Skip to main content

Internet Anonymity

So, at the Moment, we all are under the Social Media Ban(If you're living in Sri Lanka). Everyone started to use VPN to access those certain Social Media Sites. Recent News had informed that anyone using VPN to access such platforms will be tracked and Punished by law.
How does this tracking happens? And how the hackers hide their identity when they break into those most secure impregnable websites?

One of the main reason, for that is that they hide their IP addresses from prying eyes of the authorities. 

For those who don't know what is IP address, IP addresses allow the location of literally billions of digital devices that are connected to the Internet to be pinpointed and differentiated from other devices. In the same sense that someone needs your mailing address to send you a letter, a remote computer needs your IP address to communicate with your computer. (source:IP Address)

Using various techniques, a hacker can hide his identity on the internet. For example: A hacker from Pakistan will use an IP address in North Korea to do his dirt work, making the authorities think the leet operation was done from North Korea (Digital Espionage).

People are becoming more open about most of their internet activities (Thanks to Facebook & they admit that it is bad for people). But some of us, would prefer the rest of the world staying in the dark about their activities. It might be individuals from a nation that represses internet access to someone wanting to access something which is not available in their country (i.e a series on Netflix that’s not available in their country). Irrespective of the reason, these following tricks should find your attention.

Proxy

Whether you're a pro or just a beginner, the PROXY is the most simplest to hide your information on internet. For those don't know what proxies are, a basic idea of how they work – a proxy will reroute your connection from via a third party server so the website you access will not be able to read data specific to you.

This following scenario is the best example of how Proxy Servers work:
Many schools block access to popular websites such as Facebook. Students can use proxy servers to circumvent this security. However, by connecting to proxy servers, they might be opening themselves up to danger by passing sensitive information such as personal photos and passwords through the proxy server. Some content filters block proxy servers in order to keep users from using them to bypass the filter (Source : Wikipedia)
This is just an example, in reality, the proxy will hide all of your information from the resources you access. Any server on the other end will only get the information that you provide.
There are plenty of Free and Paid Proxy Servers. If you intend to use a proxy to carry out some serious work, its recommended to stay away from a Free Proxy

Some popular proxies:

 TOR

Another popular method of hiding your information & a really popular one is - Using TOR Browser and TOR Network.The Tor network in simpler terms sounds like a proxy on steroids. The network will bounce your connection across multiple points to provide even higher anonymity to it’s user. Their network contains multiple tunnels across the globe, that are used to bounce the users signal.

Tor is an anonymity tool used by those who want to stay private and uncensored when browsing the Internet. Over time, it’s grown to be pretty darn good at this. This makes the security, stability, and speed of the underlying network critical to those depending on it


At an extremely high level, Tor works by bouncing connections from your computer to destinations (such as google.com) through a series of intermediate computers, or "relays".
By default, Tor bounces connections through 3 relays. Each of these have a specific role to play (Guard, Middle & Exit Relay). To know more visit Jorden-Wright's blog
The network is accessed from the TOR Browser and websites on the network have a specific address that you need to know to be able to access them. While it does provide anonymity, You should also know there are threats using the network. If you're anonymous means the one you contact in that network is also anonymous. The network is secure, but the browser itself isn't. The Tor browser is just a variation of the Firefox browser and is susceptible to everything Firefox is susceptible to.

(P.S: Let's see how to install & Configure TOR Browser on my next post)


VPN

A VPN(Virtual Private Network) is the next level of security. A VPN extends a private network over the public network, which in turn scrambles the data passing between you and a web server leaving it useless for anyone trying to access it. It doesn't prevent someone form attacking your machine directly, but does a hell of a job on hiding your identity.

Using VPN with one of the above mentioned technique offers the best possible way to hide your identity on the internet.

More Advanced Option

These above said methods may sound secure, there is always a small possibility of someone tracking you back. Even with all these 3 options, someone can still send you a malware to your machine or simply track down your MAC Address.
If we take the analogy of humans then we can say that MAC address is your name (with the additional proviso that it is unique in the world ) whereas IP address is your residential address. You can have different addresses at different times but your name would always be the same.(Source : Quora)

If one wishes to cover one’s tracks on the Internet, find a free WiFi access point, modify your WiFi card’s MAC address, and boot your computer from a “live CD”, running totally in the RAM will give you the absolute highest order of anonymity possible. (For education purpose only :-P)


Comments

Popular posts from this blog

Download your favorite Serials whole season at once

So, we all have our favorite serials. Or someone recently suggested you a serial which is now on it's latest season and you want to look at all those previous seasons. Some may watch it in online There are plenty of sites to watch them online. mywatchseries.to watch-series.com What if you want to download? You can download using IDM while playing online. How to download a whole season? Playing every episode and download? That's possible. But, is there an easy way? Yes. There is! These are the steps to follow. Before going down, download and install the latest IDM. IDM Latest (This is cracked. But, if you like. Support the developers by buying it) Step one Choose the site where you can download all your episodes. for example : http://dl2.mihanpix.com/Serial/ Index of Serial There are plenty of sites like this. To find those, just google "Index of Serials". Googled it Step two Go to the page of which season you want to download

Some Basic Questions and answers on Operating System Concepts

1.        What are the three main purposes of an operating system? To provide an environment for a computer user to execute programs on computer hardware in a convenient and efficient manner. To allocate the separate resources of the computer as needed to solve the problem given. The allocation process should be as fair and efficient as possible. As a control program it serves two major functions: (1)    supervision of the execution of user programs to prevent errors and improper use of the computer, and (2)    Management of the operation and control of I/O devices. 2.       Keeping in mind the various definitions of operating system, consider whether the operating system should include applications such as web browsers and mail programs. Argue both that it should and that it should not, and support your answers. Point: Applications such as web browsers and email tools are performing an increasingly important role in modern desktop computer systems. To fulfill