Guestlist

Issue 94

Monthly newspaper and online publication targeting 18 to 35 year olds. The ultimate guide to the hottest parties, going out and having fun. Music, fashion, film, travel, festivals, technology, comedy, and parties! London, Barcelona, Miami and Ibiza.

Issue link: https://read.uberflip.com/i/765744

Contents of this Issue

Navigation

Page 15 of 55

These are the steps you can take and the tools you'll need to stay anonymous and hidden online. Tor No anonymity checklist would be complete without Tor. Tor, short for "the onion router", allows you to encrypt your internet traffic and, each time you connect to a web server, route that traffic through a random array of nodes before heading to the final destination. There are dozens of ways to use Tor from many different devices. The Tor Browser is the most popular. Live OS A browser is suitable for escaping targeted advertisements and occasional visits to the DarkNet, but those who require complete anonymity will need a more nuclear option. While no one can track your browsing activity on Tor Browser, for instance, chances are you've still got multiple applications running in the background. These applications–word processors, video players, update managers–send data to the web. Rumor has it that authorities have used unencrypted error reports from the Windows operating system to find people. Logless VPN A VPN, or virtual private network, encrypts all of a device's internet traffic and then routes it through an intermediary server in a location of the user's choosing. The end result is that the device's IP address is masked and third parties–including ISPs– cannot monitor traffic. VPNs are built for privacy and not anonymity, however, so don't use them alone if you want to truly remain hidden. Burner emails It goes without saying that remaining anonymous online means not logging into any of your existing accounts. But since many apps and websites require users to sign up, you'll need an email address or two. Several services offer free fake and burner email accounts. For one-off registrations and messages, try Guerilla Mail. Cryptocurrencies There's a big misconception that bitcoin is always anonymous, when in fact the very nature of blockchain technology means every transaction is tracked and verified. This publicly available ledger can be analyzed so that the wallets you use and the transactions you make could be linked to your identity. To get around this, use wallets that change your bitcoin address after each transaction. This makes you harder to trace. Search engines Google keeps track of every search query and link you click on. If you're using Tor, this doesn't matter so much, but it's still a good idea to opt for an alternative. DuckDuckGo is perhaps the most popular search engine that doesn't track or profile users. It can be set as the default search engine in your browser. ISSUE 94 / 2016 TECHNOLOGY Maintaining online anonymity is no easy task. Today's ad-driven and heavily surveilled internet ecosystem endeavors to accomplish the exact opposite result. 16 HOW TO REMAIN ANONYMOUS AND HIDDEN ONLINE

Articles in this issue

view archives of Guestlist - Issue 94