Privacy Tools Guide

Create completely separate digital identities by using distinct email addresses (no shared domains), separate payment methods (different cards or cryptocurrency wallets per persona), different device profiles or virtual machines, and different usernames across platforms. Never cross-pollinate data between identities—don’t use your work email on personal accounts, don’t access personal accounts from work devices. If one persona is compromised, the others remain protected. This is essential for developers, journalists, or anyone with multiple professional/personal/anonymous lives.

Why Identity Compartmentalization Matters

Every data point you share online contributes to a profile that can be used against you. When your real name, email, phone number, and location are connected across platforms, attackers can build dossiers through correlation attacks. A single breach at one service can expose your entire digital life.

For developers and power users, the stakes are even higher. Your GitHub contributions, npm packages, Stack Overflow posts, and professional profiles create a detailed trail back to your real identity. Anyone with moderate OSINT capabilities can connect these dots. Compartmentalization provides defense in depth—if one persona is compromised, your other identities remain protected.

Core Components of Identity Separation

Effective compartmentalization requires addressing four interconnected elements: identifiers, communication channels, payment methods, and device isolation. Each component must be independently secured to prevent correlation.

Unique Identifiers Per Persona

Create distinct email addresses for each persona. Use email aliases or dedicated email providers to ensure no two personas share an email domain that could be correlated. For high-security personas, consider email providers that don’t require phone verification.

Generate unique usernames that don’t hint at your real identity or other personas. Avoid patterns like “johndoe_dev” and “johndoe_personal”—these make correlation trivial.

For phone numbers, use VoIP services or dedicated SIM cards for each persona. Many privacy-conscious developers maintain separate phone numbers for banking, social media, and anonymous activities.

Isolated Communication Channels

Each persona should have its own communication infrastructure. This means different Signal numbers, different Matrix accounts, and different email addresses. Never communicate between personas using the same channel.

Consider using a password manager to generate and store unique credentials for each persona. Tools like 1Password, Bitwarden, or KeepassXC support multiple vaults—use separate vaults for each identity:

# Example: Using Bitwarden CLI to create separate vaults
bw create organization "Personal Identity"
bw create organization "Anonymous Persona"
bw create organization "Professional Identity"

This organizational structure ensures that even if one vault is compromised, your other identities remain secure.

Payment Method Isolation

Payment correlation represents one of the most overlooked attack vectors. When your anonymous persona makes purchases using a credit card linked to your real identity, you’ve completely undermined your compartmentalization effort.

For anonymous purchases, consider:

Always use separate billing addresses for each persona. A shipping address that can be traced back to your real address defeats the purpose of anonymous purchasing.

Device Isolation Strategies

Physical device separation provides the strongest compartmentalization guarantees. Each persona gets its own device, or at minimum, its own user account with encrypted home directories.

Hardware Isolation

The most secure approach uses dedicated hardware for each persona:

# Example: Verify system isolation on Linux
# Check active user sessions
who
# List all local users
cut -d: -f1 /etc/passwd
# Verify separate encrypted volumes
ls -la /dev/mapper/

For developers, this might mean using a personal laptop for anonymous research, a work laptop for professional activities, and a dedicated secure device for sensitive operations like cryptocurrency management.

Virtual Machine Isolation

When physical separation isn’t practical, virtual machines provide reasonable isolation:

# Create an isolated VM using QEMU
qemu-img create anonymous Persona.qcow2 20G
qemu-kvm -m 2048 -hda anonymous-Persona.qcow2 \
  -net nic -net user,hostfwd=tcp::2222-:22 \
  -snapshot

Configure VMs with minimal network exposure and consider using Whonix or similar hardened distributions for high-security activities.

Network-Level Compartmentalization

Your network traffic reveals significant information about your activities. Each persona should use distinct network paths to prevent traffic analysis.

VPN Configuration Per Persona

Configure different VPN connections for different personas. Never route all traffic through a single VPN—if that connection fails or leaks, your entire compartmentalization collapses.

# Example: WireGuard configuration for persona-specific routing
# /etc/wireguard/personal.conf
[Interface]
PrivateKey = <persona-specific-private-key>
Address = 10.0.1.2/24

[Peer]
PublicKey = <vpn-server-public-key>
AllowedIPs = 0.0.0.0/0
PersistentKeepalive = 25

# /etc/wireguard/anonymous.conf
[Interface]
PrivateKey = <different-private-key>
Address = 10.0.2.2/24

[Peer]
PublicKey = <different-vpn-server-public-key>
AllowedIPs = 0.0.0.0/0
PersistentKeepalive = 25

Use network namespaces on Linux to completely isolate network stacks:

# Create isolated network namespace for anonymous persona
ip netns add anonymous-persona
ip netns exec anonymous-persona ip link set lo up
ip netns exec anonymous-persona wg attach anonymous.conf

DNS Isolation

Configure separate DNS resolvers for each persona. Use encrypted DNS (DoH or DoT) with different providers to prevent DNS leakage between personas.

Operational Security Practices

Technical isolation only works with consistent operational practices. Develop habits that maintain compartment boundaries.

Credential Management

Never reuse passwords across personas. Generate unique, high-entropy passwords for each service:

# Generate secure passwords with age or Bitwarden
bw generate -uln --length 32

Use hardware tokens (YubiKey, SoloKey) where possible, with separate tokens for different personas to prevent cross-contamination.

