Oh and good luck getting my name from any records, you'd have to hack the hospital records I was in, it was never in any news or made public.
Don't worry, I'd never look for your name or anything. No point for me to do that, as I'd never cause any harm to anyone. I just mentioned it for all of us readers here, to be careful when we write about ourselves.
A guy in Turkey published in Facebook that he had 400 BTC. IIRC, he was kidnapped, tortured, and his 400 BTC stolen.
I have sometimes researched the IRL identities of a few people here. Just for the sake of it. I guess all the clearly identifiable ones already know they are somewhat exposed. And I don't remember anything about it.
But how do you know it's the same person. If I wanted to hide my real persona, I would just use somebody else's user name and avatar and send you on a wild goose chase.
Because I am good at what I do. When I am sure, I am. Sometimes I don't. That being said, yes, one of the best ways to increase your opsec is to include some false data (profile poisoning) to break any profiling attempt but, when incoherencies can also be detected and while you may not find out who the IRL person is, you will know it is a false positive. If you try to pose as someone else, probably the extended profiling comparison will show some mismatches unless you are really good at it.
Anyway, we are talking here about almost amateur level profiling.... when you have the resources of a state agency I would bet more than 80-90% of us would be easily identified one way or another. I know I would be, for example. I don't care.
P.S.: Your opsec is not really good (at first instance at least). But I guess you already know that.