Recently I needed to do some pro-bono development that would get us hated by some “double-plus ungood” people.
Introduction
For my customer’s project, I needed a git archive, a web site, and an email address, all under an alias. The alias was so that the bad guys would need a court order to figure out who to kill (:-))
The usual way to blow your operational security (OPSEC) is to start out ad-hoc, and leave easter-eggs behind for the bad guys to find. For example, getting a repo using your real email address.
Magic Order
To make this possible in Linux, you need to do it in the correct order.
- Start by creating a local account for your alias, to put all its data in
- then get the TOR browser, so you can do things as that alias,
- apply for an email address for your alter ego at proton.me, in Switzerland,
- use that to get a repo at someplace like Codeberg, in Germany,
- and use the Codeberg pages of your repo for the web site.
Caveat
If you use Libre Office to do your documentation, it will record who that created a document, modified it, or commented on it. That could turn your documentation into a neon arrow pointing at yourself.
Ditto for most image files. If you take any yourself, they will have the author’s name in the metadata.

@leaflessca.wordpress.com As usual, that was me, not my old start-up (:-))
LikeLike