add rewritten stylometry tutorial

This commit is contained in:
oxeo0 2025-06-07 11:57:07 +02:00
parent 0838f429c7
commit 0154812c4c
No known key found for this signature in database
GPG key ID: B4DCEAB52B5BEC67
6 changed files with 5 additions and 4 deletions

View file

@ -19,6 +19,7 @@ With this new mkdocs blog version, we have completely changed how you can find b
(Check out [this blogpost](whytheblog/index.md) for more details on our mission) (Check out [this blogpost](whytheblog/index.md) for more details on our mission)
## Our latest contributed tutorials: ## Our latest contributed tutorials:
- 2025-06-07: [Stylometry Protection (Using Local LLMs) [old tutorial rewrite]](stylometry/index.md)
- 2025-06-06: [Laws do not stop crimes](lawsdonotstopcrime/index.md) - 2025-06-06: [Laws do not stop crimes](lawsdonotstopcrime/index.md)
- 2025-06-05: [DoT, DoH, DNSCrypt, DNS over Tor and Local DNS: What actually protects you?](dnscrypt/index.md) - 2025-06-05: [DoT, DoH, DNSCrypt, DNS over Tor and Local DNS: What actually protects you?](dnscrypt/index.md)
- 2025-06-01: [Self-Hosting a Hypervisor on your Home Server](hypervisor_selfhosted/index.md) - 2025-06-01: [Self-Hosting a Hypervisor on your Home Server](hypervisor_selfhosted/index.md)

Binary file not shown.

Before

Width:  |  Height:  |  Size: 72 KiB

After

Width:  |  Height:  |  Size: 37 KiB

Before After
Before After

Binary file not shown.

Before

Width:  |  Height:  |  Size: 63 KiB

After

Width:  |  Height:  |  Size: 17 KiB

Before After
Before After

Binary file not shown.

Before

Width:  |  Height:  |  Size: 47 KiB

After

Width:  |  Height:  |  Size: 19 KiB

Before After
Before After

Binary file not shown.

Before

Width:  |  Height:  |  Size: 40 KiB

After

Width:  |  Height:  |  Size: 16 KiB

Before After
Before After

View file

@ -1,6 +1,6 @@
--- ---
author: zl author: zl
date: 2025-05-31 date: 2025-06-07
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/13" gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/13"
xmr: 83geT3KQZGthZ99r1z72t58TFztdDHGHjgnCB3jvniV8FC1bcYf6HriDnSpnt2SZXzcBByNCcjRHiPmtNu5G8CuNG9mfDyY xmr: 83geT3KQZGthZ99r1z72t58TFztdDHGHjgnCB3jvniV8FC1bcYf6HriDnSpnt2SZXzcBByNCcjRHiPmtNu5G8CuNG9mfDyY
tags: tags:
@ -46,7 +46,7 @@ This identifiability provides more direct attack vectors for a resourceful adver
This approach has been used in [many areas](https://en.wikipedia.org/wiki/Stylometry#Case_studies_of_interest) like forensics, authorship attribution, or determining if [Shakespeare](https://www.latimes.com/science/sciencenow/la-sci-sn-shakespeare-play-linguistic-analysis-20150410-story.html) wrote a play. This approach has been used in [many areas](https://en.wikipedia.org/wiki/Stylometry#Case_studies_of_interest) like forensics, authorship attribution, or determining if [Shakespeare](https://www.latimes.com/science/sciencenow/la-sci-sn-shakespeare-play-linguistic-analysis-20150410-story.html) wrote a play.
Multiple anonymous personas, even if they are fully [segmented](../internetsegmentation), can also potentially be correlated based on writing styles, leading to information from both being combined for deanonymization. Multiple anonymous personas, even if they are fully [segmented](../internetsegmentation/index.md), can also potentially be correlated based on writing styles, leading to information from both being combined for deanonymization.
Importantly note that stylometry does not have to be done to this scale to be usable. Even without profiles, an adversary can extract a lot of information with algorithmic analysis. As discussed, each minor detail of someone's writing will always give insight into who they are. Importantly note that stylometry does not have to be done to this scale to be usable. Even without profiles, an adversary can extract a lot of information with algorithmic analysis. As discussed, each minor detail of someone's writing will always give insight into who they are.
@ -70,7 +70,7 @@ By using LLMs, the writing details will be inaccurate to the original text and u
### Software and Requirements ### Software and Requirements
For this tutorial, we will be using **Ollama** for the backend and **Open WebUI** as the frontend. Instruction on how to set both of these up along with information on model choice and performance are in the [local llms tutorial](../openwebuilocalllms/), which is a recommended prerequisite. This post can still be followed with alternate backends or frontends. For this tutorial, we will be using **Ollama** for the backend and **Open WebUI** as the frontend. Instruction on how to set both of these up along with information on model choice and performance are in the [local llms tutorial](../openwebuilocalllms/index.md), which is a recommended prerequisite. This post can still be followed with alternate backends or frontends.
Here is a visual of what that setup looks like: Here is a visual of what that setup looks like:
@ -178,7 +178,7 @@ Using the same process as before, we can save this as a preset and call it Gemma
![image of friendly rephrasing](15.png) ![image of friendly rephrasing](15.png)
It works, the model outputting lowercase text with friendly, outgoing wording, making the personality of the message completely different and obfuscating the original tone entirely. It works, the model outputting lowercase text with friendly, outgoing wording, making the personality of the message completely different and obfuscating the original tone entirely.
Now let's try another writing style, going for short rephrasing. We will write the prompt slightly differently. Creating a preset, we can call it Gemma-4B:Short: Now let's try another writing style, going for short rephrasing. We will write the prompt slightly differently. Creating a preset, we can call it Gemma-4B:Short: