Translations

Complete manual/81/en

From Gender and Tech Resources

This example illustrates how Rutkowska uses isolation of her different social domains as a security strategy. She recognises that security measures can always be vulnerable, and so she reduces her risk by not having everything together in one place that can be targeted for attack. This example can be applied in other ways to your own social domains: by splitting up your social identities and domains, you no longer have a ‘single point of information’ for anyone trying to find out everything they can about you under your single ‘real name’ identity, and potentially using this single identity to attack you online. You’ll read more about ways you can design and manage different types of online identities online for your various ‘social domains’.