Creating different usernames is just the first step when we’re developing an OPSEC plan for pseudonymity. One of the most plausible threats to your privacy/anonymity/pseudonymity is one where the adversary correlates a personality trait across all of your accounts.

In 2011, researchers from University of Cambridge published details in how to correlate traffic patterns of a Tor user, to their real life identity. They did this by taking advantage of the fact that most people visit a certain set of websites on a regular basis. Reddit, Facebook, Twitter, or some specific site of interest. This is an example where an attacker is taking advantage of a personality quirk to attribute you to your identity.

Your writing style is also something attributable. You may know that certain adversaries have the ability to do correlation attacks on your writing style (or at least Edward Snowden thinks so). Taking something that you’ve written anonymously and matching it to something you’ve written in the clear.

The idea of State-Dependant Memory (SDM) can help us here. SDM is when the human brain compartmentalizes certain memories based on the state-of-mind of that person. While in that state-of-mind or consciousness, memories are harder or easier to recall. Think of this like a lock box for your memories. A common example of this is studying for a test at a University. Before your exam, you study in the room you’ll be taking the test, at the time of day you’ll be taking the test, at the same desk that you will be using. When you go to take your exam, your brain will flip into the state that you’ve trained it for, making it easier to recall those memories.

You can apply this as a management tactic for you pseudonymity. For each identity that is created, design a state of mind for that user. Your consciousness can be adjusted using a combination of one of your human inputs: