Privacy is a right, not a privilege. This article is for web3 developers, founders, and builders who prefer to operate anonymously for a variety of reasons.
The first section of this web3 privacy guide will teach you how to protect your online activity so that you can remain anonymous from third parties and people who would rather track you than mind their own business.
It’s dangerous to be alone, take this advice!
Browser Splitting
The first step is to switch browsers for your crypto-anon identity. You can, for example, use Brave for personal use and Mozilla Firefox for crypto activities.
Why Should You Use a Different Browser?
Because of tracking technology, you should compartmentalize your browsers based on your activity. Tracking technology is primarily used for targeted advertising and can jeopardize your anonymity.
Browser fingerprinting, for example, can collect highly personal information about the websites you visit and your browser configuration, and it’s particularly difficult to avoid. You can learn more by reading this study.
Essentially, a website or a third party can instantly connect your anonymous activity with your doxxed activity and store this information, which can then be stolen or doxxed in a data breach (which happens, like, all the time).
Your digital fingerprint is usually sold to advertisers, which means that anyone can buy your entire behavioral profile and online activity, compile the data, and obtain your IRL identity.
How to Protect Yourself Against Browser Fingerprinting
To begin, only use one browser for your anonymous persona and never mix it with other online activities. Set it as your default browser to avoid using your doxxed account to log in to apps and chats.
Then:
- Turn off Javascript (most trackers run on it).
- In your browser’s settings, disable tracking scripts.
- Incorporate privacy extensions, such as Privacy Badger, NoScript and Ghostery.
- By default, use Tor or Brave for increased privacy.
- Use this tool from the Electronic Frontier Foundation to test your browser’s security.
-
Tell websites that want to track you to go off and disable cookies in your browser.
(No, you do not “value my privacy” if you got this banner on your website, because if you really did, you wouldn’t need this banner in the first place). -
Use a private browser and privacy friendly search engines.
Additional Levels of Privacy
You have three other options for enhancing your security setup:
- Create a new account that will only be used for your other activities.
- On your existing computer, install a separate VM (Virtual Machine).
- Use a completely different device for your anonymous persona.
When networking anonymously, securely managing your social accounts is critical to avoid doxxing yourself or revealing too much about yourself.
Involuntarily Doxxing
Involuntarily doxxing occurs when you doxx yourself and unconsciously reveal cross information that can lead to your doxxed account.
How to Avoid It
First, create an anonymous account with a new email address, and do not log in with the same browser. If you use Twitter, avoid connecting any phone number, or do it by using disposable ones (like Google Voice or a similar service).
Take appropriate action depending on who you’re trying to hide your identity. Your family? Your government? The rest of the cryptocurrency community?
Twitter displays your followers based on the date you began following them, so don’t start by following or engaging with your friends or with small accounts, since narrowing your identity will be simple. Always follow big accounts first, and wait a while before engaging with people who can connect you to your real-life identity.
Time Zones
A stalker can use your time zone to pinpoint your exact location. It’s not good for your privacy or security if someone knows your time zone and begins adding clues gleaned from your online activity.
Here’s Why You Shouldn’t Doxx Your Time Zone
You never know who’s reading…
Read More: web3.hashnode.com