How Do I Go Anonymous Again

Some might say the internet was built on anonymity, paving the mode for a place where complimentary voice communication reigns supreme. Only after years of learning about who'southward snooping into everything nosotros practise online, privacy on the web is hardly a given.

Information technology's non just about government spying; it's as well near how much information big companies such as Amazon, Google, Facebook, and Microsoft take collected in order to serve upwardly targeted ads—not to mention how much of your personal data gets scooped up in all the breaches and hacks.

In that location are ever going to be good reasons for people to get online without existence tracked. For ane, anonymity may be the just style for a real whistleblower to reveal corruption, considering how some have been treated. Just at that place'southward nothing wrong with wanting to stay anonymous, no matter what you're doing.

Is it even possible to have control of your own personal privacy online? Ultimately, the merely way to stay truly bearding online is...not to go online at all. That's not a real pick for most of the states, though. Here'due south a rundown of what youcan do to minimize spying, targeted ads, and ID theft equally you explore the online globe .


Cover Your Tracks

Go a Fan of the Burner

If you desire to exist anonymous, forget virtually using a smartphone. The big-proper noun mobile Bone makers are control freaks (Apple) and advertising servers (Google). To exist anonymous when you apply a telephone, your pick is a prepaid phone, aka a burner.

Even with a burner, phone call records exist, so your location can still be triangulated via GPS and tower locations. As you've seen in movies, though, you tin can always throw the telephone into a passing truck and pb whoever might be tracking yous on a wild goose hunt. The upside of a burner is that your existent proper name isn't associated with the device.

Just when you lot already own an expensive smartphone, ownership more than hardware is painful. Thankfully, there are apps aplenty to get you temporary, bearding numbers you can utilize with Android or iOS. (Ane of those apps is named, aptly, Burner.)


Light That Firewall

Is your desktop or laptop computer connected directly to a broadband modem? That'south a very bad idea. Hackers are constantly bombarding IP addresses to see if they can get onto a system.

You should always have a router on your domicile network that can mitigate attempted hacks with its congenital-in firewall. A router uses network address translation (NAT) to assign an IP address to every device on your home network: those are then only visible on that network. Direct attacks tin sometimes exist stopped expressionless correct in that location. You need the router anyway, for sharing the net connectedness and Wi-Fi. Even a router that comes integrated into the modem—the kind you get from your ISP—is better than no router at all.

Yous could also use firewall software that's installed on your PC. Windows 10 comes with a pretty decent solution called—you guessed it—Windows Firewall. Yous can as well find firewalls equally part of security suites. Only equally PCMag'southward Pb Annotator for Security, Neil J. Rubenking, explains, yous don't really need another firewall if you use the 1 that ships with Windows.

For real anonymity based on your Os, stop using Windows or macOS on the desktop and move to a Linux distro that specializes in all forms of keeping you secret. Your best bet is Tails: The Amnesic Incognito Alive System(Opens in a new window).


Sleuth Your Own Stealth

What does your figurer (or tablet or smartphone, for that matter) give away most you lot when y'all visit websites? At the very least, a site knows your IP address (and that'south necessary; otherwise you'd get no results).

In most cases, it as well knows your approximate physical location (past checking where your ISP supplies those IP addresses; come across it in activity at IPLocation(Opens in a new window)) and probably your time zone and which linguistic communication you speak—all adept info for advertisers. Your browser tin can as well offering up your operating system, browser blazon, and which versions of software you run for browser plug-ins. It even reports on the fonts you have installed. All this gives your system a unique fingerprint. And every bit anyone who's watchedPolice force & Social club knows, a unique fingerprint is sometimes all it takes to rails you.

EFF Cover Your Tracks

If you don't believe it, visit MyBrowserInfo(Opens in a new window) or BrowserLeaks.com(Opens in a new window) for a total report. Then cheque out the EFF's Embrace Your Tracks tool(Opens in a new window) to see how well your browser and VPN are protecting you.

You can use browser extensions in Chrome, Firefox, Opera, and Edge to raise your privacy. The EFF has its ain Privacy Badger(Opens in a new window) to monitors sites that monitor yous. The Ghostery browser extension(Opens in a new window) blocks all sorts of trackers and advertizement on about all browsers. The DuckDuckGo search engine for privacy also has a similar extension, called Privacy Essentials(Opens in a new window).

What'due south more, even if you lot've got a VPN—virtual private network—running, every bit you should (encounter beneath), information technology could exist leaking. Hither's how to get yourself back into stealth mode.


