• AbouBenAdhem@lemmy.world
    link
    fedilink
    English
    arrow-up
    58
    ·
    edit-2
    8 days ago

    Does my doppelgänger go to my workplace and do my job?

    If he doesn’t, there’s your answer.

    If he does, I’ll leave him to it and go read a book in the park.

  • FaceDeer@fedia.io
    link
    fedilink
    arrow-up
    43
    ·
    8 days ago

    Some years back I was in a D&D campaign where doppelgangers became a major ongoing concern. It turned out that in that case doppelgangers built up their image of the person they wanted to mimic through careful observation, but thanks to the general prudishness of society doppelgangers rarely ever caught glimpses of peoples’ genitals. So we ultimately came up with the “crotch check” system. Doppelgangers usually couldn’t form plausible genitalia.

  • LostXOR@fedia.io
    link
    fedilink
    arrow-up
    12
    ·
    8 days ago

    Same as I do now, passwords. Unless they inherited my memories, in which case who’s to say I’m not the doppelganger?

    • throwawayacc0430@sh.itjust.worksOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      8 days ago

      Lol, I think passwords are very trival to get.

      I mean, they got the ability to look like you, you gotta assume they can get CCTV footage of you typing your passwords.

      • LostXOR@fedia.io
        link
        fedilink
        arrow-up
        9
        ·
        8 days ago

        I don’t see how looking like me would help them get CCTV footage, unless it’s through some sort of supernatural means. And even if they could find footage of me entering a password, they’d be hard-pressed to extract individual keystrokes from a typical CCTV quality recording. Perhaps it’s technically possible, but it’s certainly not trivial.

  • Phoenixz@lemmy.ca
    link
    fedilink
    arrow-up
    11
    ·
    8 days ago

    You authenticate either with something that you have (physical key, for example), something that you know (passwor for example), or something that you are (biometrics, basically).

    Dopplegangers rule out that last one, but the previous two still work fine

    • throwawayacc0430@sh.itjust.worksOP
      link
      fedilink
      English
      arrow-up
      6
      ·
      8 days ago

      “Something you have” is not exactly a good way to authenticate. Once they steal it, they can assume your identity (see: ID Theft)

      • Phoenixz@lemmy.ca
        link
        fedilink
        arrow-up
        5
        ·
        8 days ago

        That also goes for what you are. Biometric security has been rendered nearly useless since everybody and their mother started using it without giving a single shit about securing that data

  • Hegar@fedia.io
    link
    fedilink
    arrow-up
    8
    ·
    8 days ago

    Be too useless to merit a doppelganger. To paraphrase zhuangzi, few know the usefulness of uselessness.

  • RebekahWSD@lemmy.world
    link
    fedilink
    arrow-up
    7
    ·
    8 days ago

    I’m already an identical twin and it’s a nightmare even having a different first and middle name but same everything else.

    I think we’re just living with a second set of identical twins?

  • NONE@lemmy.world
    link
    fedilink
    arrow-up
    7
    ·
    9 days ago

    Does my doppelganger have the same tastes as me? If not, then only the real me would walk around with Amy Rose and/or Sonamy (Sonic x Amy Rose) wallpapers on all his devices without the slightest hint of shame or embarrassment.

    If he has the same taste, then we’ll play SoulCalibur 3 together.

    • starman2112@sh.itjust.works
      link
      fedilink
      arrow-up
      2
      ·
      edit-2
      8 days ago

      Ooh, that’s a good one. If we don’t share taste, then just hook me up to a lie detector and ask if I liked the dub of the last Eureka Seven movie. If we do share taste, then sweet! There’s two fans of it!

      Shit, that may be the most personally identifiable information I’ve ever shared

  • njordomir@lemmy.world
    link
    fedilink
    arrow-up
    6
    ·
    9 days ago

    I would be signing all my communications cryptographically and sharing a key in person so people can validate whether a message not delivered face to face is really from me.