Wednesday 10 May 2023

How to be Anonymous on the internet


How To Remain Anonymous on the Internet

Using a VPN is a step in the right direction if you want to gain anonymity, but VPNs aren’t exactly invisibility cloaks. In fact, using a VPN is just one step (though an important one!) out of the 22 steps that we’ll discuss below. True online anonymity requires many changes to your digital routine, such as replacing your operating system, browser, search engine, messaging apps, and email provider. Let’s take things one step at a time.

  1. Use an encrypted messaging app. Instead of sending a text message to a friend on your Android, use an encrypted messaging app like Signal. With Signal, all communications have end-to-end encryption on its open-source protocol. The company can’t see your messages or calls, and there are no ads or trackers.
  2. Use an encrypted browser. Google is notorious for its ample data collection. Instead of using Chrome or another browser from a large tech company, use Tor, a secure browser that encrypts your IP address and web activity three times. However, Tor doesn’t encrypt any other web apps you use, which is why you need a VPN as well. What is a VPN, you ask?
  3. Use a VPN. “VPN” stands for “virtual private network,” and, unlike Tor, VPNs encrypt all web traffic from browsers and other web apps. Aside from hiding your IP addressVPNs hide your browsing history so your internet service provider (ISP) can’t see any of your online activity. The best part? You can set up a VPN in only a few minutes; check out our VPN how to pages for more information.
  4. Use secure email services. Since we’re so deeply entrenched in the Google ecosystem, we use Gmail as our personal email provider. While we love its ease of use, we don’t love that Google keeps all of our private emails on its servers. However, there are secure options like ProtonMail, the same company that brought us ProtonVPN. ProtonMail is based in Switzerland, a nonmember of the surveillance alliance Five Eyes, so the company can’t be forced to give the government customer data. Rather, all email has end-to-end encryption with open source code, and the service is free for Android, iOS, and web users.1
  5. Use a temporary email. Don’t want a company emailing you a newsletter daily? Use a temporary email address. Services like Temp Mail generate throwaway email addresses for free.2
  6. Use encrypted storage. Back on the Google train, we store all of our documents, photos, and files in Google Drive, which certainly isn’t a good choice in terms of privacy. However, some cloud storage providers utilize end-to-end encryption, like Sync, Tresorit, and ProtonDrive, a cousin to ProtonMail and ProtonVPN.

    Money-Saving Tip: ProtonVPN has discounted bundles that cover both ProtonVPN and ProtonMail in one subscription. You can also save money by buying ProtonVPN on Black Friday or Cyber Monday.

  7. Don’t post PII. While it’s fun to share your life online, make sure you’re not sharing any personally identifiable information like your address, phone number, or Social Security number. Sharing PII could lead to identity theft, especially if you haven’t already set up an identity theft protection service.
  8. Check app permissions. We’re all guilty of mindlessly accepting an app’s terms and conditions, but before you do, see what permissions the app has. For example, does it always need to know your location, or can you disable this feature? Most apps ask for as many permissions as possible, so it’s up to you to keep them in check.
  9. Read privacy policies. Similarly, check what data a website or app collects, shares, and/or sells before you use it. Many companies sell users’ personal information to third parties for marketing and advertising purposes, which is not conducive to privacy, let alone anonymity.

    Note: In our privacy guide, we examined the privacy policies of over 100 home and digital security companies, rating each out of 10. Read it to find out just how “secure” these products and services really are!

