whoszycher

joined 1 week ago
[–] [email protected] 1 points 23 hours ago

Local ai models can help against basic stylometry, but they're not a silver bullet. Advanced stylometry doesn't just analyze wording - it looks at sentence structure, punctuation habits, even typing cadence. If you just run text through an AI rewriter without changing behavioral patterns, you're still traceable.

AI can be a tool, but relying on it blindly just shifts your fingerprint rather than erasing it.

[–] [email protected] 2 points 23 hours ago

Hey, I just added table of contents, you can even look at github commits (https://github.com/whos-zycher/opsec-guide/commits/main/)

Ill check his work for sure!

[–] [email protected] 2 points 23 hours ago

youre welcome!

[–] [email protected] 1 points 6 days ago* (last edited 6 days ago)

Hey, thanks for feedback! I will rewrite it a bit - expand the threat model and maybe will add some security "level" thing.

[–] [email protected] 2 points 6 days ago

good catch! Will change it.

[–] [email protected] 2 points 6 days ago (1 children)

Hey, appreciate the review! You're absolutely right - stylometry isnt bulletproof, but its practical threat lies in correlation rather than precision. Intelligence agencies dont need 100% certainty - just enough probability to justify further surveillance. And with modern AI driven linguistic analysis, even "imperfect" stylometry becomes a powerful profiling tool.

Good point on tor traffic obfuscation. Random background activity helps break traffic patterns, but it's important not to tunnel everything through tor - that just makes correlation attacks easier. Using monero syncing, onion services, and intermittent activity as cover noise is a solid approach, but layering it with non-tor traffic is key.

I'm Curious are you designing your lesson plan for general opsec education, or is it for a more specific field?

[–] [email protected] 1 points 1 week ago (2 children)

Hi thanks again! Can you expand what you mean by "it could use a few edit passes to get things condensed into fewer categories" and "I felt I was reading the same advice in multiple contexts". Would love to fix it.

[–] [email protected] 4 points 1 week ago (3 children)

Thanks! Hope it will help you sharing the knowledge, good luck!

[–] [email protected] 2 points 1 week ago (4 children)

Thanks! Take your time and share your opinion after reading.

[–] [email protected] 2 points 1 week ago

thanks for the feedback! I will add these things, appreciate it bro.

 

I recently put together a detailed opsec guide that covers practical steps for reducing your digital footprint, securing communications, and avoiding common pitfalls people make when trying to stay private online.

The goal was to create something that's actually useful and not just the usual "use a vpn and tor" advice. I tried to break down realistic methods that can help both beginners and people already familiar with opsec.

Id love to get some feedback from the community - what's missing, what could be improved, and if there's anything you disagree with.