How to ensure anonymity on the Internet?

How to ensure anonymity on the Internet?

9 Effective Tips for Absolute Privacy and Anonymity on the Internet

Previous questionWhat serious psychological tests can you take on the Internet?
Next questionWhy do guys constantly stop communicating without giving a reason?

answers (62)

Answer 1
July, 2021

Use TOP for surfing, but it is not suitable for all sites.

Use proxy plugins in browsers.

And yes, be sure to follow basic Internet security rules: no phones of your own, in general, any data, carefully look before entering any site, especially sensitive topics, etc.

Answer 2
July, 2021

Alas. Late. Will not help. Everything flows, everything changes, and these changes

happen a little faster than we imagine. Unfortunately

this is the case. The world is rolling ahz and you are rolling there.

Answer 3
July, 2021

Anonymity on the network can only be ensured by hand, knowing the program code and programming languages, as well as all the subtleties of settings and tweaks. Anonymity is a complete rejection of antiviruses and popular browsers, as well as most of the software to which we are so accustomed. Experienced hackers rewrite programs for themselves, hone operating systems by digging into the very roots. If we are talking about phones, then you can forget about incognito altogether. Internet, applications, programs, every byte is watching you.

Answer 4
July, 2021

Ensuring anonymity on the Internet is something beyond the realm of possibility. “In the modern world, few people are surprised by the fact that everything and everyone is monitored: smartphones, tablets, computers, smart devices, software, etc. On the one hand, companies collecting information do everything to improve one or another service, make this beautiful world even better and improve the quality of user experience. On the other hand, they make money from users, analyze behavioral factors, form characteristic patterns and manipulate to achieve maximum benefits. "- this is an excerpt from the article on browser fingerprint and it is difficult to disagree with this statement.

Every action in the system is deposited in BigData and can be used both for you and against. You can minimize the ability to find you, for this it is enough to know how you can find a person on the Internet . With this information, you may sometimes not post something on the network or think very well before doing it.

Answer 5
July, 2021

Be completely anonymous? It's impossible. Even if you are using a VPN, the data is there. VPN only performs data spoofing. It is worth noting that in the case of an extreme, it is necessary to trace the entire chain of connections.

Answer 6
July, 2021

Who needs to get anything about you. But you are most likely not an opposition leader of the first rank and therefore the fuck did not give up to anyone)))

If you are just an ordinary paranoid, then put yourself a TOR and VPN.

and after using no - format the disk by rewriting.

Answer 7
July, 2021

It is necessary to build on two components:
1. Who is our enemy (from whom we are anonymized).
2. What resources are we ready to give.
In my opinion, the average paranoid has 3 options for the first component:
1. From a poorly trained attacker with basic skills.
2. From a trained but poorly resourced attacker.
3. From foreign special services and ecumenical bigdats.

In the first option, do not use http, social networks, prohibit posting photos with you in the public domain, use third-party pictures on avatars, different logins on different resources and other names e- mail.
The second option - we wind plug-ins on top of the browser, foreign vpn, paid protection against unauthorized access to the computer, avoid untrusted wi-fi, look into the torus.
The third option is to leave the Internet. We do not use gadgets and iot devices. In general, completely, we delete all accounts and turn to the main services according to the provisions of the Federal Law of 13.07.2015 N 264-FZ. But everything that got into the big data will remain there, especially in a foreign one.

Yes, and all banks that you use have the right to trade your personal data under the contracts that you signed, and this is all your purchases and personal data.

Answer 8
July, 2021

You can just be not interesting, or learn to look like that, in the eyes of both villains and law enforcement officers. Who needs to look for information about a person who is simply not needed.

Answer 9
July, 2021

Each browser allows you to browse the Internet anonymously. Just check the box in the settings and then it will open the sites in "incognito" mode.