  10. Use ad blockers. Adware is the software that places ads across your computer, phone, or tablet, but even if you don’t have adware, most websites and apps have some form of advertising, which can get annoying. Aside from removing adware, you can use an ad blocker like AdBlock or Adblock Plus.
  11. Don’t use voice assistants. Voice assistants make for convenient home automation in your smart home. However, they’re notoriously bad for privacy. Amazon employees have admitted to listening to Alexa recordings3, for example, and there was a hidden, undisclosed microphone in the Google Assistant-compatible Nest Secure security system4. Your best bet is to steer clear of voice assistants and stick to controlling your smart lightssmart garagesmart locks, and other IoT devices manually through your app.
  12. Stay off social media. In our research on social media and parenting, we found that more than three-quarters of parents share stories, images, or videos of their kids on social media. Worse, over 80 percent of these parents use their children’s real names in these posts. Not only does this put their kids at risk of child identity theft, but social media companies keep this data for the long haul. Your best bet for privacy is to stay off social media completely.
  13. Use a proxy. When it comes to VPN vs. proxy servers, proxy servers are better for on-the-go networks that you’ll only be on once. Unlike VPNs, proxy servers encrypt only your device’s IP address, not your web traffic, making them less secure (but often free).
  14. Check for HTTPS. If possible, only go on websites whose URLs start with “HTTPS” rather than “HTTP.” HTTPS, which stands for “hypertext transfer protocol secure,” uses a secure sockets layer (SSL) to encrypt all of the communication between your browser and the websites you visit, while HTTP does not.5
  15. Disable cookies. Remember when we mentioned those ads that follow you around the internet like a stalker ex-boyfriend? Cookies are the data about your online activities that shape targeted ads; sometimes they’re anonymized and aggregated, but sometimes they’re not. Here’s how to disable cookies on the most popular web browsers (if you’re still using them, that is):Chrome
    1. Go to Settings.
    2. Click “Content Settings.”
    3. Click “Cookies and Other Site Data.”
    4. Select “Block All Cookies.”
    5. Toggle on “Clear Cookies and Site Data When You Quit Chrome.”

    Firefox

    1. Click “Menu.”
    2. Click “Preferences.”
    3. Click “Cookies and Site Data.”
    4. Check off where it says “Delete Cookies and Site Data When Firefox Is Closed.”

    Microsoft Edge

    1. Go to Settings.
    2. Click “Privacy and Services.”
    3. Click “Clear Browsing Data on Close.”
    4. Check off what you want to be deleted when you close your browser.

    Opera

    1. Go to your Settings.
    2. Click “Privacy and Security.”
    3. Click “Cookies and Site Data.”
    4. Toggle on “Clear Cookies and Site Data When You Quit Opera.”

    Safari

    1. Go to Preferences.
    2. Click “General.”
    3. Click “Remote History Items After One Day.”
    4. Go to Privacy.
    5. Check off “Block All Cookies.”
  16. Don’t use Google. We’ll say it again: Google tracks everything you search online, which can be very personal information. Instead of Googling, browse the web with a search engine like DuckDuckGo, which doesn’t harvest your personal information to create targeted ads. Rather, the service creates ads based on what you search, and all search data is anonymized, as are IP addresses.6
  17. Use a password manager. If you’re using the same password for every account, you’re making the goal of online anonymity very hard for yourself. Instead, create a unique and secure password for all of your online accounts. Get password security tips here.
  18. Use a secure operating system. If your online anonymity is a building, then your operating system is the foundation. Even with secure email servers, browsers, search engines, and the like, if you’re using an operating system from a major tech company, your data could still be logged. In contrast, an open-source operating system like Linux walls off each user. Tails and Whonix are some other secure OS options.
  19. Use anonymous cryptocurrency. Cryptocurrency is an increasingly popular payment method, but contrary to popular belief, it’s not always anonymous. With Bitcoin, for example, all payments are completely transparent. If you want to make anonymous payments, use a cryptocurrency like Monero, which hides the sender, receiver, and amount sent using three different privacy technologies.7
  20. Disable JavaScript. JavaScript is a programming language that allows for animated graphics, interactive maps, and other special features on webpages. Unfortunately, hackers can exploit vulnerabilities in JavaScript to modify and steal user data8, so it’s best to disable it, especially if you’re using a popular browser like Chrome or Firefox.
    Web browserHow to block JavaScript
    ChromeDownload the Disable JavaScript browser extension from the Chrome Web Store.
    FirefoxDownload the NoScript or Ghostery browser add-on from the Firefox Browser Add-ons site.
    Microsoft Edge
    1. In Microsoft Edge DevTools, select Control, Shift, and P on Windows or Linux, or Command, Shift, and P on macOS.
    2. Type “javascript” and choose Disable JavaScript.
    3. Press Enter.
    OperaDownload the JavaScript Switcher browser extension from the Opera Add-ons site.
    Safari (6.1 and later)
    1. Go to Preferences.
    2. Click “Security.”
    3. Uncheck the box that says “Enable JavaScript.
  21. Avoid spam. Spam emails may be phishing attempts to get your PII, so don’t click on any unfamiliar messages, emails, or websites.
  22. Use a file shredder. When you delete a file, is it really deleted? Often, the answer is no. To delete your files permanently, use a virtual file shredder to rewrite files’ binary data multiple times, making them irreparable. File Shredder, for example, is a free desktop app that lets you choose from five shredding algorithms to destroy files completely.9

