As a blogger, and a wide and ‘deep’ user of the internet, stay anonymous is very important to me and my work. Maybe not entirely but sometimes i think things feel better that way.
For the average computer user, surfing the web usually doesn’t come with a lot of invisibility. If it’s not an advertising agency trying to target you, it could be a nefarious criminal looking to steal your passwords. While it’s significantly harder than it once was, it is possible to stay anonymous online.
We went searching and we found five different ways for you to help protect your identity and sensitive information while you surf the web.
Level 1: Browse in private whenever possible
Browsing in private mode is the simplest thing you can do to make some of your general internet usage a bit more anonymous.
Here’s how it works: You leave cookies every time you visit a website. These cookies are stored on your computer and hold a modest amount of data based on what websites you’ve visited, allowing other web pages to deliver an experience tailored to you.
That could be Facebook showing you an ad for that new MacBook you searched for on Google, or YouTube seeing that you’ve been looking up videos about the new Samsung Galaxy Note 9 phone. These cookies can be used to create a unique fingerprint based on the data that’s been collected.
Just browse in private mode to avoid all that. All modern browsers have a private browsing feature, including on mobile. As this mode warns, internet service providers (ISPs) and others may still be able to track all your browsing activity, but it does help keep you more private from the websites themselves and from anyone looking at your history on the local machine.
- Microsoft’s Bill Gates Lauds Ghana For Exemplary LeadershipAmerican business magnate and Co-founder of Microsoft, William Henry Gates, … Read More
- Zipline Ghana Delivers 79,800 Medical Products to 945 Health Facilities Via Drones – Read Now!FLY Zipline Ghana Limited had delivered 79,800 medical products to … Read More
- Chinese hackers charged with stealing coronavirus vaccine research – Here’s what you need to know!Coronavirus vaccine and treatment research was targeted in several attacks … Read More
- Zipline commences Drone Delivery Services In Western North RegionZipline Drone delivery centre at Sefwi- Wiawso in the Western … Read More
- COVID-19: Gov’t is set to deploy new app to monitor religious gatherings, othersThe government is set to trial an app to monitor … Read More
Level 2: Avoid Google (or Bing or Yahoo)
Google, Bing, and Yahoo might be the three most popular search engines, but the trio also collects the most data about you in order to serve relevant ads and personalize services. Especially when logged in with your account, these search engines can collect your name, email address, birthday, gender, and phone number. Asides from that, Google and Bing can also collect important data such as device location, device information, IP address, and cookie data.
To avoid being tracked when searching on the web, we recommend you use a service like DuckDuckGo. This an independent search engine which doesn’t give you personalized search results. Everyone who searches sees the same results, and anything you search for won’t be collected or stored. The search engine also claims it has nothing to sell to advertisers, which means you won’t ever be subject to targeted ads seen when using Google and other websites.
If you really can’t give up Google for various reasons, you can customize so that you are targeted less. Log into your Google account and choose Privacy & Personalization, then choose Ad personalization from the next screen. Where it says Ad personalization ON, turn the toggle to off. You can also go through all the brands that are tracking you via your Google Account activity, and turn them off one by one if you want to selectively block tracking.
- Cybersecurity Fund to be Introduced in 2019 Budget – Finance Minister, Hon. Ken Ofori-AttaFinance minister, Ken Ofori-Atta has revealed that government would be … Read More
- Zipline ‘flies’ to the rescue of GhanaiansMany Ghanaians near and far have in a way or … Read More
- Uber Drivers up for the new tipping feature-GhanaUber Ghana answer prayers of its drivers to embed tipping … Read More
- Tax Returns Filing made easy – OnlineFollowing the initiation in Accra of the Ghana Revenue Authority’s … Read More
- AfricaOnline’s JOLA satellite broadband service officially launched in GhanaThe AfricaOnline Ghana (iWayAfrica), a major subsidiary of Gondwana International … Read More
Level 3: Hide your IP address and location
The next important thing you can do to stay anonymous is to hide your IP address, which is the easiest way to trace online activity back to you. If someone knows your IP address, they can easily determine the geographic location of the server that hosts that address and get a rough idea of where you’re located. Broadly speaking, there are three ways to obscure your IP address and hide your location.