Answer 10
July, 2021

Proxy servers and VPN, but public free ones do not provide complete anonymity. But each browser has "Anonymous browsing" you can use it, it allows you not to leave traces on the network

Answer 11
July, 2021

Proxy servers and VPN, of course, you can read detailed instructions on how to use it on the Internet). But now nothing gives 100% anonymity)

Answer 12
July, 2021

By and large, practically nothing. But for everyday needs this is not very necessary.

In other cases, you will have to purchase "left" SIM cards, use a modified modem to access the network and do it every time in a different place or use public networks, use special systems like Kali Linux, VPN, Proxy, refuse to use usual means of payment like bank cards, periodically change the equipment used. But perhaps the biggest problem is displacement with hiding the identity, because now every city is littered with cameras. So far, the only working way is to wear a mask with another person's face. You can search about Leo Selvaggio's URME Surveillance project.

Answer 13
July, 2021

Here are the most popular ways:

  1. Use an anonymizer
  2. Using a proxy server
  3. Third Party Programs - TOR Internet Browser, SafeIP, Chameleon, Hotspot Shield, Proxy Switcher, TunnelBear.
  4. Install extensions for and your browser

Look here for a good look -

Answer 14
July, 2021

I think the best option is to install the tor browser. He will make anonymity anyway. You can also use special VPN services, of which there are very many, both in the form of sites and in the form of desktop programs.

Answer 15
July, 2021

Use VPN. Use a proxy and anonymous browser, for example, TOR. But when the Internet is cut off, like in the northern province of China, like among the Uighurs, there will be nothing to catch. It all depends on the king.

Answer 16
July, 2021

Download the TOR browser and do not worry, all the time you have already lit up your data, but for example, from this minute, use only the torus and more. But in general there is a scheme: someone else's laptop + someone else's yusb modem, you can buy everything on Avito.

Answer 17
July, 2021

Experience shows that anonymity on the Internet is just a myth. A fairy tale for those who do not understand / poorly understand the topic of IT. You can use anonymous operating systems, anonymous browsers, VPN connections, prevent cookies from being saved and script execution in the browser ... All this is just a set of actions to calm your own paranoia. If you need to be found, you will be found. You may not believe me, but this is a fact!

Answer 18
July, 2021

Proxy traffic from the virtual machine via TOR. Ready-made solutions include Whonix, Kali Linux . Although, in the case of Kali , this is a bit different.

Answer 19
July, 2021

In the modern world, complete anonymity is possible only if you live in the forest and do not enjoy the benefits of civilization. In big cities, cameras are everywhere, and mobile coverage also creates a network to track anyone. It is impossible to hide your data on the Internet, even through VPN and other services. They guarantee the protection of personal data, confidentiality and all that. But this is only in words, but in reality - no one knows ...

Answer 20
July, 2021

Well, there are several options " How to stay anonymous on the Internet "

1 . Download VPN, only the signal will be bad

2. Disable cookies, but photos will not load well

Answer 21
July, 2021
  1. Buy a phone and laptop at a pawnshop

  2. buy a YUSB modem there.

  3. it is advisable to buy a sim card there without registering for a passport (well, or near the metro)

  4. Install any VPN client

  5. If you are completely paranoid, then install the TOP browser for reliability.

Answer 22
July, 2021

Install the browser extension-vpn blocking bypass. There are quite a few of them, a good FreeGate and in Google Chrome add-ons - "Runet blocking bypass" (suitable for Yandex browser too. Or download a browser for hackers, there are a lot of them in the public domain.

Answer 23
July, 2021

Only vpn, but still it will not provide one hundred percent security, while many vpn (free) steal your information themselves, but all your data is stored on a remote server, and they can be obtained if desired by certain persons, that's all

Answer 24
July, 2021

You can't get complete anonymity, unfortunately or fortunately ...

But you can partially make anonymity.

  1. Start using an OS that is clean every time you start. OS Tails is one example, a bootable USB stick is made for it.

  2. Don't enter any data on sites ... Very subtle advice, really, but oh well.

  3. A browser that will block various scripts from sites to collect information to create a browser fingerprint. For example, Tor and LinkenSphere.

I knew what I told. As a last resort, there are people who even made a video about this.

