Being anonymous on the Internet has become a luxury, and there are many willing to pay for Internet connection and anonymize their Internet tracks.
Specifically, what do the anonymity?
Being anonymous means remain unknown, unidentifiable. The anonymity guarantees respect for his own privacy. Being anonymous helps to feel safe, to surf without consequence, bypass blockages. Finally, anonymity allows in some cases to bypass censorship and laws.
Why be anonymous on the Internet?
After all, if not illegally downloaded, if one person pirate, there he has a real reason to be anonymous?
The problem with the internet is that various data about us are recovered without anyone noticing.This seems trivial, but the importance of this data can quickly tip the balance.
What data are collected?
Did you know that :
- Facebook robots literally read your private messages in order to better target advertisements?
- Facebook robots still can recognize on photos or you’re back.
- Your IP address, cookies, information about your browser, your surfing habits, your transmitted unencrypted data can be recovered or intercepted easily?
- The SpyWare destroy anything on your system but retrieve all kinds of information on your computer and especially YOU for various purposes (especially marketing)?
- The revelation by a British newspaper called the existence of the surveillance program PRISM conducted by the National Security Agency (NSA) shows that Google, Facebook, Yahoo etc … are associated with the program to monitor the Internet?
- Google knows more about you than your mother. For example, Google knows and retains all the terms you searched for, see here: https://history.google.com/history/ (provided they are connected to an account)
- The data you think you have deleted a website, blog, forum … etc are still online and visible to everyone?
This is only a barely visible part of the iceberg.
How to be completely anonymous on the Internet?
Format your computer, turn it off, unplug it and move.
Well, it works, but we will try to find a way to stay home and keep our data.
3 options are available to surf anonymously, but not worth all.
1st option: Use a proxy
A proxy server is also called a server proxy, it allows to connect to a site for you then transfer your data. The site visited by proxy is not visited by yourself and you do not know.
Proxies often embark numerous options such as disabling cookies, applets, Java … etc.
There is however a problem concerning the data retransmission time. If you connect to a proxy Indonesian, you certainly good wait seconds more than from your own connection to each link clicked.
We also are several types of proxies, proxies so-called “elite” guarantee anonymity optimal while others base proxies still allow to find your IP address, therefore, end up (simply because these proxies in question share your IP address).
To configure a proxy server for Firefox is simple enough, the addons are made to, here FoxyProxy:https://addons.mozilla.org/fr/firefox/addon/foxyproxy-standard/
With Chrome like, here Proxy Switchy: https://chrome.google.com/webstore/detail/proxy-switchy/caehdcpeofiiigpdhbabniblemipncjj
I pass the technical details for the installation because I believe that the above websites inform you sufficiently. 😉
There are also web proxies, it’s websites to make navigation for you and show you the result without setting directly.
(Caution, many sites like Facebook using Ajax technology do not really work with web proxies)
Proxies does not guarantee 100% anonymity, it is possible from them to find your IP address on demand, for example from the justice and free proxies have a bad reputation because the owners could spy on your activities without discomfort and without you guessed.
2nd option: Use Virtual Private Networks (VPN)
The VPN based on a tunneling protocol. This is a protocol to encapsulate and encrypt data transferred from one machine to another. We are talking of the tunnel because the information can not be read during the transfer.
Specifically, the data is encrypted from the device using the VPN (computer, smartphone, tablet, router … etc) to ISP (who does not know what is in your data). Then the ISP automatically returns data always encrypted to the VPN server over the Internet. The data is then decrypted to reach their destination (the final service). No one can read your data and your anonymity is guaranteed by IP address and location change. We still recommend to use HTTPS and other encryption protocols as soon as possible.
A VPN is also not only browse anonymously, companies often use VPN to place multiple geographical sites on the same network LAN. The censorship, geolocation, blocking access to sites, protection of address IP are other reasons given and make the VPN absolutely necessary.
The VPN service can also be used to encrypt protocols other than HTTP, such as FTP or IMAP.
To talk about the connection speed, you should know that it is best for proxies because the connection is direct between the user and the VPN server.
The problem again is that everything depends on the provider. If there is confidence, anonymity isguaranteed, as is the case for HideMyAss.