Anonymity vs. Privacy: What’s the Difference?

Many people use the terms “anonymity” and “privacy” interchangeably, but they’re actually very different. Privacy is the ability to keep things to yourself by choice, while anonymity means that you want people to see what you do, just not your identity. For example, while internet users may want privacy for their web searches, whistleblowers want anonymity, meaning their identities are protected but their information is still shared.10 Learn how whistleblowers can protect themselves while still relaying important information.

Is Incognito Mode Anonymous?

Maybe we’re overcomplicating things. After all, our Chrome browser has an incognito mode; isn’t that sufficient to protect our privacy online? Unfortunately, the answer is no.

Unlike a VPN, incognito mode isn’t anonymous. All it does is wipe your history and cache after you close the browser so the next person on your device can’t see what you did online. However, your ISP can still see everything you do online plus your device’s IP address. And unlike VPN servers, incognito mode won’t change your IP address or help you watch Netflix in another country, so it is a poor solution for online privacy.

Can There Really Be Anonymity Online?

Although it’s hotly debated, we believe that true anonymity is possible on the internet. However, it takes a lot of effort, from using new browsers, operating systems, and messaging apps to paying only with anonymous cryptocurrency. If you’re willing to put in the work, yes, you can use the internet privately on any device.

The Consequences of No Online Privacy

Privacy is a fundamental human right, but online privacy isn’t guaranteed; you have to work for it. The consequences of a lack of privacy can be dire, including the following.

  • Identity theft: Sharing too much personal information can lead to identity theft, which could mean financial losses, difficulty getting loans, blows to your credit score, etc.
  • Data collection: Large tech companies harvesting a ton of personal data from millions of people has its consequences. Need we mention the Cambridge Analytica scandal of 2018?
  • Tracking: Companies use customers’ data to track them online, showing them targeted advertisements designed to squeeze every last dollar out of them.

More Digital Privacy Research

We’ve researched digital privacy topics such as VPNs and how to delete your personal information from Google. Check it all out below.

Summary

The internet was created to be a place where people could search for information freely, without fear of repercussions. However, with the monetization of our attention comes a total lack of privacy, as we’re surveilled online constantly. That being said, you can have complete anonymity online — if you’re willing to work for it in 22 steps.

Frequently Asked Questions

Online privacy is such a hot topic nowadays that we get many questions from readers looking to stay anonymous online. If we haven’t answered your questions yet, keep reading.

Citations
  1. Proton. (2022). Privacy policy.
    proton.me/legal/privacy

  2. TempMail. (2021).temp-mail.org/en/

  3. Time. (2019). Thousands of Amazon Workers Listen to Alexa Users' Conversations.
    time.com/5568815/amazon-workers-listen-to-alexa/

  4. The Atlantic. (2019). The Microphones That May Be Hidden in Your Home.
    theatlantic.com/technology/archive/2019/02/googles-home-security-devices-had-hidden-microphones/583387/

  5. The University of Texas at Austin. (2021). HTTP vs HTTPS.
    utexas.edu/cofawebteam/best-practices/links-urls/http-vs-https/

  6. DuckDuckGo. (2021). We don't collect or share personal information.
    duckduckgo.com/privacy

  7. Monero. (2021). FAQ.
    getmonero.org/get-started/faq/

  8. Snyk. (2021). JavaScript security.
    snyk.io/learn/javascript-security/

  9. Free File Shredder. (2021).
    fileshredder.org/

  10. Privacy News Online. (2013). How Does Privacy Differ From Anonymity, And Why Are Both Important?
    privateinternetaccess.com/blog/how-does-privacy-differ-from-anonymity-and-why-are-both-important/

Wednesday 8 July 2020

Methods to get the internet for free


Methods to Get Free Internet

How to Browse Internet for Free

Here are the most effective methods to get free internet.

