How to prevent identity linking (using multiple identities)

Introduction: Privacy Starts with Separation

Most privacy advice focuses on hiding your activity. But modern tracking doesn’t depend on visibility alone—it depends on connection. If your activity can be linked together, it can be tracked. To truly reduce tracking, you need to prevent those connections from forming in the first place.

What is identity linking?

Identity linking is the process of connecting different pieces of your activity into a single profile. This happens when you reuse:

  • The same email address
  • The same phone number
  • The same login credentials
  • The same device patterns

Across platforms and contexts.

Why email and phone numbers matter most

Two identifiers are especially powerful:

Email

  • Used across nearly every service
  • Links activity across platforms
  • Often acts as your primary identity

Phone Number

  • Persistent and highly trusted
  • Used for verification and account recovery
  • Frequently shared across services

These become the backbone of identity linking.

The solution: Multiple identities

Instead of using one identity everywhere, create separate identities for different contexts.

Multiple identity model

Practical ways to separate your identity

  • Use different emails – One per context or activity type
  • Use separate phone numbers – Avoid linking everything to a single number
  • Avoid cross-login behaviors – Don’t use the same credentials everywhere
  • Keep contexts isolated – Don’t mix personal, shopping, and social activity

When identities are separated:

  • Data becomes harder to connect
  • Profiles become incomplete
  • Tracking becomes less accurate
  • Data broker value decreases

Instead of one rich profile, you create multiple fragmented ones. Privacy doesn’t come from hiding, it comes from separation.

Where MySudo comes in

Managing multiple identities manually is difficult. MySudo®, which is designed for identity separation, make it easier by allowing you to:

  • Create multiple identities
  • Use different email addresses
  • Assign separate phone numbers
  • Keep communications isolated

This enables:

  • Real control over your digital presence
  • Reduced tracking across contexts
  • Protection against identity aggregation

You can’t fully stop companies from collecting data. But you can stop them from connecting it. And when the connections break, the system loses its power.