Answer 25
July, 2021

buy a VPN, buy rather than use free, do not use landline and mobile Internet, access the network from public access points or through a mobile satellite terminal, use professional (paid) programs anonymizers, this will partially help, complete anonymity is almost impossible to achieve .

Answer 26
July, 2021

Set yourself a winscribe - it will change your ip address, for everyone you will be from another country, which one can choose. The installation is simple, they give 10GB of traffic.
The second option is to install the tor browser, it will hide you in a similar way.
Both options are simple to execute - good luck 😀

Answer 27
July, 2021
  1. order a server with a ready-made proxy / vpn solution, data for connection and settings will be sent to you and go online through it, and not through your home ip.

  2. use Safe Browser and disable browser tracking.

  3. do not visit major Russian Internet portals that collect personal information about users.

Answer 28
July, 2021

It's simple. You don't need to use your data when registering. Provide fake information about yourself and that's it. But again, depending on where and for what. Somewhere it is impossible to give incorrect information about yourself under the law, otherwise you will be attracted.

Answer 29
July, 2021

Anonymity, in fact, cannot be ensured in any way, if you provide it from friends, then you definitely will not provide it from the special services, everything that gets on the Internet remains there. So don't be frank there.

Answer 30
July, 2021

They will advise here now.

I'll put it simply - download the TOP browser and that's it.

This is a browser that works through "tunnels" (I won't describe the mechanism)

Or the second option - download the Opera browser, there is a built-in VPN

Answer 31
July, 2021

The easiest and fastest ways:

The first way : use an anonymizer. Here are several options for you, choose any -,,,

Second method : use a proxy server. For example: open We choose any IP-address.

Third method : third-party programs. Internet Browser TOR, SafeIP

Answer 32
July, 2021

It's enough just not to write a lot of information about yourself. For example Do not show your photo, hide your number, Write a nickname instead of a name, use VPN. It's easier to say, don't use the Internet. If you do not want the information to get to third parties.

Answer 33
July, 2021

Data protection on the Internet is one of the pressing issues. We spend more and more time on the Internet and leave more and more personal information there. This information can be used by intruders. And although there is no way to completely hide the fact of your presence on the Internet, you can seriously complicate the process of collecting information about you.

  1. Proxy
    A proxy is a server that acts as an intermediary between a small local network and the Internet. Many internet users rely on proxies to hide IP addresses or access region-restricted content. Most proxy services are free, but there are paid proxies as well.
  2. Tor
    Tor is free and open source software for the second generation of onion routing. It is a proxy server system that allows you to establish an anonymous network connection, protected from eavesdropping.
  3. VPN
    VPN is an anonymous surfing service that allows you to hide your real IP address and encrypt your Internet traffic so that no one can spy on you. Because of its ease of use, VPN is considered one of the most popular methods for surfing anonymously.
  4. Message encryption
    Information leakage is one of the most common online privacy problems. To maintain the confidentiality of your data and correspondence, install an application where messages are encrypted end-to-end. Apps that promise to keep secrets include Telegram, Signal and Dust.
  5. Use encrypted email
    Of course, services like Gmail or Yandex.Mail will not be able to provide anonymity. Among the alternatives: Tutanota - a fully encrypted mailbox application. Another option is ProtonMail. The service offers encrypted email accounts, does not require any personal information when creating an account. However, the free plan only offers 500 MB of email storage.
  6. Disable Geolocation
    Almost all social networks or sites like Google track your device's location. While they use this information to provide more personalized services, it is clear that the tech giants' partners also have access to this information. And it's not a fact that third-party servers are protected from hacking.
  7. Check access levels in mobile applications
    Almost every application on your mobile device asks for permission to access at least one of the functions of your smartphone. While this will be justified in most cases, at times applications can be overly intrusive. For example, sometimes applications require you to indicate your real-time location, access to photos, or even your contact list.
Answer 34
July, 2021

Anonymity does not have a definite threshold after which you can relax - we are not trying to create something "completely anonymous", but we are working to ensure that attacks on such a network would become more and more "expensive" for attackers ".

Answer 35
July, 2021

Use the TOP browser, if everything is so serious (I'm talking about anonymity), then try to use the Internet, which will not lead a trace to you (a public hotspot in a city or in some institution with a lot of traffic is ideal), while again do not forget about the TOP browser and do not use other browsers and applications during the session, you can also use various anonymizers (there are a lot of them now) ...

Here is the link to the TOP browser: https: //www.torproject .org

Answer 36
July, 2021

Now we are constantly and everywhere watched! so don't even hope to somehow hide from all this .. And then see for yourself what and how will happen, there are different programs, etc.

Answer 37
July, 2021

Anonymity can be ensured, but it is difficult, easier not to use the Internet.
Should you try to hide information as much as possible?

After all, data is collected not only for the sale of advertising, but also for scientific purposes, it is used to study behavior, the market, algorithms and other areas where you are a unit in millions of numbers and no more.

Do not leave personal information in unreliable services, but even IT giants are subject to hacker attacks, such as, VK, Facebook, Google, etc.
Technologies allow you to find out information about a person. Knowing the email address mail, you can get a physical address, phone number or password in hidden and open databases, which are your social. networks. The main thing is what to look for, but information can be found. Even just using the IP, which everyone has on the Internet, you can get a huge amount of information. There is also a darknet in which there is a huge bigdata for attackers on a variety of resources and sites.

The conclusion is actually simple, you need to be able to basicly protect the information that you leave and think about what you post on the Internet, since any symbol, hash leaves a trace, and even when receiving and sending email. Mail.
Basic protection, for example, to have different passwords on each site, to have a personal phone number and another for message boards, etc.

If the question is not to leave a trace at all, then here you need to establish a connection preferably not from your personal internet provider. Sit at the computer without a phone. On the computer, install a knowingly closed OS from holes, and it is also desirable to make a virtual machine on a flash drive and again a virtual machine in the machine. Then buy a proxy, then connect to vpn from it, and use it through it .... and also, for example, use a torus. However, it remains to close all cookies, turn off Flash and Java ... and .... And also think about the configuration of the computer ........

And in other matters, it is all the same, only a small part of the information about data protection. Here such questions are not pertinent, since the answer to them is not one lecture, people give years of their lives gradually learning to protect data, and why do you need it? There are many methods and ways.

To view sites on the public Internet that are not accessible or blocked, for example, you can use vpn, proxy or browser tor. opera

The easiest way to be protected, have standard basic protection methods, write comments deliberately, like, understand. Any character you enter, someone looks, even in closed accounts and pseudo-protected. Understand what data you transfer on the phone using this or that application and consciously give access settings.

Answer 38
July, 2021
  1. The most common option is the Tor browser, it works like a torrent and is quite difficult to figure out.

  2. Use an unidentified public network instead of your home connection to access the Internet.

  3. Install a special version of the operating system, several of them.

  4. Do not enter any social networks, mailboxes, etc.

  5. Do not enter usernames or passwords by which you can be identified

Answer 39
July, 2021


  1. If possible, register on the sites with a name other than your own.
  2. Use many mail classifications: network, work, all at once.
  3. Do not disclose (preferably to anyone) personal data such as: car numbers, current geolocation, phone numbers, etc.
  4. Just don't give social media permission to geolocate.
Answer 40
July, 2021

Start using anonymizers, TOP browser, delete all accounts of social networks, government sites. Complete anonymity today is an extremely expensive and ineffective solution that will create high costs.

Answer 41
July, 2021

A person who cannot be tracked is not handled by a phone, the Internet, a map, etc. Life now is such that you are only sniffed by all sorts of things that collect information about you, even TVs in the off state ...

