28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

In addition to using plug-ins to block sites from identifyying yyou, yyou might

want to confuse potential hackers further byy using a varietyy of e-mail

addresses tailored for individual purposes. For example, in chapter 2 I

discussed wayys of creating anonyymous e-mail accounts in order to

communicate without detection. Similarlyy, for simple dayy-to-dayy browsing,

it’s also a good idea to create multiple e-mail accounts—not to hide but to

make yyourself less interesting to third parties on the Internet. Having

multiple online personalityy profiles dilutes the privacyy impact of having

onlyy one identifiable address. It makes it harder for anyyone to build an

online profile of yyou.

Let’s sayy yyou want to purchase something online. You might want to

create an e-mail address that yyou use exclusivelyy for shopping. You might

also want to have anyything yyou purchase with this e-mail address sent to

yyour mail drop instead of yyour home address. 7 In addition, yyou might want

to use a gift card for yyour purchase, perhaps one yyou reload from time to

time.

This wayy the companyy selling yyou products will onlyy have yyour

nonprimaryy e-mail address, yyour nonprimaryy real-world address, and yyour

more-or-less throwawayy gift card. If there’s ever a data breach at that

companyy, at least the attackers won’t have yyour real e-mail address, realworld

address, or credit card number. This kind of disconnection from an

online purchasing event is good privacyy practice.

You might also want to create another nonprimaryy e-mail address for

social networks. This address might become yyour “public” e-mail address,

which strangers and mere acquaintances can use to get in touch with yyou.

The advantage to this is that, once again, people won’t learn much about

yyou. At least not directlyy. You can further protect yyourself byy giving each

nonprimaryy address a unique name, either a variation on yyour real name or

another name entirelyy.

Be careful if yyou go with the former option. You might not want to list a

middle name—or, if yyou alwayys go byy yyour middle name, yyou might not

want to list yyour first name. Even something innocent like

JohnQDoe@xyyz.com just tipped us off that yyou have a middle name and

that it begins with Q. This is an example of giving out personal information

when it isn’t necessaryy. Remember that yyou are tryying to blend into the

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!