How to maintain anonymity on the Internet: expert advice |
How to maintain anonymity on the Internet: expert advice Warning! You are not allowed to view this text.
And there are situations when you can lose anonymity because of a harmless publication on a social network – for example, if you publish a photo with a geographical label, this will allow you to calculate the location of the author, and with a high degree of probability - himself. It's all about the metadata of the files. For example, phones and digital cameras "attach" a long "trail" of data to photos – including the date and time of the shooting, geographical coordinates, data about the device, and sometimes the name of its owner. When publishing, this data may be stored in a photo, which under some conditions is dangerous. Photos with geomatics, among other proofs, became the basis for several high-profile journalistic investigations (including concerning Russia's involvement in well-known events). All this poses a direct threat not only to the anonymity of a person, but also to his life and health. But if the bank "loses" the dossier on customers without their knowledge, then some threats to anonymity can still be eliminated independently. Methods of protection available to everyone But the easiest way to use sites with a high level of risk is the banal "Incognito" mode in browsers (it may be called differently, but the essence is the same everywhere). Ramil Khantimirov from StormWall says that this will be enough for some situations: The "Incognito" mode guarantees that the sites you have visited will not receive full information that you are you: social network trackers will not work, and search engines will not "remember" where you were and what information you were looking for. Also, the browser will not save the site in the history of visits, and images from it will not be cached on disk. This is usually enough to safely access a resource with which you do not want to share your data or, for example, log in to an already open site under another account. However, private mode does not hide your main identifier in the Network - the IP address In other words, if the provider, the state (if necessary) and the site owner see user data in the normal mode, then the "Incognito" mode is directed only against the latter. On the other hand, this is a good option to open some very specific site, and then not get a flurry of contextual advertising on the same topic. But still, in this mode, user data is available to the provider and the security forces. And how to hide your tracks even better? Here are some simple ways: disable geolocation in the phone if it is not needed at the moment. Few people know this, but Google can track the movements of users of Android devices; There are slightly more complex ways – for example, proxy servers and VPNs, which are free. This will also allow you to partially hide your information, but you need to remember that information security is almost never free. Of course, this will not give a full guarantee of anonymity, says Elena Volotovskaya from the Softline Venture Partners fund: The more data about yourself you want to hide, the more difficult this task will be. Along with using special software, you will definitely have to resort to "digital austerity" (delete your study records from all public services) and thereby lose the widest opportunities for communication and information search that Internet access provides. But even such voluntary self-restraint may not be enough. If they want to install digital surveillance on you, they will definitely do it. Including using extremely sophisticated methods. For example, they will use your phone's gyroscope as a microphone or track you by how your smartphone takes pictures – each device has a unique set of camera sensor errors. You can even determine that you are you by your keyboard handwriting: each of us uses our own typing patterns on a computer or phone. And these patterns are as unique as fingerprints. Warning! You are not allowed to view this text.
Паниковать не стоит – нужно понимать, что в мире миллиарды интернет-пользователей, и отследить действия всех в ручном режиме не удастся. И самое главное, мало кому нужны персональные данные физического лица. Злоумышленники обычно пытаются получить информацию о ком-то действительно важном и влиятельном, а корпорации располагают достаточным количеством обезличенных данных, чтобы предлагать целевую рекламу. Among the reasons, the expert calls the insufficient skills of specialists engaged in such investigations; the fact that the police poorly use modern developments to combat cybercriminals, as well as the lack of a normal system of forensic accounting and identification (for example, stolen phones). Of course, it is possible to investigate with the available arsenal of funds, but such an investigation will not be very effective. Therefore, it is up to the users themselves to protect their anonymity on the network. And there are several advanced options here: use a VPN or a TOR network. According to Ramil Khantimirov, using a public VPN is unlikely to protect your data, but there are also serious paid services. And in the TOR network, data is transferred between several nodes, confusing the traces. The speed of work suffers from this, but in the end it becomes almost impossible to calculate the user; Go back |
14-03-2022, 14:00 |