Privacy is the one of major concern on internet, for own security and for just privacy. When you surf internet, you keep leaving traces behind, today let me tell you all how to be nearly 100% Anonymous on internet.
Welcome to Intelligent Computing.
When we discuss about the Privacy and Anonymous browsing, TOR may be the first name for this, but is it enough to use TOR for anything you wish to go through Internet? Obviously not, there are lots more point against the Security of the TOR.
1. It cannot protect the monitoring the traffic against the Tor networks boundaries.
2. Also it cannot prevent us from Traffic analysis and end to end correlation.
In March 2011, in France Based NationalInstitute for Research in Computer Science and Control’s Researcher have documented the Attack on tor network that is capable of revealing the IP address of the Bit torrent user on the internet.
Also the “Bad apple Attack” exploits the TOR’s design that take the advantage by using insecure application.
Assuming the main Aim is to Completely Hide the IP address of user.
There are Several Possible methods of being Anonymous on Internet.
Use an Unregistered SIM card to access the internet
The classical method is to use the SIM card which is unregistered and put it inside any Data card or USB dongle to surf the internet completely Anonymous. If you managed to have everything without registering its almost 100% safe that no one is going to trace you ever using any kind of technology.
Also you need to have anonymous phone, registered phone can be traced using the IMEI number etc.
Use Public network or Open Wi-Fi
You have to use this public network like free Wi-Fi in coffee shops or any other public network. You also need to have something more along with that. You need an unregistered Operating system distribution like Linux, and also MAC address of the NIC (Network Interface Card) should be changed to hide yourself from that network. This is easily possible in Linux.
Anonymous Linux Distribution Tails
There is completely awesome Linux distribution Called tails, it has everything setup in it. This is Live Linux you can use in with DVD or USB, and aims to protect your identity.
It uses the Internet anonymously on everywhere on all the connection by hiding your MAC address, using the Encrypted network.
It leave no traces, it creates every connection temporary and can’t have the further connection once the trace is removed.
It forces all the connection, incoming or out going, to tunneled via Encrypted proxies or Tor.
You can Visit and Download the ISO image of this Distribution here along with documentation.
Use multiple proxies
Staying Anonymous is never reached 100% even using one time pad. But if your network kit and infrastructure is flexible enough, you can use the proxies or dynamic addressing of your IP and changes frequently.
In case you are not able to change the IP address, you can use the Proxy application and you’ll have plenty of IP address from different countries to choose and best thing will be that you have to still keep on changing the IP address.
Free proxy Switcher is the Proxy application even available for Windows, which will list 1000s of Proxy address from different countries and you can choose any of working proxy.
Also don’t forget to change the MAC address using any software you can Google, Net cut (Download Netcut here) is the one I use to change the MAC address for any network.
Other precautions you can use to be Safe on internet
1. You have to use the Unregistered Operating system.
2. You shouldn’t sign in to any of your personal account while using the internet anonymously; it will be easier to track back to you.
3. Don’t keep cookies and Encrypt hard drive using Password.
If you can communicate with server that means you are traceable, you may opt to get twin IP Address of another network and get the Servers data and keep your own system anonymous and secure.
Using proxies and multiple proxies is another good idea and switching Mac address is helpful too. What you do to be more secure, feel free to share with us by commenting below.