The best ways to become invisible and secure yourself on the Internet |
It just so happens that any activity on the Internet does not go unnoticed. Whether it's a banal search for information, sending messages, surfing websites, online shopping - all this leaves traces with which it is easy enough to find out most of the confidential data about you. Which can be used by intruders for criminal purposes. And there is no way to physically completely hide the fact of your presence on the Internet - well, or completely abandon it, which is impossible nowadays! However, there are certain technologies through which it is possible to greatly complicate the process of collecting information about you from the network, making it unprofitable for intruders and other "collectors" of confidential information. Before making any attempts to "anonymize" your online activities, you should clearly understand why you personally need secrecy and from whom you plan to protect confidential data. Since different tools are used for different tasks, it is not difficult to guess. Here are a few of the main "collectors" of confidential information on the web: Corporations, Employers, Search Engines, Intruders, Law enforcement agencies. Let's look at the most effective tools for anonymity on the web today. 1. Proxy and SOCKS A proxy server (connection) is an intermediate service that is an intermediary (proxy from English - intermediary) between the user's computer and the Internet. That is, it provides anonymity by spoofing the subscriber's IP address. Depending on the degree of security, proxy servers are divided into: HTTP servers (regular) - pass only HTTP traffic through themselves, adding proxy usage data to it. SOCKS servers - pass through any traffic without adding anything to it. These servers help to maintain anonymity to bypass various regional restrictions and ensure the basic security of confidential information. It is suitable if you want to remain anonymous for search engines, corporations and inexperienced attackers. Advantages of proxy servers: availability and cheapness (there are free servers). Minuses: the proxy service must be trusted; Virtual Private Network (VPN) or on the mighty "virtual private network" is a technology by which one or more connections are created on top of another network. At the same time, the connection between the subscriber and the VPN server is encrypted, which creates the most anonymous Internet access. And it will be such not only for web resources, but also for providers, unlike proxy servers, this cannot be achieved there. Now there are the following VPN protocols: OpenVPN is an open, secure, and therefore popular protocol that helps to maintain anonymity on the network, but requires the installation of a separate client; Among the disadvantages, we can note the negative impact on the connection speed and additional load on the device. In addition, there is a leak of the IP address through Flash and Java applications. 3. Anonymizers (CGI proxy) Positive: simplicity; you need to trust the proxy server; 4. SSH tunnels SSH tunnel is a technology for creating anonymous connections on the Internet via SSH protocol. Its trick is that the information is encrypted at one end of the tunnel and decrypted at the second. The provider and web resources are used here only for traffic transmission. Advantages of SSH tunnels: minimal impact on internet speed; the decryption key can be stolen; 5. Tor Browser Warning! You are not allowed to view this text.
Go back |
14-03-2022, 13:37 |