Surf Safer

anonymous surfing modes

(Illustration: Vik Kay/Shutterstock)

Make sure your browser isn't storing too much personal info. In the settings menu, plow off the ability for the browser to store the passwords you use to access websites and services. That can be a pain, since you lot should have a different countersign for every service y'all employ. The better culling is to employ a dedicated password manager that works beyond all your devices.

Browsers store images, surfing history, and what you've downloaded, besides as cookie files, which tin can remember helpful things such as settings and passwords. Obliterate that info occasionally by clearing your browser cache.

Major browsers accept anonymous surfing modes. Chrome'due south is called Incognito(Opens in a new window) (striking Ctrl+Shift+N to admission); in Firefox, information technology's Private Browsing(Opens in a new window); and in Microsoft Edge, it'southward In Private browsing(Opens in a new window). Using an bearding mode prevents the browser from saving passwords, cookies, downloads, and cached content such as images.

Whatever browser you use for privacy should have JavaScript deactivated. JavaScript tin help a spider web server identify all sorts of things beyond your browser, such as your monitor's size—and that info goes toward fingerprinting your arrangement and y'all. You can turn JavaScript off and on for specific sites (some websites require it) using extensions such as NoScript(Opens in a new window) and ScriptSafe(Opens in a new window).

A number of browsers are billed as privacy-focused. Of form, they utilize the same rendering engines as the big names, especially Google'due south Chromium engine; the departure is that the browsers don't share whatever info with Google. Examples include Epic(Opens in a new window), Comodo Dragon(Opens in a new window), Comodo IceDragon (based on Firefox), and of course the Tor Browser (more below).

If you're looking for a more than mainstream browser with some actress security, consider Opera(Opens in a new window)—information technology has a costless VPN built right in. (Annotation that its VPN protects only your browser traffic, not the other apps on your computer that apply the internet.)

Apply a search engine other than Google or Bing, which want to sell, sell, sell you. Go to DuckDuckGo(Opens in a new window) or Swisscows, or bank check out these options(Opens in a new window).

DuckDuckGo

To summarize, using stealth modes, special browsers, and private search engines won't make y'all completely bearding. Merely they foreclose sites from writing info to your computer, including cookies, which can be used to figure out your browsing habits.


Proxies and VPNs and Tor, Oh My

The way to ensure outsiders don't assemble information virtually you lot while you're browsing the web is to appear to be someone else in a different location. This requires a proxy server or a virtual individual network (VPN) connection—or even improve, both. With the right philharmonic, you can not only exist anonymous but also surf sites in other countries as though you lot're a native.

A proxy server—a reckoner system or router that functions as a relay between client and server—isn't for newbies, but FoxyProxy(Opens in a new window) can get you lot started. Information technology works with the major browsers and offers proxy services and VPN tools.

VPN services are everywhere. They have the advantage of securing the traffic betwixt your estimator and servers and masking your IP address and location. For example, by connecting through my work VPN, sites I visit believe I'm at corporate HQ, although I work from home.

VPNs also double as a way to become access to location-blocked content. If you lot're in a country that tin't get the BBC iPlayer or Netflix, for instance, a VPN could be your ticket. Netflix, for ane, is cracking downward on this tactic when it can.

No discussion of anonymity online is consummate without mentioningTor(Opens in a new window) . The name comes from one time being the acronym for "the onion router"—a metaphor for many layers of security.

Tor is a free network of tunnels for routing web requests and page downloads. It's not the same as a VPN but might be even more secure for masking your identity. Tor'due south supposed to make it impossible for a site yous're visiting to figure out who you are—but does it?

Tor Browser

The National Security Agency'south spying controversy leaked by Edward Snowden in 2013 included what some thought was a workaround to place users of Tor. Merely it wasn't that uncomplicated. As explained by security expert Bruce Schneier inThe Guardian(Opens in a new window) , the NSA actually monitors what's called the Tor "exit nodes"—the bureau could tell users were using Tor simply not who the users were. The NSA set up a "man in the eye" attack, pretending to be the site the user wanted (Google, for instance), and could transport data dorsum to the user that would have advantage of exploitable holes in the browser—not a hole in Tor.

The lesson at that place: Keep your browsers up to date, or use one of the previously noted anonymizing browsers.

Estimate which company also offers an anonymizing browser? Tor has a browser packet for Windows (run it off a flash bulldoze to take with you), macOS, or Linux; information technology's available in sixteen languages. There'south besides a Tor Browser for Android(Opens in a new window) devices; iOS users can try the third-political party VPN + TOR Browser and Ad Block(Opens in a new window) app.

