Privacy Tools Guide

Systematically replace your real name with pseudonyms across GitHub, Stack Overflow, social media, e-commerce, and developer platforms, using privacy extensions to audit your public presence and a spreadsheet to track account changes. Your real name links all accounts together, enabling doxxing, identity correlation, and surveillance across platforms. Create a unique pseudonym for each category (development, personal, financial), update your name, commit history, and package metadata, then monitor search results and data brokers for lingering references.

Why Your Real Name Matters

Every platform linking your real name to your online activity creates a correlation point. When your name appears on social media, forums, e-commerce sites, and developer platforms, anyone can build a profile combining your identity, location, interests, and behavior patterns. For developers, this extends to code repositories, package registries, and developer accounts where your real name may be visible in commit logs, package metadata, or account profiles.

Strategic Approach

Before modifying accounts, establish a prioritization framework. Focus on high-exposure platforms first—those with public profiles, search engine indexing, or data broker aggregation. Create a spreadsheet or use a script to track your accounts:

#!/bin/bash
# Audit script to generate account list from known platforms
# Run this to create a baseline of your digital presence

platforms=(
  "github.com"
  "twitter.com"
  "linkedin.com"
  "stackoverflow.com"
  "npmjs.com"
  "pypi.org"
  "dockerhub.io"
  "medium.com"
  "reddit.com"
)

echo "# Online Account Audit"
echo "Date: $(date +%Y-%m-%d)"
echo ""
for platform in "${platforms[@]}"; do
  echo "- [ ] $platform"
done

This baseline helps you systematically work through each account without missing any.

Platform-Specific Modifications

Developer Platforms

GitHub exposes your real name through commit metadata. Even if your profile displays a pseudonym, commit history reveals your actual name. Fix this globally:

# Configure git to use your pseudonym
git config --global user.name "Your Pseudonym"
git config --global user.email "your-pseudonym@users.noreply.github.com"

# For existing commits, use git filter-branch or git filter-repo
git filter-repo --name-callback 'return b"Your Pseudonym".encode()' --email-callback 'return b"your-pseudonym@users.noreply.github.com".encode()'

npm and PyPI inherit name information from your operating system git config. Ensure your publishing identity uses pseudonyms:

# npm configuration
npm config set init-author-name "Your Pseudonym"
npm config set init-author-email "your-pseudonym@example.com"

# .npmrc file example
# init-author-name=Your Pseudonym
# init-author-email=your-pseudonym@example.com

Social Media

Twitter/X allows name changes without verification on most accounts. Navigate to Settings > Account Information > Name and replace your real name. Note that your @username remains unchanged unless you create a new account.

LinkedIn requires real names for professional verification. Consider creating a separate professional pseudonym profile if your threat model permits, or minimize the personal information in your existing profile.

Instagram similarly permits name changes while keeping your handle. Update your display name in Settings > Account > Personal Information.

Email Accounts

Your primary email address often reveals identity through your name. For sensitive accounts, create pseudonym email addresses:

# Using a custom domain with aliases
# In your domain registrar, create catch-all or specific aliases:
# pseudonym1@yourdomain.com -> realemail@gmail.com
# pseudonym2@yourdomain.com -> realemail@gmail.com

# For Gmail, use the plus addressing trick (limited effectiveness):
# realname+anything@gmail.com

For stronger pseudonymization, use email forwarding services like Forward Email or SimpleLogin to create throwaway addresses that forward to your real inbox without revealing it.

E-commerce and Shopping

Amazon, eBay, and other marketplaces display your real name to buyers and sellers. Amazon allows name changes through customer service, though the process requires verification. eBay displays the name on your profile publicly—consider this before making high-value transactions under a pseudonym.

Data Brokers and People Search Sites

Data aggregators like Spokeo, Whitepages, and Acxiom compile public records and sell personal information. Use their opt-out processes:

# Example: Create a personal data removal request log
# Track opt-out requests systematically

echo "Platform | Request Date | Status | Notes" > removal-log.md
echo "---------|--------------|--------|-------" >> removal-log.md
echo "Spokeo | 2026-03-16 | Pending | Submitted opt-out form" >> removal-log.md
echo "Whitepages | 2026-03-16 | Pending | Identity verification required" >> removal-log.md

Many states have laws requiring data broker removal upon request. California’s CCPA and Virginia’s VCDPA provide legal frameworks for these requests.

Handling Accounts That Cannot Be Changed

Some platforms require real-name verification. In these cases, consider:

  1. Separate phone numbers: Use a VOIP number or Google Voice for account verification rather than your primary line
  2. Dedicated devices: Maintain a separate device for accounts requiring real identity
  3. Legal name changes: In extreme cases, legal name changes provide a fresh start, though this has significant implications

Verification and Maintenance

After modifying accounts, verify your changes:

# Check GitHub commit history visibility
curl -s "https://api.github.com/users/YOUR_USERNAME/events" | jq '.[].commits[].author.name'

# Verify search engine indexing
# Use site: search operators to check if your name appears
# site:github.com "your real name"
# site:twitter.com "your real name"

Set calendar reminders quarterly to audit new accounts and verify existing pseudonymity remains intact. New platform signups are the most common source of real-name re-exposure.

Payment Methods and Transaction History

Payment methods often leak real names through transaction records:

Credit Card Cardholder Names

Every credit card transaction includes your name. For accounts with payment history, your name may be visible to account administrators or in transaction logs.

Mitigation strategies:

  1. Use virtual card numbers (Privacy.com, Stripe Issuing) without your name
  2. Create dedicated payment accounts with pseudonyms
  3. Use prepaid cards with pseudonymous registration
  4. Pay for premium services through cryptocurrency (though exchanges require verification)

Cryptocurrency Address Association

Bitcoin transactions are pseudo-anonymous but leave permanent records. If you purchased accounts using crypto tied to your identity, correlation attacks can link pseudonymous accounts to your real identity.

