Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)WH
Posts
1
Comments
7
Joined
5 days ago

  • Hey, appreciate the review! You're absolutely right - stylometry isnt bulletproof, but its practical threat lies in correlation rather than precision. Intelligence agencies dont need 100% certainty - just enough probability to justify further surveillance. And with modern AI driven linguistic analysis, even "imperfect" stylometry becomes a powerful profiling tool.

    Good point on tor traffic obfuscation. Random background activity helps break traffic patterns, but it's important not to tunnel everything through tor - that just makes correlation attacks easier. Using monero syncing, onion services, and intermittent activity as cover noise is a solid approach, but layering it with non-tor traffic is key.

    I'm Curious are you designing your lesson plan for general opsec education, or is it for a more specific field?

  • Hi thanks again! Can you expand what you mean by "it could use a few edit passes to get things condensed into fewer categories" and "I felt I was reading the same advice in multiple contexts". Would love to fix it.

  • privacy Privacy @lemmy.ml

    A Practical opsec guide – looking for feedback & suggestions