Want extra eyes on my identity management and obfuscation process

Nothing in particular wrong with everything you’re doing.

You are going a bit overboard for most threat models. Simplifying things a bit might be more sustainable and wouldn’t add any risks in most people’s case.
Keeping things simple reduces mistakes.

I have to applaud going through all your accounts, I’m well aware it’s painfully tedious at best.

A big concern from my perspective would be backups. A lot of these services have almost no way to help if you forget the password or lose access to the 2FA.
In my case, this is sort of a question of whether I’d be able to retrieve a specific encrypted container using only a good friend or family members devices or what I would need to get in using a new computer.
The biggest risk is probably device theft, so it’s unlikely that everything gets stolen

1 Like