HOW TO BE ANONYMOUS ONLINE
it's practically impossible to be fully invisible on the internet by design everything you do gets logged for example let's say you're trying to access a website for example google.com your data passes through a number of hubs it passes through your internet service provider and then it reaches its destination so all of these stops can actually analyze what you do and log what you do and profile you not to mention government agencies and hackers that can actually intercept these connections and intercept your data and again read it log it analyze it and profile you so the goal is usually to protect our privacy and anonymity as much as possible and make it as difficult as possible for other entities to gather information about us and track us and profile us so for the rest of the video i'm going to show you the most important points that you want to keep in mind and the most important things that you need to learn in order to protect your privacy and anonymity first of all the main thing that you want to do is make sure that your connection to the internet is private so like i said when you access any websites or do anything on the internet you want to make sure that the data that you send and receive is private doing that is simple enough you can simply use a plugin such as https everywhere this will make sure that all the connections are done over https which means that all of your data is going to be encrypted therefore even though it's going to pass through a number of hops and even though we know that it is possible for government entities and for hackers to intercept these connections they will be able to read our data but our data is going to be encrypted it's going to be gibberish therefore it's going to be useless to them now this will ensure that your connection is private but you're still not anonymous the servers and the websites that you communicate with will still be able to see your location so if you want to protect your anonymity then you should use an anonymizing network a very popular one is the tor network or the onion router tor works by first of all encrypting your traffic and then it randomly selects three nodes or three computers out of the network which contains a lot of computers and then it first passes your data through these three nodes before sending it to the destination now the tor network is free and open for everybody therefore at any point of time lots of people might be using this network and lots of people might be using the three nodes that you are using therefore even if someone manages to compromise this network and analyze what's happening in it it would be very difficult to separate what you do from the traffic generated by all of the other people that are using the same three nodes you can also use a vpn so the vpn again will first add another layer of encryption to your data and it will send it to a middle server that could be anywhere in the world and then from there your data will go to the destination again this adds another layer of encryption and hides your identity and you can even use store and a vpn at the same time for extra protection last but not least is security so even if you're using a great anonymizing network you're bouncing your traffic through a number of servers and you're using all sorts of encryption to protect your privacy if somebody manages to gain access to your computer everything you're doing is useless because they can de-anonymize you very easily therefore if you're serious about protecting your privacy and anonymity it's very important that you use a secure operating system so you should really consider moving away from windows and os x these operating systems are not very secure and they also log a lot of data about you anyway linux would be a great option that balances between security privacy and ease of use but if you really want to protect your privacy and anonymity consider using an operating system that is designed for that purpose such as tails os this is a live and amnesic operating system that you can boot from a usb stick once you reboot it removes everything it routes all traffic through the tor network to protect your privacy and anonymity and it actually comes with a lot of really useful privacy tools if you really want to take your security to the next level then i highly recommend looking up cube's os this is an amazing operating system that is designed from the ground up to be very very secure it separates everything into different domains and everything runs into separate virtual machines that cannot really interfere with each other it has really cool features such as disposable virtual machines to run suspicious files volt machines to store sensitive files linux gateway to route all traffic through the tor network and so much more you should also always be aware and smart with what you do on the internet so it doesn't make sense that you follow everything that i said so far and then you go and log into your gmail or facebook account that already contains all of your information your friends and the previous locations that you used to log into these accounts that'll jeopardize everything so you want to be smart with the services that you use from your email services to instant messaging to search engines pretty much everything you do on the internet you need to think twice about it and try to move to more privacy focused solutions for example instead of using gmail use protonmail or even use a dark web email provider that is more private and more secure i'm only using gmail here as an example but this goes for all of the services that you usually use on the internet so like i said from instant messaging to downloading and uploading and even social networks you want to be very smart with what you do and you should also think twice about the information that you share on the internet think about the people that you communicate with the way you type your emails all of these things can be used as clues and pieced together in order to de-anonymize you like i said it is impossible to be a hundred percent invisible all we're trying to do is protect our privacy and anonymity as much as possible and make it as difficult as possible for others to track us and de-anonymize us it's simply a matter of how much time money and effort they want to invest into tracking you and de-anonymizing you now i hope you clear with this point
Post a Comment