Are we secure?
Securing our data is the most important part that we should do. But it's not much easier in today's date because our 95% of data are leaked by the apps which we are using it may any app, then that's the one thing stands and another main part is that we are safe while searching anything on WWW (World Wide Web)? In simple language the things or information that we send download and search on the browser that is watched by Google servers, that who is doing that all searches and downloading on WWW are been captured by many servers. That is how our data leakes and our IP address also and it goes to the app servers our all detail of our device.
Incognito tab is it safe?
Incognito mode is made for safe browsing and in today's date in many browsers, it has been added but is that safe, we are anonymous while searching in incognito mode? no, in incognito mode also our data goes to google servers and another browser which we use but all say that this mode is help full for hiding our privacy. But basically, it is also not so safe and secure. You can read more details about incognito mode here click here. In past days an incident was happened by the world's famous smartphone brand Xiaomi. Readout this.
Xiaomi was sending browser data from three apps - Mi Browser, Mi Browser Pro, and Mint - to its servers for 'analysis'. When security researchers Gabi Cirlig discovered this and pointed it out, Xiaomi called the data leak "fake news" before making changes to how its browsers work. You can read more about this on browser
As you can see Xiaomi was coated down for data leaking when we use their app but Xiaomi says that it fake news but it is real news. which was come from the Xiaomi browser true incognito tab.
Now let come on the main topic.
How to become secure and anonymous on WWW(World Wide Web).
Then what we are doing exactly, we are hiding our information by WWW, In simple language when we do anything on browser like searching downloading then our data goes to that browser servers our IP our information our personal data also, then how to be saved by that how to become anonymous and use browser sounds amazing na , yes and this type of tricks are basically used by hackers to hide their details then yes we are also learning how to hide our details from app servers. And become a spy.
Now let start.
Disclaimer.
" Do not attempt to violate the law with anything contained here. If you planned to use the content for illegal purposes, then please leave this site immediately! We will not be responsible for any illegal actions".
I will explain to you 4 different methods by which we can do secure and anonymous browsing.
In detail.
The 4 ways are.
- The Onion Network
- Proxy servers
- Virtual private networks
- Private encrypted email
- The Onion Network.
THE ONION ROUTER SYSTEM
In the 1990s, the US Office of Naval Research (ONR) set out to develop a method for
anonymously navigating the internet for espionage purposes. The plan was to set up a
network of routers that was separate from the internet’s routers, that could encrypt the
traffic, and that only stored the unencrypted IP address of the previous router—
meaning all other router addresses along the way were encrypted. The idea was that
anyone watching the traffic could not determine the origin or destination of the data.
This research became known as “The Onion Router (Tor) Project” in 2002, and it’s now
available to anyone to use for relatively safe and anonymous navigation on the web
How Tor Works
Packets sent over Tor are not sent over the regular routers so closely monitored by so
many but rather are sent over a network of over 7,000 routers around the world, thanks
to volunteers who allow their computers to be used by Tor. On top of using a totally
separate router network, Tor encrypts the data, destination, and sender IP address of
each packet. At each hop, the information is encrypted and then decrypted by the next
hop when it’s received. In this way, each packet contains information about only the
previous hop along the path and not the IP address of the origin. If someone intercepts
the traffic, they can see only the IP address of the previous hop, and the website owner
can see only the IP address of the last router that sent the traffic . This
ensures relative anonymity across the internet.
To enable the use of Tor, just install the Tor browser from
https://www.torproject.org/. Once installed, it will look something like in pic and you can use it like any old internet browser. By using this browser, you’ll be
navigating the internet through a separate set of routers and will be able to visit sites
without being tracked by Big Brother. Unfortunately, the tradeoff is that surfing via the
Tor Browser can be a lot slower; because there are not nearly as many routers, the
bandwidth is limited in this network.
The landing page for the Tor browser
In addition to being capable of accessing nearly any website on the traditional internet,
the Tor browser is capable of accessing the dark web. The websites that make up the
dark web require anonymity, so they allow access only through the Tor browser, and
they have addresses ending in .onion for their toplevel domain (TLD). The dark web is
infamous for illegal activity, but a number of legitimate services are also available there.
A word of caution, however: when accessing the dark web, you may come across
material that many will find offensive.
Security Concerns.
The intelligence and spy services of the United States and other nations consider the
Tor network a threat to national security, believing such an anonymous network
enables foreign governments and terrorists to communicate without being watched. As
a result, a number of robust, ambitious research projects are working to break the
anonymity of Tor.
Tor’s anonymity has been broken before by these authorities and will likely be broken
again. The NSA, as one instance, runs its own Tor routers, meaning that your traffic
may be traversing the NSA’s routers when you use Tor. If your traffic is exiting the
NSA’s routers, that’s even worse, because the exit router always knows your
destination. The NSA also has a method known as traf ic correlation, which involves
looking for patterns in incoming and outgoing traffic, that has been able to break Tor’s
anonymity. Though these attempts to break Tor won’t affect Tor’s effectiveness at
obscuring your identity from commercial services, such as Google, they may limit the
browser’s effectiveness in keeping you anonymous from spy agencies.