Answer 42
July, 2021

You can read many guides on how to ensure anonymity, but almost all of them are useless and for the average user, anonymity does not exist. Most public VPN services transfer your information to third parties and special services (for example or even worse put your personal data at risk (you can read /news/498220.php and

phones are listening to your conversations (Apple .php and android Modern user tracking tools using BIG Data are capable of detecting even the smallest digital footprint of a user. Therefore, if you are not a cybercriminal, you need to bother with anonymity within reasonable limits. The problem is now trying to solve more at the legislative level, limiting the ability of large corporations to collect personal information. But in fact, the situation with anonymity is sad and is unlikely to be corrected in the near future.

Answer 43
July, 2021

The fact is that it is a priori impossible to ensure complete anonymity on the Internet.

All due to the fact that no matter what resource you try to use, no matter what you request, you expect to receive a response, right ..?

Ie - even if you wind a bunch of programs and anonymizers around yourself, you will thus only increase the path to your machine, but when you even get a response from Google or Yandex, or just enter a request there and that very search engine realized what you want and gave you the information you need - that means he knew where to send it.

Do you understand? - i.e. - if you have opened something on the Internet, it means that something, according to certain data, answered or was displayed to you. And if "it" found exactly your car and displayed the necessary information, then the path to you is still being tracked. If it were impossible to track the path, using the Internet would also not work.

Answer 44
July, 2021

Correctly written, depending on why and from whom to hide. You can't hide completely, but there are good advice here. On my own I will add one more service for sending anonymous messages: I use, I like it.

Answer 45
July, 2021

First, you need to think about where you go to the Internet. All secret things are best done with non-burned gadgets. You buy a pipe from your hands, then a left SIM card somewhere near the station or in the market. The most important thing is never to insert the main SIM card registered in your name there. If you insert, then you have already left for you. The second stage is the creation of left accounts in social networks, if necessary. The main thing then, too, is not to be confused and not to go there from ordinary gadgets. Well, for surfing further torus, vpn, etc.
Something like this. But there is another nuance, do not go online even from the left gadget from home, or from places where you often visit. Places need to be changed, but in general, it should be like a hacker's: one gadget, one SIM card is one thing.

Answer 46
July, 2021

One of the ways to achieve anonymity on the Internet is to connect a virtual phone number, it allows you to receive incoming calls, as well as receive and send SMS messages. The phone number is the most vulnerable point in your anonymity, it is required by social networks, message boards and instant messengers for registrations, online stores for order confirmation and other sites. All this data as a result can become public on the network. By registering all these services for a virtual number, you get an excellent tool for managing your anonymity, you can always turn off the reception of incoming calls or SMS, thereby solving the problem of spammers or simply changing the number. It is quite easy to do this, you can manage the number right in the mobile application, you can find it on Google Play or on the website.

Answer 47
July, 2021

The recipe for complete anonymity is simple: you need to stop using the Internet and buy yourself a push-button mobile phone without going online.

But if you are not planning to sacrifice your standard of living and want to reduce the level of surveillance, follow these simple tips.

  1. Stop issuing discount cards with any purchase. Yes, you will have to sacrifice profitable promotions, but then you will save your data, which can then leak in an unknown direction. Remember: discount cards are not offered to sell goods, but to gain access to your personal data.
  2. Remove from all social networks. If this is difficult for you, save a few of the most important accounts, erase all personal information and photos from them, and set a neutral avatar. I won't talk about why posting detailed stories from your personal life, attaching photos and geolocation to them, is very dangerous and shortsighted. The Internet is full of different stories about how people are fired, robbed, judged, deceived, just by carefully studying their posts.
  3. Banks and insurance companies also like information from accounts. Do not be surprised later if you are denied a loan or your policy rate is overcharged.
  4. Disable the smartphone to automatically search for Wi-Fi networks. Some companies place routers around the city that read the mac-address of your device to access the data of your movements, and then resell this information to third parties.
  5. Do not use a debit or credit card. Just withdraw money from her and pay in cash. When paying with them, the bank gets access to data on your consumer preferences and movements. He can then use this information in his analytics, resell it to other companies, or even transfer it to anyone.
  6. Block applications from accessing your coordinates, contacts, and personal information through the smartphone settings.
  7. Install a VPN so your internet traces are invisible to your ISP. Preferably paid. Free VPNs are only free at first glance. They earn money by gaining access to your data, which they then resell.
  8. Install an ad blocker that blocks cookies and other data about your internet surfing. The most popular programs are AdBlock and Adguard.


And remember the main rule. Always think when registering accounts or registering anything on the Internet: why transfer this or that information to a site or application. Don't you think that in this case it is superfluous?

Your data is the oil of the future, keep it safe.

Answer 48
July, 2021

A dubious thing is anonymity on the Internet. Do you believe it? In order for your data to really have limited access, you need to stop going online altogether.

Answer 49
July, 2021

Just answer yourself one main question - WHY?

If you need anonymity from your friends, just delete all real pages in social networks and start fake ones, that's enough, they won't know anything if You won't blab it yourself, if you need anonymity from various companies, then you just need to use a free VPN extension in your browser, and also use extensions such as "Ghostery" and "Disconnect" plus ad blockers, this will be enough, but if the anonymity of a criminal nature then you Neither "Tor" nor anything else will help, throw away illusions, traces always remain, because this is how the Internet works, the Internet itself will not allow you to use its capabilities if you try not to leave traces, a simple example, without cookies and scripts, sites do not work, if you try to turn them off, you won't be able to enter the site, turn them on, leave a mark !!!

Answer 50
July, 2021

OMG, why do such questions come up with such enviable regularity? With the model of the violator, that you - and according to it the state is - it is impossible. Neither a torus, nor two tori, nor even a donut will save you.

You turned on the router - and the provider has a mark "Node X turned on the communication equipment". You are logged out - and the provider has a mark "Node X has connected to the Tor server". If the router does something else, even a trifle - the time updates, checks the new firmware versions - all this will be recorded by the provider. You turned off the router - the ISP has a mark "Noda X spent so much time on the Tor network." If the state is interested in you, it received this information and, without wasting any extra time, sent a couple of people in black suits to you. Protection against thermorectal cryptanalysis has not yet been invented, so you yourself, voluntarily and with a song, hand over all your keys, tell you where you went, etc.

Answer 51
July, 2021

First, you need to decide what is required: anonymity or data protection against unauthorized access (unauthorized access).

* People who want gain information "invisibility" in order to protect yourself from impending threats to personal safety you can recommend contacting the police . The sooner you apply for legal protection, the more opportunities to prevent undesirable consequences.

The Department "K" of the Ministry of Internal Affairs of Russia informs about the correct behavior on the Internet and payment systems on the website mvd.rf in separate instructions.

If you need anonymity on the Internet to block personal advertisements, then a set of actions is used to remove and block information about your presence on the resources. Elementary techniques - "Incognito" mode in the browser and blocking ad units.

If you need protection against tampering, then correctly configured filters, firewalls and encrypted data transfer protocols are used.

It is important to remember the main rule of behavior in the network: there is no anonymity in the global network, there is only a lack of authority .

In order to determine in more detail in matters of anonymity and NSD can read materials on the channel "INFORMATION LAW in society" :

  • Digital Presence Techniques
  • "Countering the implementation of current information threats"

The above materials contain methodological recommendations Roskomnadzor.

October 08, 2018

author: Demeshin Sergey Vladimirovich.

Answer 52
July, 2021
  1. Use VPN client to connect to the network

  2. Use social media as little as possible

  3. Anonymous mode in the browser

  4. Technically difficult now, but dial-up connection could solve the problem

  5. Configure proxy.

Answer 53
July, 2021


Using a VPN is a great way to increase your privacy and gain access to blocked sites or services. VPN services encrypt and protect your data, which is sure to make you feel safe. However, good service costs money. Are there any smart ways to get all the benefits of a VPN for free? In general, yes, but not without nuances.

There are many free VPN services out there, but can you trust them? Are companies really ready to provide you with quality services without any fee? These are just a couple of questions to keep in mind before using these services. We have selected some good suggestions for you.

1.) The popular Opera browser provides its users with one of the easiest and most convenient ways to access blocked sites using a VPN. The service is absolutely free and has no significant restrictions. And to further enhance your security, Opera offers a built-in ad blocker that removes tracking cookies.

For even more privacy, you can use a VPN in incognito mode. Thus, any cookies that can identify you as a user will be deleted when you exit this mode. However, this approach has a number of disadvantages: firstly, using Opera you can only browse sites using a different location - the rest of the programs will work as before, bypassing the VPN. Secondly, any site will know that you are using the service.

If the VPN button is not displayed in the address bar by default, you can enable it in the settings: Settings (Alt + P) - Advanced - Security - VPN.

2.) Speedify service will be most useful users with slow connections. The main feature of this provider is the integration of network interfaces. For example, by installing the application on your smartphone, you can group Wi-Fi and cellular operator connections. This will allow you to increase the speed and reliability of your connection.

In addition, Speedify claims to use AES and ChaCha encryption, connection prevention technology, and the absence of any logging ( saving user data ) ... All this looks very good, but there are also disadvantages: in the first month the limit on the amount of downloaded traffic is 5 GB, and in the next 1 GB.

3.) And of course, we are not supporters of free programs, since they do more harm than good. Therefore we recommend using this VPN . Today it is the best in the entire post-Soviet space.

Answer 54
July, 2021

To maximize your anonymity, use various ways to increase it. First, use VPN services when you're on the internet. You can find their list and reviews at Otzyvmarketing. Secondly, disable all tracking in your browser - geographic, etc. Permanently delete cookies and everything that the browser writes.

Nickname on social networks and forums

In social networks and on forums, you need to appear under a pseudonym. Come up with a full name, if possible, change your gender, day and year of birth, profession, hobby, and so on. And on all sites, speak on behalf of a pseudonym.

Gradually, you will get used to posing as another person. So no one will ever find you on the Internet and will not find your place of residence. By the way, it will not be superfluous to change your country of residence.

For example, if you live in Russia, you can say that you live in Belarus or Kazakhstan.

Using VPN

Above, I have already advised to use VPN services. Please note that they are all paid. I pay 470 rubles once a month. But you can save money if you buy access for a year.

VPN hides your IP address. I myself live in the West of Russia, and therefore I log in under the Lithuanian IP-address. It is better to choose a closer server for less ping.

In some cases, a VPN can slow down your internet speed. So it is better to use a VPN not always, but only during those operations during which you want to remain anonymous.

In the usual case, when you need to watch a movie, it is better to disconnect.

Please note that VPN cannot hide all of your data. Browser and cookies can tell a lot about you, so for complete anonymity it is better to install some specialized browser at all.

Communication with loved ones

You understand that if you communicate on the Internet with relatives, friends or colleagues, then you can be easily identified by your correspondence? So it's better to use a regular phone and vibe for communication. So to speak, to share your life on the Internet and communication with friends.

I really hope that my answer will help you.

More tips for saving data

  • Do not issue discount cards for purchases, they require you to enter your personal information.
  • Disable auto-scan for Wi-Fi networks on your phone so that routers don't spot you.
  • Deny applications access to coordinates, contacts, personal information through the smartphone settings.
Answer 55
July, 2021

It depends on how you look at your question. If you need it (anonymity) then the schemes are not too difficult. You can download the tor browser, or view everything in stealth mode, incognito, etc. and create fake names that are not registered with phone numbers, cards, etc.

But seriously, then if someone really really needs to reveal you, he will do it. Nobody has managed to hide at 100;)

Answer 56
July, 2021

Short answer: NO

Long answer: Nothing :). If you are on the Internet, then you have no anonymity. On the Internet, you can somehow ensure your privacy, but they are not the same thing. Companies still know everything about you, the Internet cable to your house comes from the provider, and he has your passport data, even if you are using VPN and DNS through DNSCrypt, etc. from the first second. then you will still send requests through your ISP. And the VPN service that you will be using will also log requests, even if it says that it doesn’t - that is what its hosting does :).