Safer approach:

# Use Monero for truly private transactions (if legal in your jurisdiction)
# Monero provides built-in privacy without third-party analysis

# Or use coin mixing services to break transaction trails
# Remember: tumbling services aren't foolproof against advanced analysis

Email Address Pseudonymization

Your email address often reveals identity patterns. Systematically replace email addresses:

Email Forwarding Services

Services like Forward Email or SimpleLogin create throwaway addresses:

# Using SimpleLogin (owned by Proton)
# Create pseudonym emails like:
# github-myname@simplelogin.co
# twitter-myname@simplelogin.co
# stackoverflow-myname@simplelogin.co

# All forward to your real email without revealing it

Costs: ~$30/year for unlimited aliases with custom domain forwarding.

Self-Hosted Email Forwarding

For control freaks, implement your own email forwarding:

# Nginx configuration for mail forwarding
# (Simplified example - full implementation requires postfix/exim)

# Create catch-all configuration
user@mydomain.com  forward to real@email.com
github-account@mydomain.com  forward to real@email.com
twitter-account@mydomain.com  forward to real@email.com

Cost: Domain registration ($10-15/year) + hosting ($5-10/month) = minimal cost for full control.

Data Broker Removal at Scale

Removing yourself from hundreds of data brokers requires systematic automation:

Data Broker List Compilation

Create a list of all aggregators:

# Major US data brokers to target

BROKERS=(
  "spokeo.com"
  "whitepages.com"
  "peoplefinder.com"
  "truthfinder.com"
  "intelius.com"
  "mylife.com"
  "fastbackgroundcheck.com"
  "publicrecords.searchsystems.net"
  "lexisnexis.com"
  "experian.com"
  "equifax.com"
  "acxiom.com"
  "oracle.com/datacloud"
  "datalogix.com"
)

# International brokers
INTL_BROKERS=(
  "infodel.com"  # Spain
  "schrems.at"   # Austria (GDPR focus)
  "123people.com"  # Global
)

Automated Removal Workflow

#!/bin/bash
# Pseudo-code for systematic removal process

for broker in "${BROKERS[@]}"; do
  echo "Processing $broker..."

  # Identify opt-out mechanism
  # Usually: opt-out form, email request, or CCPA portal

  # Generate removal request
  generate_removal_request "$broker"

  # Submit request
  submit_removal_request "$broker"

  # Log submission
  echo "$(date): Submitted removal to $broker" >> removal-log.txt
done

Search Engine De-indexing

After removing accounts, request search engine de-indexing:

# Google Search Console de-listing
# 1. Add property: yourname.com or domain you control
# 2. Submit removal request for old URLs
# 3. Use URL removal tool

# Directly request removal
curl -X DELETE "https://www.google.com/webmasters/tools/url-removal?entry=https://old-account-url.com"

# Alternative: Robots.txt blocking
# Add to robots.txt:
# User-agent: *
# Disallow: /old-profile-page/

Document and Track Changes

Create persistent documentation of your pseudonymization:

#!/bin/bash
# Create master tracking document

cat > pseudonym-changes.md << 'EOF'
# Pseudonym Migration Log

## Timeline
- 2026-03-01: Started systematic pseudonymization
- 2026-03-15: Completed GitHub migration
- 2026-03-20: Removed from Spokeo and Whitepages

## Account Status

| Platform | Real Name Status | Pseudonym | Date Changed |
|----------|-----------------|-----------|--------------|
| GitHub | ✗ Removed | dev-pseudonym | 2026-03-15 |
| Twitter | ✗ Removed | @my_pseudonym | 2026-03-16 |
| LinkedIn | ⚠ Required | professional-name | N/A |
| Data Brokers | ✗ Removed | N/A | 2026-03-20 |

## Ongoing Verification

- [ ] Monthly search audit for real-name leakage
- [ ] Quarterly data broker opt-outs
- [ ] Annual password rotation
- [ ] Verify email forwarding still active
EOF

# Keep this document secure
gpg --encrypt --recipient your-key pseudonym-changes.md

Handling Account Linking and Login Federations

Modern accounts often use “Login with Google,” “Login with GitHub,” etc. These linked services can leak real names:

For each pseudonymous account:

  1. Create dedicated password (stored in password manager)
  2. Remove “Login with” providers
  3. Set unique recovery email (via email forwarding)
  4. Enable 2FA on the pseudonymous account itself
❌ Bad: Login with GitHub (real name exposed if GitHub is)
✓ Good: Independent login with pseudonymous email + 2FA

Service Tokens and API Keys

If you use API keys for pseudonymous applications, ensure they’re tied to pseudonym accounts:

# GitHub personal access token should be tied to pseudonym account
# npm tokens should authenticate against pseudonym user
# Docker Hub credentials should be pseudonymous

# Audit existing tokens
github-cli auth status
npm config get email
docker login --username pseudonym

Quarterly Maintenance Schedule

Pseudonymization isn’t one-time—maintain ongoing:

WEEKLY:
- Audit script checks for real-name leakage on major platforms

MONTHLY:
- Search Google, DuckDuckGo for real-name + pseudonym
- Check email forwarding services still active

QUARTERLY:
- Data broker opt-outs (Spokeo, Whitepages, etc.)
- Password rotation for pseudonymous accounts
- Verify Git history still uses pseudonyms

ANNUALLY:
- Comprehensive audit of all accounts
- Test recovery procedures
- Update threat model assessment

Built by theluckystrike — More at zovo.one