Find a Public Wifi Hotspot

There are thousands of free Wifi hotspots all around the globe. So, if you are interested in enjoying free internet on your smartphone or tablet, you could visit any one of them and enjoy the free browsing session. To find a free public internet hotspot, you could either ask your friends or use some apps like WiFi finder which allows you to find free Wifi hotspots near you.

Visit Restaurants with Free Wifi

Recently we published an article on the restaurants that provide free Wifi internet access to the customers. Read that article to get a list of most popular restaurants that has a free internet connection. You just have to visit those outlets and search for the available networks. You will be given the list of Wifi connectionswhich you can start using for completely free.

Search for Available Networks on Airports

If you are a frequent traveler, you might be in airports more often. If you don’t know, most of the international airports all around the globe provide free internet access to the travelers using their Wifi hotpots placed all over the place. Whenever you reach an airport, all you have to do is turning on the Wifi on your smartphone, tablet, or laptop and searching for the available networks, then connecting to it.

Contact your ISP to Find Free Offers

How to get free internet at home without paying? The best answer to this question will be your Internet service provider. Most of the ISPs have some special offers for the customers, e specially for the new customers. So, if you are new to some ISPs which means if you just took the connection from your ISP and you are unaware of the free internet offers, you could just contact them and ask if there are any free offers for you. Old customers can also try this to find free internet.

Use FreedomPop

FreedomPop is a well-known service for the free internet. They will provide you a device which you can use to access the internet anytime anywhere. The device will be completely free of cost for a limited period. After that, you may have to pay a deposit so that they can allow you to continue the service. This is a good way to enjoy free internet all over the place you go. In addition to this free service, they also do have paid internet plans. You can upgrade to that any time as you want.

Use NetZero

NetZero is another service which you want to use for free internet access. Instead of providing a mobile router like FreedomPop, the NetZero prefers a CD based installation which is enough to let your PC connect to the free internet. But a small con of this service is that it will limit the internet access to 10 hours a month. Beyond the limit, you either have to stop using the internet or upgrade your plan to a better one. But still, it worths a try.

Change to a New Sim Card with Free Internet Offers

Even if not that much, there are still some Sim cards which provide free offers on internet. As it varies from country to country, it is not possible to provide the exact names of the Sim brands with such offers. You could either visit their outlet or a mobile operator to get information regarding such offers. If there is any, you could migrate from the old, unused Sim card to the new one. It will at least give you a few GBs of data for the next few months.

Use Proxy Servers

There are thousands of proxy servers all around the internet. You could just visit proxy sites to find out the methods to bypass the ISP restrictions to the internet connection. In addition to this normal usage, there are very few proxies which allow you to access the internet data for completely free. Your ISP will not be able to count your data usage while you are browsing through such proxy funnels. But, it is very difficult to find such working proxies which really works. If you have enough luck, you can find one.

We do not recommend the use of proxies as it is against the policies of several ISPs. It blocks the control of your ISPs over the connection and you are prone to several online attacks. So, use it on your own risk.

Use Internet.org (For Facebook Users)

Internet.org is an initiation from the Facebook to provide free internet access to all the people all around the globe. While it is still expanding its coverage, some users are able to access free internet using the website. THis service only allows access to certain websites like Facebook. So, if you are a Facebook addict, it would help you to save a ton of data from your actual packet data.

So, these are the most popular and effective methods to connect to the interent or the web for completely free of cost. If you have any other working methods in your mind which we missed, do let us know about it.

