The Art of Being Anonymous
In the context of the internet, anonymity refers to situations in which a person’s identity is unknown, untraceable, and unreachable. And we all know how difficult it is these days. I’m not going into detail on why anonymity is essential; we all know that; instead, we’ll learn how to get it.
“Being anonymous online is like being a superhero in your pajamas.”
Yes, this is the dark reality; everything we do is traceable; remember my words, everything we do; and if you are among those who say, “Let them watch there is nothing much in my phone or laptop,” you are mistaken.
And if you think Google Incognito is safe read this article Google to Face $5B Lawsuit Over Tracking Users in Incognito Mode
Here are three levels; at the highest level, I guarantee you will be entirely anonymous and free to do whatever you want.
DISCLAIMER: This BLOG Does NOT Promote or encourage Any illegal activities, all contents provided by This Blog is meant for EDUCATIONAL And Informational PURPOSE only. If you planned to use the content for illegal purposes, then please Stop reading this immediately! We will not be responsible for any illegal actions.
Level 1: Become Hard to Hack!
Let us begin by blocking your Internet Service Provider (ISP), such as Airtel, Jio, Bsnl, or any other local ISP, from profiling you.
There is “NO WAY” you can gain anonymity from them unless you stop using them as your ISP. This might sound like dialogue of an “inception” movie :) in simple words, if you want to become anonymous first level is to be anonymous from your ISP (Internet service provider) first.
Here comes the VPN (Virtual Private Network) in the game!
As a result, VPNs are secure tunnels that route your internet traffic through a separate server of your choice (perhaps in another country). Don’t be concerned about the VPN server: Use a VPN that is no-log policied and highly encrypted. (Never use free VPN services). Your ISP is aware that you are using a VPN and that you are connected to the internet, but they have no idea what you are surfing!
Let’s see the difference between privacy and anonymity first :
- Privacy: ID — Known; Activity — Unknown
- Anonymity: ID — Unknown; Activity — Known
This is not any promotion but I think Nord Vpn is one of the best VPNs available over the internet.
Level 2: Become Hard to Track!
You’re safe from your ISP, but what about that wacky website you’re on, like google.com, which is famous for developing profiles of its users and knowing them better than anyone else on the planet. Because you’re using a VPN, Google can’t see your genuine IP address, but it still recognizes you. Maintaining anonymity from these corporations, which have spent millions of dollars developing their algorithms, is not easy.
Here comes the TOR (The Onion Router) in the game!
This is completely free of cost. There are a few considerations to keep in mind when using Tor:
- Never use Tor in “full monitor” mode, as it can reveal the size and resolution of your monitor, effectively fingerprinting you.
- Check for updates on a regular basis.
- You can enable proxy from the browser’s Network options (a proxy masks your IP address, but a VPN masks all of your data).
- Before doing anything, always check the status of your internet connection.
If you use the Tor browser to view (dot)onion sites, that indicates the site is inside the Tor network and your traffic is entirely encrypted! If you access non-(dot)onion sites with the Tor browser, it signifies the site is not part of the Tor network, and you must route the traffic through another node outside the Tor network: It is important to note: Because the communication leaving the Tor network is not encrypted, the person hosting the Tor network’s end node may be able to determine what website you’re looking for! The same thing happened in the first scene of Mr.Robot, as he hacked and reported an illegal website operator to the police.
This is how the TOR network with onion service works
You might get a What exactly does Fingerprinting mean?
Fingerprinting is a sort of online tracking that is more intrusive than standard cookie-based tracking. A digital fingerprint is generated when an organization creates a unique profile of you based on your computer hardware, software, add-ons, and even preferences. Your screen settings, fonts installed on your computer, and even your web browser of choice can all be utilized to build a fingerprint. If you have a commonly used laptop, PC, or smartphone, fingerprinting may be more difficult. However, the more unique add-ons, fonts, and settings you have, the easier it will be to find. Companies may build your fingerprint using this one-of-a-kind collection of information.
Use Default settings as much as possible to avoid fingerprinting
Level 3: Invisible
The best technique to access the Tor network is to use an entirely separate OS (operating system).
Here comes the TAIL OS in the game!
What distinguishes it from other operating systems:
- The Tor network is used by default for all TAILS OS communications.
- The entire operating system can be run off a single USB flash disc!
- It works on RAM (it is volatile), therefore when shut off, it leaves no traces on the computer. As a result, the PC’s owner will never be able to detect TAILS’s working condition!
You can go to their website and boot your pen drive as a live OS, but if you wish to run it as a VM, it can reveal your identity (through RCEs and buffer overflows, to be specific).
“Now that everything is ready, take advantage of being Anonymous!”
Brain Tatto :-
- VPN: Enhance online anonymity and protect your IP address.
- Tor: Use cautiously, avoid full screen mode to prevent fingerprinting.
- Tail OS: Considered the best option for complete anonymity.