Privacy Tools Guide

Online compartmentalization is the practice of maintaining separate digital identities for different aspects of your life—personal, professional, financial, and sensitive activities. This strategy limits the damage if one identity is compromised and reduces cross-referencing by trackers and data brokers.

Why Compartmentalize Your Online Identity?

Every online activity leaves traces that can be correlated to build a profile of you. When you use the same identity for banking, social media, work, and personal communications, companies and attackers can assemble a complete picture of your life. Compartmentalization creates walls between these spheres.

Real-World Benefits

Core Compartmentalization Strategies

1. Email Identity Separation

Create distinct email addresses for different life domains:

# Example: Setting up email aliases for compartmentalization
# Proton Mail alias syntax
yourname+personal@gmail.com     # Personal
yourname+work@protonmail.com   # Professional
yourname+finance@protonmail.com # Financial
yourname+medical@protonmail.com # Health/medical

Each email should have:

A practical improvement over the alias approach is using a dedicated email domain for each compartment. Services like SimpleLogin and AnonAddy let you create unlimited alias addresses that forward to a real inbox, so you can give every merchant, forum, or service a unique address. When spam arrives, you can disable that alias without touching your real inbox. Cross-compartment linking becomes impossible because no two aliases point to the same domain.

2. Browser Profile Isolation

Use separate browser profiles for different activities:

// Firefox: Create separate profiles for each identity
// Run from command line:
firefox -P "personal" --no-remote
firefox -P "work" --no-remote
firefox -P "financial" --no-remote

// Each profile maintains:
// - Separate cookies
// - Independent storage
// - Different browser fingerprint

Configure each profile with:

Firefox’s Multi-Account Containers extension takes this further: within a single browser window, you can open tabs in color-coded containers that share no cookies or storage. A tab in the “Finance” container is completely isolated from a tab in the “Personal” container. This is more convenient than switching browser profiles while maintaining strong isolation for most threat models.

3. Password Manager Vault Separation

Use your password manager’s organization features to segment credentials:

# Bitwarden: Create separate organizations
# 1. Main vault: Personal accounts
# 2. Work organization: Professional credentials
# 3. Finance folder: Banking and investment logins
# 4. Sensitive folder: High-value targets with extra protection

# KeePass: Separate database files
personal.kdbx    # General accounts
finance.kdbx     # Banking (additional encryption)
work.kdbx        # Professional credentials
sensitive.kdbx   # Critical accounts

Enable additional authentication for sensitive vaults:

4. Device Segregation

For high-threat scenarios, use dedicated devices:

Identity Device Network Purpose
Personal Main phone Home WiFi Social, entertainment
Work Work laptop Office/Corporate VPN Professional tasks
Financial Dedicated device VPN only Banking, investments
Sensitive Burner device Tor only Sensitive communications

5. Network-Level Compartmentalization

Route traffic through different networks based on activity:

# VPN configuration for compartmentalized routing
# Split tunneling based on application

# Route financial traffic through specific VPN
# /etc/openvpn/client.conf
route 10.0.0.0/8 via 10.8.0.1  # Financial network
route 172.16.0.0/12 via 10.8.0.1  # Work network

# Tor for sensitive activities only
# /etc/tor/torrc
TransPort 9040
SocksPort 9050
DNSPort 5353

Configure VPN kill switches per identity to prevent traffic leaks.

Implementing Progressive Compartmentalization

Start with basic separation and increase isolation based on your threat model:

Level 1: Basic Separation

Level 2: Enhanced Isolation

Level 3: Maximum Separation

Threat Model Alignment

The right level depends on your actual risk. A freelancer protecting their privacy from data brokers needs Level 1. A journalist communicating with confidential sources needs Level 3 and possibly additional operational security measures beyond what any software tool can provide. Be honest about your threat model — over-engineering your setup leads to mistakes caused by friction, which introduce the very vulnerabilities you were trying to avoid.

Managing Identity Transitions

When moving between identities:

# Clear browser state between contexts
# Firefox: Close and reopen browser
# Clear history, cookies, cache

# Network switch verification
# Check IP address before sensitive operations
curl https://api.ipify.org

# Verify VPN status
ip addr show tun0  # For OpenVPN
wg show            # For WireGuard

A practical habit: before starting any sensitive session, open a new private window, navigate to a neutral IP-check service, and verify you’re connecting through the expected network. This thirty-second check catches configuration mistakes before you expose your identity.

Common Compartmentalization Mistakes

Avoiding Cross-Contamination

Never:

Cross-contamination is the most common failure mode. A single login from the wrong device or network creates a data point that can link two compartments. Browser autofill is particularly dangerous — if your financial compartment’s browser offers to autofill a credential from your personal compartment, it means both compartments share the same browser profile and are not isolated.

Behavioral Fingerprinting Beyond Technical Controls

Technical isolation stops data from being shared between compartments at the software level. It does not stop behavioral correlation. If your “work” and “personal” browser profiles always go online at the same time of day, from the same ISP, and with similar typing cadences, a determined adversary with access to both data streams can correlate them. This is a high-sophistication threat that most users do not face, but it explains why the highest-security compartments use dedicated devices on separate networks rather than just separate browser profiles.

Payment Isolation

# Virtual card generation for online purchases
# Privacy.com (US) or similar services
# Generate single-use cards per merchant

# Separate payment methods
personal_card     # General purchases
virtual_card      # Online shopping
prepaid_card      # High-risk merchants
cryptocurrency    # Sensitive purchases

Username and Username Pattern Discipline

A compartment is only as strong as its weakest identifier. If you use the same username pattern across compartments — say, “mike_k_1985” for personal and “mike_k_dev” for professional — a data broker or determined researcher can link them through the shared pattern. Use genuinely distinct usernames for each compartment, generated without reference to your real name or any other compartment.

Password managers can help here too. Generate a random memorable phrase as your username just as you’d generate a random password. Tools like Bitwarden’s username generator create pronounceable but random usernames on demand. The goal is that no compartment’s username should share words, numbers, or patterns with any other compartment’s username.

Profile photos are another cross-compartment linkage risk. Using the same profile photo (or similar photos) across compartments makes visual correlation trivial. Use distinct, AI-generated avatars for compartments where a profile photo is required but your real face is not appropriate.

Recovery Planning

Each identity should have independent recovery paths:

# Document recovery procedures per identity
personal:
  recovery_email: personal@example.com
  phone: +1-555-0100
  backup_codes: encrypted storage

work:
  recovery_email: work@company.com
  it_support: company helpdesk
  2fa: hardware token

finance:
  recovery_email: finance@example.com
  phone: separate dedicated line
  2fa: hardware token (stored separately)
  in_person: bank branch verification

Store these recovery documents in encrypted storage that is itself compartmentalized — your personal identity’s recovery document should not be accessible from your financial compartment’s device.

Tools for Managing Multiple Identities

Tool Purpose Compartmentalization Use
Bitwarden Password manager Multiple vaults
Firefox Multi-Account Containers Browser isolation Tab containers
Tor Browser Anonymous browsing Sensitive identities
VPN Network isolation Traffic routing
YubiKey Hardware authentication High-security identities
SimpleLogin Email aliasing Per-service unique addresses
Privacy.com Virtual cards Per-merchant payment isolation

Built by theluckystrike — More at zovo.one