once, you have learn about the possible impact your online identities can have on your life, work and activism, and how you can develop strategies and use tools to mitigate possible risks and enhance possible strengths, the manual will introduce you to how build safe spaces for you and your organisation, but also how to develop safe spaces and spaces of resistance in mixed environments. Finally it will present how to create safe spaces in the physical world where women and trans persons can learn about privacy, digital security and technologies in general in order to get empowered and further contribute to those fields.  Safe spaces have been used by marginalized groups and communities for many decades now. They have been a way to care for one-self and for a collective, to design and craft strategies and tactics of resistance and to create an oasis of peace in what sometimes can be a tiring struggle for resistance. Safe spaces have taken different meanings and bear different names depending on a variety of factors be it geographical, temporal, spatial, cultural and social, among others. This chapter will enable you to become a moderator well aware of fundamentals of net-etiquette and how to contribute to the creation and enforcement of social rules within online communities. You will learn the fundamentals about how to build Safe spaces online and offline, gain knowledge on process and methodologies to reclaim and resist into mixed environments spaced and become aware of current initiatives and processes that can be replicated in your community, organization, collective in order to become a safer space.&lt;br /&gt;
 &lt;br /&gt;
== How to use this manual? ==&lt;br /&gt;
&lt;br /&gt;
This manual serves as a reference guide for women, trans* and queer grassroots activists who want to improve their privacy and digital security practices along gender and intersectional lines. This manual has been designed to be used in three different, but  inter-related ways. First, there is a shorter printed (and PDF) version which contains the most essential elements of how to include gender in privacy and digital security practices. If you are new to this topic, we recommend you start reading the printed (or PDF) manual. The brievity of the printed manual is a great way to get accustomed with the topic. Second, there is an online wiki, which complement the printed/pdf material. The wiki goes more in depth and at more length in explaining concepts on how to manage identities online and building safe spaces in addition to giving examples and instructions on how to transform abstract concetps into practice. Third, the idea with the manual is its evolving and participatory nature. The wiki consists in an evolving document where people from the Gender and Tech Institute community will be given access to the wiki to add content, examples and more sections over the coming months. This wiki also aims at creating a repository of critical resources for women's human rights defenders and activists from the global south and the global north. Documentation about and storytelling on including gender in digital security and privacy practices are particularly lacking and therefore the need to create a reference that can be regularly updated is of prime importance. Through this wiki and its participatory nature we also hope to create a dialogue between different practices, frameworks and geographies as to build an international community around these issues.&lt;br /&gt;
&lt;br /&gt;
[[Category:Resources]]&lt;/div&gt;</summary>
		<author><name>Floriana</name></author>	</entry>

	</feed>