Guerrilla Privacy: Compartment Templates and Digital Clones

Banner for the article: "Guerrilla Privacy: Compartment Templates and Digital Clones", showing a silhouette of a man with multi colored silhouettes marked "CLONE"

From Isolation to Active Deception You already know the drill. You compartmentalize your digital life. Shopping stays separate from banking. Work stays separate from personal. Each identity lives in its own VM, its own browser profile, its own email alias. You’ve done the hard work of building walls between your compartments, and that effort has […]

Read More… from Guerrilla Privacy: Compartment Templates and Digital Clones

RBIO: Obfuscate your Identity Without Traditional Burner Phones

RBIO: Obfuscate your Identity Without Traditional Burner Phones

Because rotating devices just moves the fingerprint — not the correlation For years, I believed the golden rule of digital privacy was simple: buy a new phone, get a new SIM, and start fresh. But as a privacy advocate and Cybersecurity evangelist, I realized this strategy was flawed. Rotating devices doesn’t erase your digital footprint; […]

Read More… from RBIO: Obfuscate your Identity Without Traditional Burner Phones

Electronic Disinformation Drops

Electronic Disinformation Drops (Banner)

  Feeding false location & biometric data to crowd-sourced apps The proactive, Guerrilla approach to privacy doesn’t wait for threats to materialize — it anticipates surveillance, then floods the zone with plausible noise. Rather than hiding in the shadows, you create the shadows. With electronic disinformation drops, you don’t just obscure your location — you […]

Read More… from Electronic Disinformation Drops

Making Believable Clones to hide yourself

Making Believable Clones to Hide yourself

Making Believable Clones to hide yourself When I first tackled the problem of digital over-exposure, my tactical article walked you through the basics: flooding every device you own — phone, laptop, smartwatch — with harmless, random traffic so that any single data point became meaningless. In the Tactical Article I just published, we mixed in […]

Read More… from Making Believable Clones to hide yourself