Achieve anonymous browsing
To guarantee the anonymous web software require special software or set a specific settings in your browser. There are a lot of ways to achieve anonymous web browsing, some of this method are more effective than others. Some of them are proxy server, Virtual Private Network (VPN) or using browsers such as Tor (The Onion Router).
![]()
I consider that, the best way to hide personally identifiable informations is using Tor. Tor network runs through the computer servers of thousands of volunteers spread throughout the world. Your data is bundled into an encrypted packet when it enters the Tor network. Then, unlike the case with normal Internet connections, Tor strips away part of the packet’s header, which is a part of the addressing information that could be used to learn things about the sender such as the operating system from which the message was sent.
Finally, Tor encrypts the rest of the addressing information, called the packet wrapper. Regular Internet connections don’t do this.
The modified and encrypted data packet is then routed through many of these servers, called relays, on the way to its final destination.The roundabout way packets travel through the Tor network is akin to a person taking a roundabout path through a city to shake a pursuer.
Did you know?
Did you know that the UK Government is attempting to pass legislation known as the Draft Investigatory Powers Bill (November 2015), that would require ISPs (Internet Service Providers) and mobile communication companies to log your browsing habits for a 12-month period? That’s every webpage, social media profile, VoiP call and e-mail. They even tried pushing similar legislation through Parliament before under the name Draft Communications Data Bill, aka the “Snooper’s Charter”.
https://youtu.be/IVm-QPLcnP8



Publicar comentario