little-known privacy tool


October 2025

Pseudonym Services?


Little-Known Privacy Tools

We all know password managers, private messenger apps and VPNs, but have you heard of Pseudonym Management Services? This week, we're exploring the benefits of these tools, how they work, and whether or not they're even worth using.

Why I DON'T Use Privacy Cloaking Apps (like MySudo)

Go Deeper: Cloaking your data is nothing new, and it's something I've talked about extensively in the past. It's definitely a worthwhile practice, but your tech stack (i.e. the tools you use) is a very personal choice. Learn more:


Looking at a book called Logo Modernism

Unique Phone #s

What if you could have UNLIMITED phone numbers to give out?

Masking Phone Numbers β†’

A type specimen of Google Fonts

Email Aliases

Learn 5 simple but effective ways to use email aliases for privacy.

Watch the Training β†’


Going Against the Norm


Hi [CORRECTED_NAME GOES HERE], there are a lot of people I respect in the privacy world who use and recommend different tools and strategies than I do. That's one reason why I recommend you listen to others in this privacy and security space, not just me.

MySudo is a great example.

Michael from IntelTechniques and Henry from Techlore are both really smart people who use MySudo to create pseudonyms that they can use both online and in person.

I've tested multiple services similar to this and each time I come to the same conclusion:

It's just not for me.

I like certain features of these privacy tools, but I prefer to use specialized tools instead of an "all-in-one" solution. Why?

  • Data Control: I don't want one company to have too much control over my privacy or data.
  • Risk Management: What if this all-in-one tool suddenly decides to cut me off? (spoiler alert: that's what happened, as you'll see in this week's video).
  • Legacy Tools: Many of these all-in-one solutions step on the toes of privacy tools I already love using.

In the end, I realize I might be in the minority, but that's ok with me. I still think it's worth understanding the benefits of what these Pseudonym Management Services can do to decide whether it fits your needs.

Sponsored by:


This Week in Privacy News

Instagram sets new teen limits in California

Instagram said its teen accounts for users ages 13 to 17 will now only see content that would get a PG-13 rating from the Motion Picture Association, a day after California passed a law requiring social media companies to warn users of β€œprofound” health risks.

--> Washingtonpost.com/technology/2025/10/14/instagram-new-teen-safety-features/

​Android Attack can Hack 2FA Codes

Yet another reason to use a physical 2FA key instead of an authenticator app! Android devices are vulnerable to a new attack that can covertly steal two-factor authentication codes, location timelines, and other private data in less than 30 seconds.

--> Wired.com/story/a-new-attack-lets-hackers-steal-2-factor-authentication-codes-from-android-phones/

ramifications of the AWS outage

The recent AWS outage that affecting hundreds of websites and apps - including Signal! - is a reminder of just how fragile and interconnected our internet ecosystem is.

--> Cybernews.com/news/aws-outage-affects-signal-snapchat-fortnite-amazon/


Your Thoughts?

Do you use one of these pseudonym management services? Feel free to reply to this email and let me know which one you use and why.

I'm open to learning why others might find these so useful.

✌️

Josh


3824 Cedar Springs Rd #801-8170, Dallas, TX 75219
​Unsubscribe Β· Preferences

Upgrade your Online Privacy & Security

Join thousands of individuals and small businesses who understand the value of protecting their important accounts and online privacy. πŸ“· Popular YouTube host πŸ”‘ Simple security πŸ”’Privacy advocate βœ… Get the free "Security Priorities Checklist" here πŸ‘‡ πŸ‘‡

Read more from Upgrade your Online Privacy & Security
AI privacy 101

February 2026 AI Privacy 101 *sponsored by DeleteMe AI Privacy: My 4 Tools & 8 Rules This week, I'm sharing the results of my testing of multiple private AI options that represent different approaches to privacy: middleman, locally hosted, private models and more. If you want more privacy in your use of AI, watch this: AI Privacy Explained: 4 Tools and 8 Rules Go Deeper: As with most technology that I've reviewed, privacy tends to boil down to how you use it instead of the specific tools that...

stop using authenticator apps

January 2026 Counter-Intuitive Tips *sponsored by Yubico Uncommon Cybersecurity Advice What if strong privacy and security is based more on how simple it is (and therefore how likely you are to keep using it) than how effective it might be? If you know somebody who finds cybersecurity a bit overwhelming, you'll want to share this with them: Don't use an Authenticator App (+ other uncommon tips) Go Deeper: Lately I've been spending a lot of time trying to figure out systems and tools that...

contact key verification

January 2026 Verified Contacts? *sponsored by DeleteMe Are You SURE it's Them? It's become harder and harder to distinguish between real videos and fake ones. Hackers are now impersonating voices, images and videos to scam people. This makes it even more important than ever to start verifying the contacts we're communicating with. How to Verify Contacts on iPhone (Checkmark Tutorial) Go Deeper: In addition to Contact Key Verification, there are other "advanced" security features offered that...