Tor is not entirely foolproof—the theory is you could still be tracked by someone skilled plenty (fifty-fifty if they tin can't read what you ship). The listing of potential Tor weaknesses(Opens in a new window) is long.

A newish browser with a congenital-in search engine is trying to accept some of Tor's privacy thunder—an open-source project called Brave(Opens in a new window). As a gratuitous download, it's worth a try, but Dauntless has already had some problems and is branching into cryptocurrency to change the game on how websites make coin.

If you're sensing a tendency in that no software can go on you 100% anonymous, yous're paying attention. Only these steps are all like a lock on a door: Sure, someone could kick information technology in—but why make it easy by leaving the door open?


Anonymize Your Email

As nice as it is to remain perfectly private equally you surf, it may exist fifty-fifty more essential for your e-mail to be anonymous, to avert spam or surveillance. The problem is that email but wasn't congenital with security in mind.

Secure email services exist, of course. They use encryption to scramble what you send and require the recipient to have a password to decrypt your bulletin. Edward Snowden used a webmail service known as Lavabit, which was and then secure the government insisted that it hand over the private keys of users. Lavabit, to its credit, immediately shut downwardly to protect its customers. Later, it returned with fifty-fifty more user-frontwards security features. So be enlightened that such a service can exist compromised. Most will not dice to protect yous.

If you want a Webmail service that's going to handle encrypted messages, the best we've seen is the free PreVeil, which offers secure deject storage as well as weapons-grade encryption, and it's easy to use. For more options, read The Best Email Encryption Services and How to Create an Anonymous Email Business relationship.

PreVeil

You might think your Gmail business relationship is condom, since you see that lock icon on the browser and access it with a secure sockets layer (SSL) connection (indicated past https:// in the URL). Merely SSL merely encrypts data equally it'southward transferred from your device to the server.

Recommended by Our Editors

That is e'er going to exist a trouble with web-based services. Some services tin can provide encryption for those types of email: Virtru is ane that'due south specific to Gmail running on Chrome. Mailvelope(Opens in a new window)is an extension (for Chrome, Edge, and Firefox) that volition secure Gmail, Outlook.com, Yahoo Mail service, and more. FlowCrypt(Opens in a new window) is another.

Possibly the smart move is to eschew web-based mail and stick with desktop client software. Outlook 2007 and later has built-in encryption tools(Opens in a new window), and Mozilla's Thunderbird has add-ons galore (including many in our email encryption services roundup, similar PreVeil) to handle bulletin encryption/decryption.


Cut Spam Out Of Your Nutrition

Beyond the obvious safeguards—never, ever click on a link in a spam message or even open a spam email—the best manner to defeat spam is never to permit spammers go your email accost. That'due south most incommunicable, unfortunately, simply there are methods to mitigate.

Number 1 is to use an allonym or dummy electronic mail, which works with any service that requires an email address. You might exist able to set one up if you ain your own domain name. In Google Workplace, for example, you lot have a primary accost, such every bit [email protected], simply you could also use[email protected] as an allonym for online sign-ups; letters to the second one can be forwarded to the main address. When spam begins to collect, change or kill that second address. You tin create up to 30 aliases per individual.

Gmail is a little more straightforward: To brand an alias, suspend something to the user name. Turn "[email protected]" into "[email protected]"; Gmail ignores everything later the plus sign. Once the alias in question accumulates spam, filter information technology correct into the trash. Here's a video on how to do that in Gmail:

Yahoo Postal service offers Disposable Addresses (netherSettings > Security), which are similar—there's a base of operations name, and then a secondary keyword appended, like "[email protected]" Outlook.com as well supports aliases, upward to ten per business relationship. Expect for Account Aliases under the Account settings. If you lot have your own domain name, check the control console at your web host—it's probable to have tools for creating aliases galore.

If you need an alias temporarily, a disposable address is very handy. We have reviews of five products that offering disposable email addresses: Abine Mistiness, Bulc Club, Burner Mail, ManyMe, and SimpleLogin. Notation that Abine Blur Premium lets you shop online without revealing your truthful e-mail accost, phone number, or credit card details, and it also manages your passwords. The program received a iv.5 (outstanding) rating from our reviewer and besides comes in a gratuitous version.


Should you care about security when it comes to social media networks? Of course y'all should! They're not altruistic nonprofits—these platforms make coin past having lots of users looking at lots of ads. That means they occasionally brand your data available to questionable entities. Y'all likewise might not desire all your friends and followers and their extended networks to know all your business concern. Here are some tips on disappearing (partially or completely) from social networks.

