The Codex · Operational Security · Protocol OPSE-002
Your digital exposure is not defined by any single post or profile — it is defined by the aggregate. Each piece of information you share online is a data point. Individually, each seems inconsequential. Assembled by someone with intent, they form a profile specific enough to target you, impersonate you, or build a credible attack around you. This protocol defines the standard for auditing and managing that aggregate.
Each piece of information you share online appears unremarkable in isolation. A name. A job title. A photograph from a restaurant. A comment on an industry post. A check-in at an airport. A mention in a company announcement. None of these individually raises concern. The problem is that they do not remain isolated — they are aggregated, indexed, and cross-referenced by data brokers, intelligence tools, and anyone motivated to look.
The result is that a person who has been individually careful about each disclosure may still have created a profile that is, in aggregate, detailed enough to know where they live, where they work, who they associate with, when they travel, what they own, and what they are likely worth. This profile is not created by hackers. It is assembled from information that was shared voluntarily, piece by piece, over years.
Social media is the most consistent source of self-generated exposure for high-value individuals. The risks are not confined to obvious disclosures — it is rarely a post that says "I am travelling to Geneva on Tuesday." The risks are in what can be inferred: the pattern of posts that establishes a weekly schedule, the photograph that reveals a home address in its background, the check-in that confirms a physical location at a specific time.
The audit must cover historical content as well as current behaviour. Platforms retain content that has been forgotten. Search engines index posts from years ago. Old accounts on platforms you no longer use remain searchable. The audit is not a one-time action; it is a recurring discipline applied consistently.
LinkedIn and equivalent professional platforms present a specific challenge: they are designed to maximise disclosed information as a feature, and professional norms encourage comprehensive disclosure. For most people in most careers, this is harmless. For individuals with significant assets, prominent roles, or contentious business interests, a fully populated professional profile is a detailed intelligence briefing available to anyone who looks.
The decision about what to list is a conscious one. Current role and employer may be necessary for professional credibility. A full employment history going back fifteen years, a complete list of board memberships, and advisory roles at organisations that signal investment interests are all optional. List what serves a purpose. Omit what does not.
Photographs carry more information than their visible content. EXIF data embedded in unprocessed image files includes GPS coordinates, device model, and timestamp — data that social platforms sometimes strip but do not always. The safest approach is to strip this data before posting, using any standard image processing tool.
The visible content of photographs is equally significant. An image shared from a home reveals the interior, and sometimes the street visible through the window. A photograph at a restaurant may reveal the area you frequent. An image from a vehicle may show the registration plate. None of these require a dedicated effort to exploit — they require only a motivated person and a few minutes.