Tuesday 15 June 2010

YOUR-FREEDOM CHEATS WITH MTN

Use APN "INTERNET" in your connectivity software (your modem, your connectivity suite, whatever). Configure the YF client to use "Ghana MTN" tweaks and set the connection mode to HTTP. Use IP address, not server names. Just search for servers using HTTP mode.

When using OpenVPN mode, be sure to configure DNS servers on the TAP interface as described on the OpenVPN documentation pages (see menu on the left).

Monday 14 June 2010

Use Microsoft Windows's Telnet program

WHAT IS TELNET?
Telnet enables you to log into a remote computer and its files - research
databases, library catalogs, gopher and Archie, and games. You can also
dial up bulletin boards, connect to virtual worlds such as Moo and Mud,
and if your I.S.P. allows it, even check your email.

Why would you telnet? Because some material you wish to access may not
be available on the Web, or because you do not have access to the Web on
a particular computer, but still want to connect with Internet resources.

What you may not realize is that Windows includes Telnet software,
which is easy to configure and use. Your host computer uses TCP/IP
protocol to run the Client Telnet, negotiating a session with the other
computer (the remote host or Server Telnet). Once the terminal settings
are determined and set, you can log into the other computer and access
files or converse with others, using your keyboard rather than your mouse.

NOTE: If you use Microsoft's Internet Explorer, your telnet program
may be already configured to run when you click on a telnet address.

HOW TO TELNET, part one:
MAKING A TELNET CONNECTION
(We will use an example here which we encourage you to try: The
Internet Public Library's Lambda Moo.)

1. If you do not have the telnet information for the site you wish to
visit, obtain it first, or access it via the Web when you do have Web
access. (See recommended Telnet links and instruction pages.)

Locate the telnet address, which will usually be a series of numbers -
the preferred format (example 126.101.31.147), or a series of words
(such as buchanan.lib.ohio.edu). It may be followed by a four-letter
number, which is the port - or a port number may be listed separately.

Note the login procedure for the user name and password (if any),
and any additional procedure for connecting with your site.

If your telnet site has a Web page, consult it for further
instructions in regard to accessing and navigating this site.

NOTE: Further help is available in these Telnet Tips articles.

EXAMPLE: from the IPL Moo's web page http://www.ipl.org/moo/
"The Internet Public Library MOO is a place for a library community, a place
where people can get together and interact in real time. In this environment, the
community can help shape the surroundings and make it fit their needs. One of
the benefits of the moo is that interaction with other visitors and objects (desks,
chairs, chat etc.) creates a mood conducive to virtual community. We have formed
the framework where librarians and information seekers can gather together, talk,
and provide reference services."

The page further reads: "Use a telnet program ....to open a connection to the host
ipl.org at port 8888 or 23." However, if you use this address, you may receive an
error message which suggests trying the address 141.211.203.56 8888 instead.

The IPL web page also tells you to use the login iplmoo and to leave the
password field blank. Additional links to commands and help are provided.

Windows Tips

REPLACE NOTEPAD WITH NOTEPAD FOR MORE EFFECTIVE TEXT AND HTML EDITINGG

Notepad is an extremely useful free alternative to Notepad, available
in both 16-bit and 32-bit (Windows) versions, with 8 notebook-style
tabs for holding 8 text (or html) documents simultaneously. Not only
can you replace Notepad with Notespad by for writing and editing text
files, you can also use it for web design as your html editor.

Notespad has many useful features including:

a) an easy-to-use interface, enabling you to open and use up to eight
files open simultaneously, easily switching between them using tabs;

b) ability to open text documents up to 16MB in size;

c) a quick menu for access to your most frequently used files;

d) search and replace, for finding and replacing words (and links)
in text or html files;

e) update, for quickly reloading the current version of a file;

f) save and backup, which enables you to save the old version of the
file along with the new version.

Other features include paper (8 1/2 x11) wrap, sorting, go to, font and
font size choices, and a remove CRLF function for removing line feed
and carriage returns so that you can save system files as plain text.