Facebook

Starting time, on a desktop, go to the Business relationship menu in the upper right and select Settings & Privacy > Settings > Privacy. Click the "Edit" link on every choice on this folio to personalize who can encounter what, who can friend you, even who tin can await you up. Go every bit granular equally y'all want—ensuring, for example, that quondam boyfriends or girlfriends tin't see your posts.

Finally, audit your contact info: Go to your General Account Settings under General and again, click "Edit" adjacent to every entry. Double-check the email addresses and phone numbers entered. Minimize the list of who has access as much as possible to maximize anonymity.

To get out Facebook, you tin either deactivate or delete your account. Deactivating leaves your information on the site in case you lot decide to render. Facebook deactivates your business relationship for two weeks, just in case you really didn't mean it—and subsequently that, it'due south gone. (Even then, some digital photos may linger.) Go to your account on the desktop, click the drop-downward menu at the top-right of your screen, and select Settings & Privacy > Settings > Privacy. Click Your Facebook Information on the left. Scroll downward, and you'll run across Deactivation and Deletion at the lesser.

Twitter

Don't listing your website or real electronic mail in your profile. Make sure your password is unlike from that of any other site. That's practiced advice across the board, merely we know people don't follow information technology, so we repeat it a lot. You really should with Twitter, which has had some security breaches.

You also have the pick, under Settings > Privacy and Safety, to protect your tweets, meaning only those followers you corroborate become access to them. Protected tweets aren't searchable or retweetable, and y'all can't share permanent links to them with not-approved followers. (That said, you're fooling yourself if yous think using social networking—or posting anything online—is private—it takes merely one "canonical follower" to grab a screenshot and share it with the world.)

To leave Twitter completely, in the Settings and Privacy menu, tap Account, ringlet to the bottom and select "Deactivate your account." You'll take 30 days to modify your listen and reactivate; otherwise, you're gone.

Gmail

Desire to dump Gmail? First, nosotros recommend y'all download your emails. While signed into your Gmail account, go to myaccount.google.com(Opens in a new window), click Data and Privacy, and then Download your Data, which takes you to Google Takeout. Follow directions to export your Gmail emails. Once yous've secured your e-mail archive, return to myaccount.google.com(Opens in a new window) or click your business relationship avatar on the top-right of your Gmail inbox and select Manage your Google Account. Under Manage your information & privacy, click Delete your Google Business relationship.

Instagram

Disabling your account renders information technology inactive until yous sign back in, whereas deleting your account removes your profile, photos, videos, comments, likes, and followers. You lot can't use the app to disable or to delete your account, though; you have to sign into Instagram.com(Opens in a new window) to do either.

To disable, from your business relationship homepage, click on your proper name to view your account contour, click on Edit Profile, then click on the link at the bottom: "Temporarily disable my account." To delete, click Delete Your Account from the homepage. Click on the drop-downwardly menu and select a response to reply the question of why you're deleting your account. Blazon your password, then click on "Permanently delete my business relationship."

LinkedIn

The site lets you adjust your privacy options: Click on your Profile (photo) icon, and so click Settings & Privacy in the drib-down menu and select Account preferences, then Visibility to see the options. You can also Hibernate your account, which is similar to deactivating on other platforms. Or you lot can delete your account entirely. Again, get to Settings, and under Account preferences, click Account management, and Close account. Click Proceed and select a reason for closing your account, then hit Adjacent. Enter your password, and you're done.

TikTok

TikTok doesn't crave you to create an business relationship to have advantage of the service; you can download the app and immediately start discovering videos. Don't want it anymore? Just delete TikTok from your phone. If you have an business relationship, however, uninstalling the app won't do anything about the content yous've already created and collected, so it'southward best to wipe the slate clean. Open the TikTok app, and then tap the profile button in the bottom-right corner of the app, and select the three-line hamburger menu in the pinnacle-right corner. Tap "Manage account" and and so "Delete business relationship" at the bottom of the folio.


If you're worried about getting tracked as you surf, sign out of the above services, as well as Microsoft, Google, Amazon, and Apple, when you're done using them. Otherwise, the advertizement servers and cookies and so forth that are run by those services or their affiliates will pretty much know where and when you go online at all times. Signing out is a pain, because logging back in is a hurting—and that's exactly what the big companies tracking you are counting on.

Like What You're Reading?

Sign upwardly for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Utilize and Privacy Policy. Yous may unsubscribe from the newsletters at any time.

halpernheact1982.blogspot.com

Source: https://www.pcmag.com/how-to/how-to-stay-anonymous-online

0 Response to "How Do I Go Anonymous Again"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel