Settings
Language

Country

Framework language
Choose the country,language and framework settings
Privacy
HTTPS + POST : An encrypted SSL(HTTPS) connection ensuring your privacy. The search variables like keywords, etc. are encrypted and masked.
HTTPS + GET : The data transfer is enrypted but search variables displayed in the URL.
HTTP + GET : Non encrypted datatransfer
SSL key exchange / Cipher
World Wide Web:
primary
secondary
Images:
primary
secondary
Thumbnails
Count of search results per page
Content filter

Violence
Filter adult material


Parental lock: with setting a password you are activating the parental lock. You are able to reset it by typing in the correct password clicking reset and saving the settings. To use the child protection properly you need to create a separate system account for your child with no write access to cookies

Length of descriptions
Activate social platform plugins
With activating this option social plugins embed to this website will get loaded automatically. You will automatically accept all terms of used social plugin hosters by setting activated. Please reconsider our terms and links to related terms and datasecurity for more information
Advertisements
Color style
Save Settings
Close Settings

Blog

Staying anonymous using Proxy/VPN Servers
Translation in de

If you want to use the internet anonymously you need to pay attention to a few simple rules to protect your identity and your system.

 

System Security:

- Securing your system against malicious scripts, rats, and so on:

    - Windows/Mac/Android/iOS Users:

        - Use an antivirus software. There are serveral free avs which are well known to be reliable: BitDefender(Windows/Mac), PandaAntivirus(Windows),  Qihoo 360 Total Security Essential(Windows/Android/Mac), Avira Antivirus(Windows/Mac/Android/iOS), Avast Antivirus(Windows/Mac/Android/iOS), Malwarebytes Anti-Malware (Windows/Android), AVG Antivirus(Windows/Mac/Android/iOS), Comodo Antivirus(Windows),  Ad-Aware Antivirus(Windows), Forticlient(Windows/Mac/Andorid/iOS), ZoneAlarm Antivirus(Windows), Kaspersky Security Scan(Windows/Mac/Android/iOS)

        - Use a script blocker plugin for your browser like NoScript: you will get rid of adds, prohibit malicous scripts etc.       

        - Use firewall software. Mac users should use the integrated firewall. The following software firewalls are for free: ZoneAlarm Firewall(Windows), Comodo Firewall(Windows), Ashampoo Firewall (Windows,Android), NoRoot Firewall(Android), DroidWall(Android), AFWall(Android), Little Snitch(Mac)

        - Or use a hardware firewall(Most Routers/Modems should have a software firewall integrated. You can build your own hardware firewall/router in our Ultra Low Budget Router Tutorial)

    - Linux Users:

        - IMA/EVM

        - Iptables

        - GrSec/Pax Kernel Patches

        - SELinux

        - RKH(Lynis) or other Root Kit Hunter scripts

 

Using Proxy Services:

    - Leviathan Security demonstrated how to inject binary files on the fly by using code caves as containers using a TOR Network proxy node. Therefor you should have a virus scanner and process checking av/firewall/security software to spot injected threads. Comparing MD5 Sums is also crucial to identify any manipulation of the downloaded file.A simple SSL download will not ensure the validity of your download if weak ciphers are used for key exchange. There are possibilities for MITM attacks by non visual SSL proxies which then open up the possibility of manipulation of a binary file when it is transfered.

   - Proxy services do not use (strong) encryption! This results in easy readible data transfer packages. The better choice is an encrypted VPN connection.

   

Staying anonymous using VPN/Proxy:

Logging into a social network account by Facebook,Google,Yahoo,Twitter,etc. will create tracking cookies which are used to track users actions. If I log into a facebook account for instance and then browse at pages having a facebook plugin, facebook will register that I have visited this page + exact url + time and date of access, and so on . If you are using a Google account any page with Google Analytics plugins, etc. may track your visit/actions. By this tracking you may be specified as a malware user or similar using VPN services which were abused in the past. Using TOR you will maybe have a higher possibility of beeing labeled as a consumer of child porn material or similar. A different case is identity theft according to social networking: If your account got hacked the attacker could use the same VPN service you were using before to cover it's tracks.

You should be aware that it is important to delete those tracking cookies if you want to stay anonymous using VPNs/proxies. You could also prohibit the script execution of the javascript plugins hosted by Facebook,Google,Yahoo,Twitter,etc. with browser addons like NoScript.

I do not recommend using Proxy or VPN Servers for accessing important accounts like online banking, sovial networking and similar. Even though the connection is encrypted  there could be security flaws with your browser or the online banking server. You can check the SSL security of HTTPS servers with online tools like this: https://www.ssllabs.com/ssltest/analyze.html

 

Possible sideeffects you should expect using VPN/Proxy Services:

- Most online services will check the geolocation of your ip and if the location differs you may have to acknowledge your identity to gain access to your account(answer your security question, etc.).

- Access for some online services could be (temporary) blocked if the server was malused by hackers/bots/etc.

 

Posted at ( updated at by c4sh )
in HowTo 

Tags:
Activate Facebook
Comments