Social Icons

twitterfacebookgoogle pluslinkedinrss feedemail

Friday

TIP TO ENHANCE YOUR ONLINE PRIVACY

NOTE: - This guide is intended for educational purposes only, and is not intended as a guide to use the methods described below for any illegal activities!

This guide is relative to accessing web-based pages, such as chat sites or forums, for example and does not cover, using Proxy Servers or VPN, for use with any other applications, or for any other purposes.
Whether you are completely anonymous when you are online, is debatable in certain cases, and a little doubtful.
Additionally, whether anybody would consider the use of the Proxy Server(s), or VPN('s), serious enough to justify any investigation or not, is also debatable, as it would probably prove to be too costly to implement, unless it had to be carried out for something really serious, like an threat to security, or a serious crime.
So solely as a method of enhancing your privacy while being online, some may consider this to be a little too extreme,  if you are not doing anything illegal, but everybody should be able to enhance their online privacy, 
even if they do not carry out any illegal activities while being online.
If you want to enhance your privacy while being online, you could use either of the following methods:

Method A
1. Test the Proxy or VPN that you are using, at such a site as:
http://www.stayinvisible.com/cgi-bin/proxyjudge.cgi
That should tell you if your real IP address is spilled or not. If it is not, then get another one that is anonymous.
Note: - If you connect to a Proxy Server, while using your VPN and then go to the Proxy judge, the details for theProxy Server will be displayed, not the VPN.

2. Once you have connected with a Proxy or VPN that is anonymous, then go to a web-based anonymizer 
Proxy service, such as:
http://www.crazycam.org/web-proxy/
Chosen from the lists at:
http://www.publicproxyservers.com/
TIP - Use Proxy Servers or VPN's from different countries, to enhance the protection of your privacy.

3.Then, in turn, enter another anonymizer service into the address bar of the previous anonymizer site, such as:
http://www.9y2.net/
Checking once again, at the Proxy judge:
http://www.stayinvisible.com/cgi-bin/proxyjudge.cgi
should now give you the details, in your address bar, similar to:

h-t-t-p://www.9y2.net/index.php?q=aHR0cDovLingetaaaaembnby5zdGF5aW52aXNpYmxlLmNvbS
9jZ2ktYmluL3Bybpoijni689kZ​2ngthty67ujUuY2dp&hl=3ed

This address has been encrypted, so if you look at the source code of a web page that you access, using a certain Proxy Server or VPN,  you will be able to read the links to the pages that that you are accessing, whereas, in this case,  you will not be able to read the links of the sites that you visit. It all depends on the servers that you use. So far, you have connected from, the original Proxy Server, or VPN, to the first anonymizer, which in turn, connects to the second anonymizer.

4. From there, go to the end site that you want to access, which will be the fourth link in the chain.
Using this number of connections, depending on which servers you use, is not necessarily that slow and doesn't add  a lot more time for certain pages to load, depending on the speed of the server hosting the page, and what time of day you visit it.
NOTE: - The more servers that you add, the slower the connection will become.

So now, anybody wanting to check up on your online activities, would have to access the logs, from 4 different servers, which may not be all that simple to do, depending upon the following points:

1. If the use of the Proxy Server, was considered serious enough to justify any investigation.

2. Depending on which country the server was based in, and how friendly they were, towards whoever requested the server logs.

3. If any, or some of the servers used any encryption, then that may probably add
an additional barrier, as far as being able to read the logs, if they were accessible, is concerned.

Method B
As Method A, but at point 2, sign up for an alternative account with another VPN 
service. then follow the remaning steps of Method A.

In conclusion, using the methods, described above, should enhance your online security, 
considerably more so, than if you choose to use just one Proxy Server or VPN on its own.

No comments:

Post a Comment

 

Sample text

Sample Text