add rewritten stylometry tutorial
1
index.md
|
@ -19,6 +19,7 @@ With this new mkdocs blog version, we have completely changed how you can find b
|
||||||
(Check out [this blogpost](whytheblog/index.md) for more details on our mission)
|
(Check out [this blogpost](whytheblog/index.md) for more details on our mission)
|
||||||
|
|
||||||
## Our latest contributed tutorials:
|
## Our latest contributed tutorials:
|
||||||
|
- 2025-06-07: [Stylometry Protection (Using Local LLMs) [old tutorial rewrite]](stylometry/index.md)
|
||||||
- 2025-06-06: [Laws do not stop crimes](lawsdonotstopcrime/index.md)
|
- 2025-06-06: [Laws do not stop crimes](lawsdonotstopcrime/index.md)
|
||||||
- 2025-06-05: [DoT, DoH, DNSCrypt, DNS over Tor and Local DNS: What actually protects you?](dnscrypt/index.md)
|
- 2025-06-05: [DoT, DoH, DNSCrypt, DNS over Tor and Local DNS: What actually protects you?](dnscrypt/index.md)
|
||||||
- 2025-06-01: [Self-Hosting a Hypervisor on your Home Server](hypervisor_selfhosted/index.md)
|
- 2025-06-01: [Self-Hosting a Hypervisor on your Home Server](hypervisor_selfhosted/index.md)
|
||||||
|
|
BIN
stylometry/1.png
Before Width: | Height: | Size: 72 KiB After Width: | Height: | Size: 37 KiB |
BIN
stylometry/2.png
Before Width: | Height: | Size: 63 KiB After Width: | Height: | Size: 17 KiB |
BIN
stylometry/8.png
Before Width: | Height: | Size: 47 KiB After Width: | Height: | Size: 19 KiB |
BIN
stylometry/9.png
Before Width: | Height: | Size: 40 KiB After Width: | Height: | Size: 16 KiB |
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
author: zl
|
author: zl
|
||||||
date: 2025-05-31
|
date: 2025-06-07
|
||||||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/13"
|
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/13"
|
||||||
xmr: 83geT3KQZGthZ99r1z72t58TFztdDHGHjgnCB3jvniV8FC1bcYf6HriDnSpnt2SZXzcBByNCcjRHiPmtNu5G8CuNG9mfDyY
|
xmr: 83geT3KQZGthZ99r1z72t58TFztdDHGHjgnCB3jvniV8FC1bcYf6HriDnSpnt2SZXzcBByNCcjRHiPmtNu5G8CuNG9mfDyY
|
||||||
tags:
|
tags:
|
||||||
|
@ -46,7 +46,7 @@ This identifiability provides more direct attack vectors for a resourceful adver
|
||||||
|
|
||||||
This approach has been used in [many areas](https://en.wikipedia.org/wiki/Stylometry#Case_studies_of_interest) like forensics, authorship attribution, or determining if [Shakespeare](https://www.latimes.com/science/sciencenow/la-sci-sn-shakespeare-play-linguistic-analysis-20150410-story.html) wrote a play.
|
This approach has been used in [many areas](https://en.wikipedia.org/wiki/Stylometry#Case_studies_of_interest) like forensics, authorship attribution, or determining if [Shakespeare](https://www.latimes.com/science/sciencenow/la-sci-sn-shakespeare-play-linguistic-analysis-20150410-story.html) wrote a play.
|
||||||
|
|
||||||
Multiple anonymous personas, even if they are fully [segmented](../internetsegmentation), can also potentially be correlated based on writing styles, leading to information from both being combined for deanonymization.
|
Multiple anonymous personas, even if they are fully [segmented](../internetsegmentation/index.md), can also potentially be correlated based on writing styles, leading to information from both being combined for deanonymization.
|
||||||
|
|
||||||
Importantly note that stylometry does not have to be done to this scale to be usable. Even without profiles, an adversary can extract a lot of information with algorithmic analysis. As discussed, each minor detail of someone's writing will always give insight into who they are.
|
Importantly note that stylometry does not have to be done to this scale to be usable. Even without profiles, an adversary can extract a lot of information with algorithmic analysis. As discussed, each minor detail of someone's writing will always give insight into who they are.
|
||||||
|
|
||||||
|
@ -70,7 +70,7 @@ By using LLMs, the writing details will be inaccurate to the original text and u
|
||||||
|
|
||||||
### Software and Requirements
|
### Software and Requirements
|
||||||
|
|
||||||
For this tutorial, we will be using **Ollama** for the backend and **Open WebUI** as the frontend. Instruction on how to set both of these up along with information on model choice and performance are in the [local llms tutorial](../openwebuilocalllms/), which is a recommended prerequisite. This post can still be followed with alternate backends or frontends.
|
For this tutorial, we will be using **Ollama** for the backend and **Open WebUI** as the frontend. Instruction on how to set both of these up along with information on model choice and performance are in the [local llms tutorial](../openwebuilocalllms/index.md), which is a recommended prerequisite. This post can still be followed with alternate backends or frontends.
|
||||||
|
|
||||||
Here is a visual of what that setup looks like:
|
Here is a visual of what that setup looks like:
|
||||||
|
|
||||||
|
@ -178,7 +178,7 @@ Using the same process as before, we can save this as a preset and call it Gemma
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
It works, the model outputting lowercase text with friendly, outgoing wording, making the personality of the message completely different and obfuscating the original tone entirely.
|
It works, the model outputting lowercase text with friendly, outgoing wording, making the personality of the message completely different and obfuscating the original tone entirely.
|
||||||
|
|
||||||
Now let's try another writing style, going for short rephrasing. We will write the prompt slightly differently. Creating a preset, we can call it Gemma-4B:Short:
|
Now let's try another writing style, going for short rephrasing. We will write the prompt slightly differently. Creating a preset, we can call it Gemma-4B:Short:
|
||||||
|
|
||||||
|
|