First, you can use a virtual private network (VPN). For most intents and purposes, a VPN obscures your IP address and a proxy does the same – and in some cases even better. A VPN is a private, encrypted network that “tunnels” through a public network (usually the internet) to connect remote sites or users together.
Today’s VPNs do far more than just encrypt your data, however. You can choose which VPN server that you want to connect with anywhere in the world, making it appear that your point of origin is anywhere you want it to be. The best VPNs also refuse to track your activity themselves (some do keep logs) and have extra features like kill switches that will instantly cut your connection if it looks like something is going wrong with encryption.
However, you can also use TOR. Short for The Onion Router, TOR is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Browsing with TOR is a lot like simultaneously using hundreds of different proxies that are randomized periodically.
Level 4: Use anonymous email and communication
Using proxies, VPNs, and TOR will obscure your IP address from prying eyes, but sending emails presents a different anonymity challenge. Let’s say you want to send somebody an email, but you don’t want them to know your email address. Generally speaking, there are two ways to go about this.
The first is to use an alias. An alias is essentially a forwarding address. When you send mail through an alias, the recipient will only see your forwarding address, and not your real email. Since all mail is forwarded to your regular inbox, this method will keep your real email address secret, but it will not, however, keep you from being spammed like crazy.
Secondly, you can use a disposable email account. This can be done in two ways: Either you can just create a new email account with a fake name and use it for the duration of your needs, or you can use a disposable email service. These services work by creating a temporary forwarding address that is deleted after a certain amount of time, so they’re great for signing up for stuff on sites you don’t trust and keeping your inbox from being flooded with spam.
Also, using a VPN and communicating through an anonymous email address will keep your identity hidden, but it still leaves open the possibility of your emails being intercepted through a middleman. To avoid this, you can encrypt your emails before you send them using HTTPS in your web-based email client, which adds SSL/TLS encryption to all your communications. For webchats, you also can consider using TOR chat or Crytopchat, which are encrypted chat services that are hard to break.
- Do you have plans to start a Youtube career? – Here are 11 Steps to Becoming a Successful YouTuberThere is rising perception out there that starting a Youtube channel especially … Read More
- Ghana Data Science Summit 2nd Edition – IndabaXGhana 2020 Launched – Here is how to apply and other details!After a successful launch in 2019 – the first edition that brought … Read More
- 18-year-old Selasi Domi-Kuwornu of UCC wins Miss Geek Ghana, receives GHC10,000, Laptop and other prizes – Read Now!An 18-year-old Level 100 Student of the University of Cape Coast (UCC), … Read More
Level 5: Leave no trace on a computer with TAILS
Do you wish you had no computer presence at all? There is a way you can sit down, go online, complete your business, and walk away without anyone knowing you were there. You can use any computer with internet connections and leave no trace on your computer itself or online.
The secret is a Linux OS called TAILS, or The Amnesiac Incognito Live System. TAILS is designed to fit on a simple storage device like a USB flash drive that you can just plug into a computer and open up.
From there, TAILS automatically loads up TOR, pops open your operating system home screen, and allows you to do what you wish. However, because everything is booted right from the flash drive, you’re not making any traceable mark on the computer you’re using. Meanwhile, the TOR encryption ensures that all your online activity remains untrackable as well, including files, emails, and instant messages. Primarily, you can keep your digital life in your pocket, and no one else will know about it.
You can download TAILS directly from its organization whenever you want. Moreover, TAILS is continually being updated and patched to stay on top of vulnerabilities and continue to improve security so that it can guarantee no trace will be left. It doesn’t have the power or storage options of a traditional operating system like Windows, but there’s nothing more private.
You need any help of suggest please contact 0279489127 or use any of our social media platforms
source/reference: digital trends/newsnow