Session Management

Regularly audit active sessions across all personas. Log out of services when not in use. Use ephemeral containers for sensitive browsing:

# Launch isolated Firefox container with firejail
firejail --name=anonymous-browse --private firefox

Data Lifecycle

Implement strict data retention policies for each persona. Delete communications, temporary files, and cached data regularly. Use encrypted storage with automatic locking:

# Auto-mount encrypted storage on demand
sudo cryptsetup luksOpen /dev/sdb1 anonymous-store
sudo mount /dev/mapper/anonymous-store /mnt/secure-store

Implementation Checklist

To verify your compartmentalization is effective, regularly check:

  1. Cross-persona correlation: Search for your persona usernames alongside your real name—ensure no results appear
  2. Network isolation: Verify each persona uses different IP addresses by checking IPinfo while using each identity
  3. Payment trail: Audit your financial records to confirm no anonymous purchases link to real payment methods
  4. Device separation: Confirm each persona uses distinct devices or at minimum distinct user accounts
  5. Credential isolation: Check your password manager to ensure each persona has completely separate credentials

Metadata Correlation Attacks

Even when identities are technically separate, metadata can reveal connections. Understand these common correlation vectors:

IP Address Correlation

Using the same IP for multiple personas is the most obvious leak:

# Check what IP addresses reveal about you
curl -s https://ifconfig.me  # Returns your IP

# Use different VPNs/proxies for each persona
# Persona 1: ProtonVPN Singapore
# Persona 2: Mullvad Amsterdam
# Persona 3: Local network only (no VPN)

# Verify complete IP isolation
for i in 1 2 3; do
    echo "Persona $i:"
    sudo ip netns exec persona$i curl -s https://ifconfig.me
done

Browser Fingerprinting Correlation

Fingerprinting techniques identify you despite IP changes:

// Browser fingerprint reveals device/browser combination
// Even with different logins, this can link personas

// Check your fingerprint at https://browserleaks.com/
// Device identifiers to watch:
// - Canvas fingerprinting
// - WebGL fingerprint
// - Installed fonts
// - Screen resolution

Use containers or separate devices to prevent fingerprinting attacks across personas.

Payment Correlation

Payment methods represent the strongest correlation vector. Never link payment methods across personas:

# Persona tracking via payment methods

# WEAK approach (correlated):
persona1_card="1234 5678 9012 3456"  # Visa ending 3456
persona2_card="9876 5432 1098 7654"  # Visa ending 7654
# Both cards bill to same address = correlated

# STRONG approach (compartmentalized):
persona1_card="Privacy.com virtual card, address A"
persona2_card="Cash-purchased gift card, address B"
persona3_payment="Monero to CoinJoin to merchant"

Advanced: State Inference Attacks

Sophisticated attackers infer connections between personas through behavioral patterns:

Temporal Correlation

Activities at unusual times can link personas:

Persona A posts on Reddit at 3 AM EST (unusual for USA)
Persona B posts on Twitter at 4 AM EST (same unusual time)
Analyst: Likely same person, timezone UTC

Vary your activity times across personas. If your real work is 9-5 EST, have Persona A active during those hours, Persona B in opposite hours.

Language and Writing Style Analysis

Linguistic analysis can identify authors even across anonymous accounts:

Mitigation: Write differently for each persona. Use grammar checking tools to vary style. If you have a distinctive writing voice, exaggerate that for one persona and adopt a different style for others.

Content Correlation

Your interests link personas:

Persona A: Posts about Solidity smart contracts
Persona B: Posts about Ethereum scaling solutions
Analyst: Same person (specialized interest overlap unlikely)

Intentionally diversify interests across personas. If you’re a crypto developer, have one persona focused on crypto, another on completely different topics.

Monitoring Compartmentalization Integrity

Regularly audit your compartmentalization:

#!/bin/bash
# Quarterly compartmentalization audit

echo "=== Checking Email Separation ==="
# List all emails associated with each persona
grep -h "persona.*@" ~/.mailrc

echo "=== Checking Device Usage ==="
# Verify no cross-usage
for device in work-laptop personal-laptop anonymous-pi; do
    echo "$device last access:"
    stat /path/to/$device | grep Access
done

echo "=== Checking Password Isolation ==="
# Bitwarden CLI: count separate vaults
bw list items | jq '.[] | .organizationId' | sort -u | wc -l

echo "=== Checking Payment Methods ==="
# Verify no shared payment methods
echo "Persona 1 payments:"
grep -i persona1 ~/finance/payments.csv
echo "Persona 2 payments:"
grep -i persona2 ~/finance/payments.csv

Compartmentalization Failure Recovery

If compartmentalization is compromised, respond immediately:

Immediate Actions

  1. Change all passwords for compromised persona
  2. Revoke API keys and credentials
  3. Deactivate accounts if the persona is burned
  4. Monitor for further leaks through Google Alerts and data breach feeds
  5. Notify any partners relying on compartmentation with that persona

Post-Incident Analysis

# Determine scope of compromise
# Review access logs from affected persona accounts

# Example: GitHub compromise
git log --all --reverse | grep "commit by [persona-email]" | head -20

# Example: AWS compromise
aws cloudtrail lookup-events \
  --lookup-attributes AttributeKey=Username,AttributeValue=persona-user \
  --start-time 2026-03-01 --end-time 2026-03-21

Document exactly what was exposed. This informs recovery procedures.

Built by theluckystrike — More at zovo.one