Aged Personas

Getting locked out of your e-mail account is terrifying. It’s called Account Takeover, and folk pay it the most heed, but there’s something that will slay you just the same: Impersonation Fraud. That’s when some miscreant makes out to be you. Age your cheese! Don’t serve up curds, easy to despoil. What do I mean? I mean that you should prove your online persona is old.

Here's one way how.

Personas

I call this tactic Aged Personas.

A persona defined in this context is the group of useful, longterm, pseudonymous addresses. For example:

The Notion of Aging for Authenticity

Authenticity is a problem on the Internet— always has been, always will be.3 The Internet was designed by hippies, and they did a great job, but they underestimated the scammers out there.

The best way to prove that you are who you claim to be is with a public-private key pair. If you have a private key which nobody else has, you can sign your contact deets and post them, and nobody can hack that.4 I have found this method to be tricky. It has fewer steps than the method I’m going to tell you about, but it’s easy to make mistakes.

Another option is proof by reputation. Why do some people quote the New York Times as if it proves their argument? Proof by reputation, for all its faults, is primeval and it’s foolish to deny it. The problem with this method for proving the authenticity of a persona is that, unless it’s on a local scale, the repute comes back to some centralized, opaque third party. Do I trust Substack not to do the dirty on me? Not really.

There’s one more: the test of time. Simply by surviving, one gains authenticity. This is the basis of my method laid out herein. Now, you just need to show that your persona has been around for a long time. What’s a long time? Not sure. Probably more than a year. Start aging your persona now!

Overview

  1. Make your persona-list.
  2. Hash that list.
  3. Publish it as a webpage.
  4. Save the webpage at Internet Archive.
  5. Use weblinks to the archived webpage.
  6. [Optional] Notarize the list on the Bitcoin blockchain via opentimestamps.org. (Do before Step 3).

Hand-holding through the steps

1. Make a list of all your longterm usernames

2. Make a .TXT file

A screenshot of a text file with four addresses, one per line, and then [end of file].  The blue cursor can be seen in the next space after the final square bracket.  The items of the list are: x.com/DiligentDenizen; awfulbadger70@tuta.com; paypal.me/awfulbadger; wendy@awfulogre.cash .

3. Hash your persona

A screenshot of the webpage at md5calc.com, with a field showing that MD5 has been chosen, and a field with pasted text.  It is annotated with an arrow and the word 'paste', pointing to the text field where one enters one's persona text.

A screenshot of the webpage at md5calc.com whereby an MD5 hash is outputted.  It is annotated in red, with an arrow pointing to the 'encode' button, and the MD5 hash underlined, and a warning about extra characters underlined, saying it's okay, it's just the end of lines.

webpage at md5calc.com is annotated to show '1. press this' by a drop down menu; and '2. choose this' by a field stating 'Algorithm'; SHA-256 is chosen here.

4. Make an HTML file and an accompanying javascript file

5. [Optional] Upload files to Open Time Stamp

6. Upload the project folder to netlify.app

7. Save webpage to Internet Archive

8. Use hypertext link as ‘verify it’s me’

Summary and Caveats

Before I said that it was the test of time, but there’s actually a bit of proof by reputation thrown in. We all trust that the Internet Archive dates websites truthfully. There’s also the Bitcoin blockchain for the Open Time Stamps.

It seems a lot to do, but the steps are straightforward when you are doing them. My method puts more work on you, but less on your audience. People end up with one weblink to follow, maybe two.

It’s not foolproof. Someone could hijack your website or YouTube channel and point to an old forgery. This is extremely unlikely. 99.999% of Impersonation Fraud has happened in the last 72 hours. Plus, you could quickly post the correct hashes.

Folk might still doubt you. Aged Personas need to become more commonplace. It’s a boon, all the same, because we get a head start ‘aging our cheese’. Some app will probably do it a lot smoother. Me, I lean towards D.I.Y.


  1. Note that SimpleX usually doesn’t even have persistent URLs. It’s an option. (Return)
  2. OpenAlias (Return)
  3. Totalitarian measures might threaten this. Age verification, just becoming widespread, has the tactic of ‘get ‘em while they’re young’. Whilst not to be reckoned lightly, I think we’re too far gone along this route. (Return)
  4. The Quantum Computing threat is hugely overrated. Not just my opinion, backed up by provable facts. (Return)
  5. Unix is the standard used on the Internet. (Return)
  6. This is not so much for security, but rather for clarity. The hashing handles security. Putting '[end of file]’ tells your reader that you did not forget any entry. Scammers might exploit this ambiguity. (Return)
  7. Command + A (Mac); Control + A (Windows). (Return)
  8. Command + F (Mac); Control + F (Windows). (Return)

Back to the index of blog posts

Tags