Anonymity on the Internet for beginners |
Every hour thousands of users search and find a wide variety of information. However, when using the Internet for their personal purposes, they all leave certain data about themselves. This data can be used for full or partial identification. Any access to the network is not complete without obtaining and then providing an IP address. This is, in fact, the number by which you are identified as an Internet user, and any action on the network is linked to this number. What can openness on the web lead to? For what purpose is such data collected? The most common goal today is to collect user statistics. The collection is carried out by special programs, through which the user's location and some other data are determined in the future; With the help of such sites, you can get the name of the person to whom this IP has been issued, his e-mail, and in some cases even a phone and a physical address. A little more complicated, but it is quite possible to "spy" which ports are open on a device with this IP (if the owner of the address is online). This is done by special port scanners that can show other information about the computer and the user. Thus, thanks to the IP, you can find out about the user the data listed above. It would seem that it is not enough? Not at all. Internet access is provided by providers who, when connecting services, will definitely require your passport data. At the same time, information about IP connections and addresses is stored by the provider for a long time and can be provided by a court decision. So, it is quite realistic to compare the IP address issued at a certain time with the registration data and find a person. Such facts lead us to the idea of the need for online anonymity. Why be anonymous on the Internet? Anonymity makes an ordinary user beyond the control of government agencies, and they can cause a lot of trouble - up to direct costs of time, health and money. By remaining "open" on the Internet, you give the opportunity to bad personalities to "annoy" you. Such risks are easier to offset by technical means. Most surveys show that the means of anonymity are used for banal purposes of circumventing censorship (state or corporate), out of paranoia or out of principle. Do not forget that someone is not always looking for you for the purpose of hacking and deception: it is quite possible that the activity on the Internet is controlled by the employer. And advertising? The more real data a user leaves online, the more targeted advertising and outright spam they will receive in the future. So, we realized that it is desirable to be anonymous online. What methods, paid and free, do exist for this? Let's look at them briefly. Methods of anonymity The disadvantages of proxy servers include the requirement of a separate configuration for each browser or program. Also, a proxy can cause information leakage without ensuring the confidentiality of data transfer between the user and the end site. In this regard, it is not recommended to use accounts and passwords that are significant to you when working through a proxy. I2P TOR Installing TOR is quite simple – there is already a special assembly of the Internet browser, it is called the Tor Browser Bundle. The main disadvantage of this anonymization method is the low data transfer rate. VPN services Note that most of the "anonymity programs" and browser extensions use proxies and VPN servers Conclusions - Disable all third-party plugins when using a standard browser; - Disable the use of cookies, history and caching in the browser; - To achieve maximum efficiency, use a "clean" and fully updated operating system; - In anonymity mode, do not enter sites that deanonymize you (for example, social networks or public services); - Do not use unverified applications; - When surfing through open Internet points, do not use personal data, as well as data of your funds; - Use only proven VPN services. In conclusion, I would like to say that technical means are only a small component of anonymity on the Internet. However, the anonymity methods listed in the article are quite enough to significantly complicate the task for potential detractors. Go back |
14-03-2022, 13:23 |