- PROXY SERVERS.
Another strategy for achieving anonymity on the internet is to use proxies, which are
intermediate systems that act as middlemen for traffic: the user connects to a proxy,
and the traffic is given the IP address of the proxy before it’s passed on (see in the pic). When the traffic returns from the destination, the proxy sends the traffic back to the
source. In this way, traffic appears to come from the proxy and not the originating IP
address.
Running traf ic through a proxy server
Security Concerns.
As a last note on proxy security, be sure to choose your proxies wisely: proxychainsis only
as good as the proxies you use. If you are intent on remaining anonymous, do not use a
free proxy, as mentioned earlier. Hackers use paidfor proxies that can be trusted. In
fact, the free proxies are likely selling your IP address and browsing history. As Bruce
Schneier, the famous cryptographer and security expert, once said, “If something is
free, you’re not the customer; you’re the product.” In other words, any free product is
likely gathering your data and selling it. Why else would they offer a proxy for free?
Although the IP address of your traffic leaving the proxy will be anonymous, there are
other ways for surveillance agencies to identify you. For instance, the owner of the
proxy will know your identity and, if pressured enough by espionage or law
enforcement agencies with jurisdiction, may offer up your identity to protect their
business. It’s important to be aware of the limitations of proxies as a source of
anonymity.
- VIRTUAL PRIVATE NETWORKS.
Using a virtual private network (VPN) can be an effective way to keep your web traffic
relatively anonymous and secure. A VPN is used to connect to an intermediary internet
device such as a router that sends your traffic to its ultimate destination tagged with the
IP address of the router.
Using a VPN can certainly enhance your security and privacy, but it’s not a guarantee of
anonymity. The internet device you connect to must record or log your IP address to be
able to properly send the data back to you, so anyone able to access these records can
uncover information about you.
The beauty of VPNs is that they are simple and easy to work with. You can open an
account with a VPN provider and then seamlessly connect to the VPN each time you log
on to your computer. You would use your browser as usual to navigate the web, but it
will appear to anyone watching that your traffic is coming from the IP address and
location of the internet VPN device and not your own. In addition, all traffic between
you and the VPN device is encrypted, so even your internet service provider can’t see
your traffic.
Among other things, a VPN can be effective in evading governmentcontrolled content
and information censors. For instance, if your national government limits your access
to websites with a particular political message, you can likely use a VPN based outside
your country in order to access that content. Some media corporations, such as Netflix,
Hulu, and HBO, limit access to their content to IP addresses originating from their own
nation. Using a VPN based in a nation that those services allow can often get you
around those access limitations.
Some of the best and most popular commercial VPN services, according to CNET, are
the following:
IPVanish
NordVPN
ExpressVPN
CyberGhost
Golden Frog VPN
Hide My Ass (HMA)
Private Internet Access
PureVPN
TorGuard
Buffered VPN
Most of these VPN services charge $50–$100 per year, and many offer a free 30day
trial. To find out more about how to set up a VPN, choose one from the list and visit the
website. You should find download, installation, and usage instructions that are pretty
easy to follow.
The strength of a VPN is that all your traffic is encrypted when it leaves your computer,
thus protecting you against snooping, and your IP address is cloaked by the VPN IP
address when you visit a site. As with a proxy server, the owner of the VPN has your
originating IP address (otherwise they couldn’t send your traffic back to you). If they
are pressured by espionage agencies or law enforcement, they might give up your
identity. One way to prevent that is to use only VPNs that promise not to store or log
any of this information (and hope they are being truthful). In this way, if someone
insists that the VPN service provider turn over its data on its users, there is no data.
- ENCRYPTED EMAIL.
Free commercial email services such as Gmail, Yahoo!, and Outlook Web Mail
(formerly Hotmail) are free for a reason: they are vehicles for tracking your interests
and serving up advertisements. As mentioned already, if a service is free, you are the
product, not the customer. In addition, the servers of the email provider (Google, for
example) have access to the unencrypted contents of your email, even if you’re using
HTTPS.
One way to prevent eavesdropping on your email is to use encrypted email. ProtonMail,
shown in Figure 135, encrypts your email from end to end or browser to browser. This
means that your email is encrypted on ProtonMail servers—even the ProtonMail
administrators can’t read your email.
ProtonMail was founded by a group of young scientists at the CERN supercollider
facility in Switzerland. The Swiss have a long and storied history of protecting secrets
(remember those Swiss bank accounts you’ve heard so much about?), and ProtonMail’s
servers are based in the European Union, which has much stricter laws regarding the
sharing of personal data than does the United States. ProtonMail does not charge for a
basic account but offers premium accounts for a nominal fee. It is important to note
that when exchanging email with nonProtonMail users, there is the potential for some
or all of the email not to be encrypted. See the ProtonMail support knowledge base for
full details.
Then this is all information and details by which you can secure your browsing by becoming anonymous. And you can save your identity and information by leaking. Basically, these tricks are used by ethical hackers or black hart hackers for private browsing and for dark web usage . Then that's it meet you in the next interesting article on hacking-related or something other till then stay tuned.