How to become anonymous on the Internet
Tips Technologies / / December 19, 2019
In recent years it has been trending more and more increasing state control over its citizens. Especially successfully the process advances in the Internet, what we so successfully opened the eyes of Snowden's revelations. If we consider that not only the United States are engaged in this, and all countries in one way or another, the picture is even more dismal.
In light of these events is quite natural desire of citizens to secure their confidential data and the weakening of control over their personal lives. One of the measures to counteract this is his identification in the network, that is, to ensure anonymity. For information on how to do this, you will learn in this article.
First of all, we should address the issue and why is required anonymity online?
Indeed, anonymity - it is a personal choice, and many do not need it, and some, such as public persons, simply can not afford it due to the nature of its activities. Another same people it may be urgently needed, for security, for their social, civil or political activity. In addition to these polar opinions, there is the vast majority of users who are simply unpleasant, that behind them peep.
Is the anonymity of the network is possible?
Just want to upset you - complete anonymity in the network is practically unattainable. Each computer has its own ip-address, by which you can identify the owner and his actions. Yes, the identification process can be greatly complicate, but to completely avoid, without special technical equipment, not mere mortals, it is practically impossible. Keep this in mind.
However, this does not mean that we should give up. The situation is similar to protection from thieves. Although there is no lock that it would be impossible to open, we can make the process so difficult and lengthy that not one burglar, no urgent need, will not take him. Let's see what we can do.
organizational measures
1. Get yourself another account
Today, email has become a universal identifier of the individual network user. Therefore, first of all, we should take care of the second (third, fourth) email address. This can be as simple additional Gmail account, and one of the special postal services described in the this article. Then register it new accounts in social networks, and other necessary services. Never mix your public and private profile.
2. Do not use domestic services
I have nothing against our search, email, social networking sites, in many ways they are even better. Even worse, they only in the fact that, if necessary, interested people or structures may be fairly easy to scratch out the information they need about you. Therefore, do not use the services of the country in which you reside.
3. Change the place of connection
If you want to further complicate the work of potential persecutors, do not sit at home and take a walk around the neighborhood. Considerate and thoughtful search will tell you dozens of affordable cafes, computer clubs, libraries of which you can use Internet services without risking to light their real and network address.
programmatically
1. Proxies
Speaking quite simply, a proxy - it is a service or a program that acts as an intermediary between you and requested you site. It turns out that all your queries will be addressed when surfing only one server, and it will have to send them where you want. In addition to the banal search open proxy network, which is quite enough, including Free, You can use this technology and more sophisticated methods, which we wrote about in the following articles:
- How do I get access to inaccessible sites in your country
- 4 free proxy server to block ads
- How to use Google services to access banned sites
2. VPN
Virtual Private Network — this several technologies and methods to establish between the user and the Internet a special encrypted and inaccessible to the tracking channel. This allows you to hide your real IP address and become anonymous, but also encrypt your traffic. In this article we will not dwell on the interpretation of the features of the work of different VPN protocols, but we note that this method is generally quite reliable and easy to use. On the practical application of it, you can learn from our following articles:
- ZenMate - free VPN for Google Chrome
- Three simple ways to read the blocked sites in your country
- TunnelBear - the Most simple VPN on your Android
- Hotspot Shield - Internet Without Borders
3. TOR
TOR - is a network of routers and software, designed specifically for users of anonymity. Roughly speaking, using this technology, your request to the site and answer from him are so winding and difficult way through a chain of proxy servers that compute client almost impossible. Now actively rumors about unreliability TOR technology, but this is no tangible evidence and, quite possibly, these rumors are started by interested government agencies.
The easiest way to start using this technology - is to download and install a special build of Firefox co all the necessary additional components, including add-ons NoScript, Torbutton and HTTPS Everywhere. This is called Tor Browser Bundle program, you can download it here. In addition, there are other possibilities of using TOR, which we wrote:
- Pirate browser from The Pirate Bay founders
- OperaTor - an anonymous browser based on Opera
- Mask Surf Pro - tool for undetectable surfing interntete
conclusion
This article lists not all methods of preserving anonymity online, but even they are quite enough to significantly complicate the task of your detractors, persecutors or controlling authorities.
But the most important protective mechanism is, without any doubt in your mind. Think, think and think again before you post fotochki, post information about themselves, to download anything or upload to the network. Because Miranda rights -
"Anything you say can and will be used against you in court."
- it is not only about American movies, but also about modern, and, especially, the future Internet.