HideMyAss was translated into French (except the GUI for the moment), I prepared so you here an article to show you how to install and use.
Already know that:
- You will be completely anonymous on the Internet, the traffic will be encrypted regardless of where you are.
- You’ll get anonymous IP addresses free in over 180 countries.
- Encryption standards are those used by governments.
- All sites will be censored the most for you.
- All applications will be anonymised (for all your connection go through a tunnel).
- You have 30 days to test the service, if you are not satisfied (e) you are refunded (e)
Using a VPN is a very good solution but also a cost.
A cost justified given that a VPN protects you about a public Wi-Fi network, to read your mail, sharing private data, play online … etc.
A VPN is not useful for visiting banned websites or become anonymous, so this is a very good investment.
Option 3: Use the TOR network
TOR (The Onion Router) is a global network of routers. The connection of a user passes throughseveral computers in the world called nodes.
Connections between nodes are encrypted, in fact it is not possible to recover the original user.
The site that the user tries to visit therefore see that the IP address of the last node.
TOR is distributed as free software open source and each user can become a node. However TOR (very) slow since the connection just goes through several nodes.
Although digital is recommended to be anonymous on the Internet, you must know that the cyber police has no other means than the infiltration. Agents therefore also use TOR (or server-node) to see what happens to it and saw the number of arrests we can wonder if digital is still safe for anonymous surfing.
In summary, TOR is not so recommended.
Surf anonymously in an Internet cafe?
We often speak to connect in a cybercafé or a company computer or the school to surf anonymously and prevent anyone from finding us.
It is an affirmation not necessarily just because it would have to assume that no other spy program is placed on the computers in question and that no other method would allow us to follow the trace (whose connection logs). If you do not think a cafe at the base is secure, no need to think that it will make you anonymous. This is not to mention the CCTV cameras and other left fingerprints, although there are moves in extreme cases …
We saw that being anonymous on the Internet is not very obvious, ideally will already start with a VPN, take advantage of immediately reducing HideMyAss here.
That said, we’ll push a little explanation:
The truth about the logs!
Most VPN record the real IP addresses of users (at least those used to visit their site) for some time.This is not to track you but to react to the problem serious and demand from justice (what is called in France a legal requisition).
Because if you are part of an organization of cyber-terrorists to hack into banks or whatever, there is still a chance that the VPN service is required to provide your information if it has and if the authorities come ask.
And not only the VPN service will give this information but Facebook, Google, Microsoft, your boss and others will also do without problems.
Therefore a perspective anonymity on the Internet for 99.99% of the tasks, you are anonymous with a VPN.
If you are an Internet user wishing to simply mask its identity here and there, while enjoying enhanced security, a release of the censored sites and all the benefits of VPN, the NSA will not go pick you … or anyone else.
It is also interesting to read the terms of the contract, since many VPNs (I will not mention) to promise an anonymous surfing at 100%, while in the terms one can read that the connection data are saved for a period not determined and disclosed in the event of concern. HideMyAss deletes logs every 2/3 months, NordVPN not logs (see below).
No effective VPN log
If instead you prefer to use a VPN service said “no logs” which therefore saves any information about you (100% anonymous surfing).
Between HideMyAss or NordVPN, which to choose?
This is a question that asked me recently. In fact, I recommend both and that is why they are both cited.
It is ultimately largely a matter of preference depending on what you want:
Do you prefer a graphical interface filled with lots of features (HideMyAss) or a simple and easy to use interface (NordVPN)?
Do you prefer a high flow rate and a large network (HideMyAss), or rather a strengthened anonymity (NordVPN)?
If you have the means to test both, you’ll make an idea more precise.
Everything about your anonymity
To learn even more and push away all the explanations we have just seen, I invite you to download the guide Secrets on our Anonymity.
I will teach you things as amazing qu’effrayantes, particularly in relation to the fact that data you supposedly deleted are still visible on the Internet, and everyone can find them. That even though you initiated legal proceedings or delete data, especially via the famous form of “suppression” of Google.
We will see how to find the data and how to establish a virtual identity card of a person with just an email address.