If you want to use the internet anonymously you need to pay attention to a few simple rules to protect your identity and your system.
- Securing your system against malicious scripts, rats, and so on:
- Windows/Mac/Android/iOS Users:
- Use an antivirus software. There are serveral free avs which are well known to be reliable: BitDefender(Windows/Mac), PandaAntivirus(Windows), Qihoo 360 Total Security Essential(Windows/Android/Mac), Avira Antivirus(Windows/Mac/Android/iOS), Avast Antivirus(Windows/Mac/Android/iOS), Malwarebytes Anti-Malware (Windows/Android), AVG Antivirus(Windows/Mac/Android/iOS), Comodo Antivirus(Windows), Ad-Aware Antivirus(Windows), Forticlient(Windows/Mac/Andorid/iOS), ZoneAlarm Antivirus(Windows), Kaspersky Security Scan(Windows/Mac/Android/iOS)
- Use a script blocker plugin for your browser like NoScript: you will get rid of adds, prohibit malicous scripts etc.
- Use firewall software. Mac users should use the integrated firewall. The following software firewalls are for free: ZoneAlarm Firewall(Windows), Comodo Firewall(Windows), Ashampoo Firewall (Windows,Android), NoRoot Firewall(Android), DroidWall(Android), AFWall(Android), Little Snitch(Mac)
- Or use a hardware firewall(Most Routers/Modems should have a software firewall integrated. You can build your own hardware firewall/router in our Ultra Low Budget Router Tutorial)
- Linux Users:
- GrSec/Pax Kernel Patches
- RKH(Lynis) or other Root Kit Hunter scripts
Using Proxy Services:
- Leviathan Security demonstrated how to inject binary files on the fly by using code caves as containers using a TOR Network proxy node. Therefor you should have a virus scanner and process checking av/firewall/security software to spot injected threads. Comparing MD5 Sums is also crucial to identify any manipulation of the downloaded file.A simple SSL download will not ensure the validity of your download if weak ciphers are used for key exchange. There are possibilities for MITM attacks by non visual SSL proxies which then open up the possibility of manipulation of a binary file when it is transfered.
- Proxy services do not use (strong) encryption! This results in easy readible data transfer packages. The better choice is an encrypted VPN connection.
Staying anonymous using VPN/Proxy:
Logging into a social network account by Facebook,Google,Yahoo,Twitter,etc. will create tracking cookies which are used to track users actions. If I log into a facebook account for instance and then browse at pages having a facebook plugin, facebook will register that I have visited this page + exact url + time and date of access, and so on . If you are using a Google account any page with Google Analytics plugins, etc. may track your visit/actions. By this tracking you may be specified as a malware user or similar using VPN services which were abused in the past. Using TOR you will maybe have a higher possibility of beeing labeled as a consumer of child porn material or similar. A different case is identity theft according to social networking: If your account got hacked the attacker could use the same VPN service you were using before to cover it's tracks.
I do not recommend using Proxy or VPN Servers for accessing important accounts like online banking, sovial networking and similar. Even though the connection is encrypted there could be security flaws with your browser or the online banking server. You can check the SSL security of HTTPS servers with online tools like this: https://www.ssllabs.com/ssltest/analyze.html
Possible sideeffects you should expect using VPN/Proxy Services:
- Most online services will check the geolocation of your ip and if the location differs you may have to acknowledge your identity to gain access to your account(answer your security question, etc.).
- Access for some online services could be (temporary) blocked if the server was malused by hackers/bots/etc.
Posted at 2015-05-14 18:04:29 ( updated at 2018-09-17 22:25:13 by c4sh )