The Codex · Cybersecurity · Protocol CSP-001

Digital Identity Management

Your digital identity is an aggregate of every account, record, and data point linked to your name online. This protocol defines the standard for auditing what exists, limiting future accumulation, and maintaining the hygiene that prevents your profile from becoming an attack surface.

Protocol CSP-001
Classification Open
Compliance Sentinels and above — required · Knights — strongly advised

Requirements

  1. Members must conduct a full digital footprint audit at least once per year, covering data broker records, breach database entries, social media, and publicly searchable filings.
  2. A tiered email architecture must be maintained at all times: a private primary address for trusted personal contact only, a professional address for business correspondence, a service address for account registrations, and disposable aliases for any service not explicitly trusted.
  3. Every account must use a unique, randomly generated password stored in a reputable password manager. Password reuse across any two accounts is prohibited without exception.
  4. App permissions on all devices must be reviewed quarterly. Location, microphone, and camera access must be restricted to applications that functionally require them. Permissions granted during setup are not to be treated as permanent.
  5. Accounts that have been inactive for more than twelve months must be deleted. Where a platform does not offer account deletion, the account must be stripped of accurate personal information and the associated email address replaced with a disposable alias.
  6. All email addresses in active use must be checked against known breach databases at least annually. Any address confirmed in a data breach must not be used as the primary contact for financial, professional, or sensitive accounts.

The Aggregation Problem

Each piece of information you share online appears inconsequential in isolation. A name on a forum. A phone number on a registration form. A tagged photograph. A business registration. Individually, none of these cause concern. Aggregated, they build a profile detailed enough to impersonate you convincingly, target you specifically, or compromise the institutions and individuals around you.

High-net-worth individuals, executives, and founders are not targeted because attackers are technically sophisticated. They are targeted because the potential return justifies effort that would not be applied to an ordinary individual. The attack surface for someone with significant assets or institutional access is different in kind, not just degree. Standard consumer security practices are not designed for that environment.

The question is not whether your information is out there. It is. The question is how much of it is, how accessible it is, and how much control you have over what is added in future.

Conducting the Audit

Begin by searching your full name, email addresses, and phone numbers across the major data broker aggregators. What you find will likely surprise you. The primary sources of exposure to address:

Email Architecture

Using a single email address for all purposes is the most common and most consequential failure in digital identity management. A breach of any single service exposes your primary contact, your password reset path, and your identity simultaneously. The required tiered architecture eliminates this single point of failure:

Account Hygiene

Most people hold dozens of active accounts they no longer use. Each one is a potential breach vector — a stored password, a linked email address, a saved payment method. The annual account audit is not optional: it is the mechanism by which exposure is kept bounded rather than allowed to accumulate indefinitely.

When reviewing app permissions, the default posture is denial. An application does not receive location access because it asked for it during installation. It receives it only if you have reviewed why it needs it and concluded that the function genuinely requires it. This applies with particular force to microphone and camera permissions, which are rarely necessary and frequently over-requested.

Every piece of information you share online is a permanent disclosure. The standard The Order applies is not "is this sensitive?" — it is "is sharing this necessary?" If the answer is not clearly yes, the answer is no.
← Back to The Codex CSP-002: Authentication Standards →