HOW TO RETRIEVE AND INSTALL NOTESPAD
1) Download Ntspad32.zip from
http://www.newbie.net/NotesPad/index.html
(2) Unzip it.
3) Move it to your programs directory.
4) Right click on notespad.exe and choose create shortcut.
5) Drag the shortcut to your desktop. If you wish, rename it Notespad.
(See Lesson four of our Windows manual for information on
creating and organizing shortcuts)


HOW TO CHANGE Windows XP SETTINGS IN ORDER
TO USE NOTESPAD AS YOUR DEFAULT TEXT EDITOR
1. In MY COMPUTER, choose tools, folder options,then file types.
2. On the file types page, scroll down the list to locate .txt files.
Select it. It is probably associated with Windows Notepad.
3. Click on the CHANGE button.
4. Select your new Notespad program from the list of programs.
5. Click o.k to choose Notespad as your default text editor.
6. Click close to close the dialog box.
Finis! Congratulations! You will really enjoy using Notespad...

Special thanks to Don Z'Boray of Bremer Corporation for
making Notespad available (and for the Net resources he
provides at NewbieNET).

NOTE : Notespad does not work well on Microsoft Windows 2000
computers. An alternative is the free editor Notetab, which is quite
similar to Notespad.


Replace your STARTUP and SHUTDOWN
screen images (bitmaps).

Do you dislike the Windows startup and shutdown screens, and wish
to replace them with your own images? Here's how:

1. On your c:\ drive (root directory), you will find the following files:
LOGO.SYS startup screen LOGOS.SYS shutdown screen
LOGOW.SYS "wait to shutdown" screen

2. COPY these files to a floppy disk before attempting to alter them. You
may want to replace them if you decide or need to use them again.

3. Despite the .sys extensions, these files are standard bitmaps (.bmp files)
Once you've copied them, change the extension on one of your copies
to .bmp and view it in Ms.Paint Check the IMAGE, ATTRIBUTES
menu and note that it is 320 pixels (pels) wide and 400 pixels high.

4. Before you replace any of these images, you need to find or create,
or crop a bitmap image to 320 x 400. Choose your image, and set the
size in IMAGE, ATTRIBUTES in Ms.Paint.

5. Save your new image to your floppy disk, naming it after the logo file
you intend to replace (using the .sys extension).

6. Now, on the c:\ drive, change the extension of the original logo file
(the one you are replacing) to .bmp. This way, you'll have two originals
in case of trouble -one on your c:\ drive and one on your floppy disk.

7. Now, move your new logo file into your root c:\ directory. The next
time you start up or shut down, you'll see your new screen.

8. If you don't like your new image, move it out of your root directory
and replace it with one of your original files (with the .sys extension).
Be sure to do this before you exit and re-enter Windows.
At long last, ultra surf now works with mtn. Just google for the latest version of ultra surf and connect your phone using apn.. Internet then open ultra surf and see it open. Unlike your-freedom, there is no time limits to this one. It really work for me so try it.

Sunday 18 April 2010

Surf and browse the web anonymously at school and work

Hello there, is there a moment where you need to view a site and your access to the site is denied because the school, office or country blocks your access to that site?. if your answer is yes, then relax because there are many ways to overcome this huddle.
  • VPN is a series of virtual connections routed over the internet which encrypts your data as it travels back and forth between your client machine and the internet resources you're using, such as web servers. Many internet protocols have built-in encryption, such as HTTPS, SSH, NNTPS, and LDAPS and this helps you to mask your identity online by fooling the computers you are from one place when infact you are from another
  • .PROXY SERVER: In computer networking, a proxy server is a server application or appliance that acts as an intermediary for requests from clients seeking resources from servers that provide those resources.[1] A proxy server thus functions on behalf of the client when requesting service, potentially masking the true origin of the request to the resource server.instead of connecting directly to a server that can fulfill a requested resource, such as a file or web page for example, the client directs the request to the proxy server, which evaluates the request and performs the required network transactions. This serves as a method to simplify or control the complexity of the request,[2] or provide additional benefits such as load balancing, privacy,

How to be Anonymous on the internet

How To Remain Anonymous on the Internet Using a VPN is a step in the right direction if you want to gain anonymity, but VPNs aren’t exactly ...