Saturday, 10 May 2014

Online Anonymous

The book I read to research this post was Online Anonymous by Ben Evans which is an excellent book which I downloaded from kindle. This is only a very short but is free on kindle and I think is good enough to part with cash for definitely. The book does say for some people there are legitimate reasons to hide their web presence like they live in a country that has a dictatorship or want to avoid identity theft. If you are on a social media it is worth going in as a visitor and checking what is displayed publicly on your profile. Often people synchronize these sites with their smartphone and information like their address and phone number is displayed publicly in their profile even though they didn't intend for that to happen. Often an identity thief will follow you around the internet checking the sites you regularly visit collecting information along the way. There are anonymous email providers like http://mytrashmail.com that will let you use an email account anonymously for a specific period. If you wish to browse anonymously there is an internet browser called The Onion Ring or Tor which you can download at https://www.torproject.org/projects/torbrowser.html.en This browser was financed by the naval intelligence in America and works by using other computers to appear like you are using them and hiding your internet activity. There is a browser that does a similar job on Android Phones where you download orbot and orweb. On the iPhone there is covert browser priced at $2.99 that does a similar job and apparently they charge for that because they have to pay a subscription to have it listed. Bear in mind with some sites if you are logging in anonymously it can cause problems particularly if you are buying stuff. I really enjoyed this book and think I probably wouldn't do something like use Tor browser to surf the internet but obviously for some people especially in a totalitarian regime it's essential. Bear in mind also your ISP stores a lot of information about you which if a security service got a subpoena would have no choice but to hand over.

No comments:

Post a Comment