Answer 57
July, 2021

And who interferes with the use of the TOR browser, they haven't thought of it better for an ordinary layman. The search engine DuckDuckGo is also gaining popularity, Yandex browser can work very well in incognito mode.

Answer 58
July, 2021

How to connect a VPN connection and configure it correctly on Windows

The technology that creates a logical network in another network has received the abbreviation "VPN", which literally stands for "Virtual Private Network" in English ". In simple terms, VPN includes various methods of communication between devices within another network and provides the ability to apply various protection methods, which significantly increases the safety of information exchanged between computers.

And this is very important in the modern world, for example, for networks of large commercial corporations and, of course, banks. Below are detailed guides on how to create a VPN, instructions on the procedure for making a VPN connection and how to properly configure the created VPN connection.
How to connect a VPN
How to set up a VPN?
Windows XP
Windows 8
Windows 7
Connection characteristics
To easily understand what a VPN is, you just need to know what it can do. VPN connection allocates a certain sector in the existing network and all computers and digital equipment located in it are in constant communication with each other. But the most important thing is that this sector is completely closed and protected for all other devices in a large network.
VPN connection diagram

How to connect VPN

Despite the initially seeming complexity of VPN definition , its creation on Windows computers and even the VPN setup itself will not present much difficulty with a detailed guide. The main requirement is to strictly follow the strict sequence of the following steps:

Click "Start" and open the "Control Panel" window; Open the "Control Panel" window
Then click "View task status"; Click " Viewing the status of tasks "
Then" Control Center. networks and general. access "; Control Center. networks and general. access
Next, enter the "New subkey settings. or network "; Enter the" Settings for a new connection. or network "
In the menu that appears, click" Connect to a workplace ";
Click" Connect to a workplace "Next, the VPN is configured, taking into account the various accompanying nuances.

How to set up a VPN?
It is necessary to configure taking into account the individual characteristics of not only the operating system, but also the operator providing communication services.

Windows XP
In order for VPN in the Windows XP operating system to work successfully, the following steps are required:

Through the "Start" launch "Control Panel" and go to the "Network Connections" tab; Go to the "Network Connections" tab
Next, go to the "New Connection Wizard" menu and set the checkmark to "Connect to networks at the workplace "; Check the box on" Connect to the network at the workplace "
Click" Next ";
In the displayed menu, check the box on" Connect to the virtual private network "; Check the box on" Connect to the virtual private network networks "
Forthen, type some name, as you want to name the created connection, and click "Next"; Click "Next"
Then specify the name of the PC through which the VPN connection and connection is made; Specify the name of the PC
Then, if desired user can create an icon on the desktop in the last window; Icon on the desktop
Click "Finish";
Then, when operating in the created environment, you can use some convenient functions. To do this, do the following:

2 times quickly click on the icon that appears on the slave. table and click on "Properties"; Click on "Properties"
Then go to the "Security" tab; Go to the "Security" tab
Selecting "Advanced ...", perform security settings;
Perform security settings parameters are always entered in different ways, since they depend not only on the server, but also on the service provider.

Windows 8
In this OS, the question of how to set up a VPN should not cause special difficulties, because here it is almost automated.

The sequence of actions consists of the following steps:

Call the context menu on the status icon; Call the context menu
Click on the line "Center manage networks and public access "; Click on the line" Center for networks and public access
Then click on "Create a new subkey. or network "; Click on" Create a new subkey. or network "
Next click" Use my Internet connection "; Click" Use my Internet connection "
Click on" Next ";
Print address, name. Check the box for saving data and mark the rest as necessary;
Check the box for saving data7. Click "Create". Next, you need to specify the network options. To this end, perform the following actions:

Open "Access Control Center";
Click "Change adapter settings"; Click "Change adapter settings"
Then, on the VPN connection, open the context menu and click the line "Properties"; Click the line "Properties"
Next, in the window that appears, go through the tabs and check the following items: Remember account data
set the parameters shown in the figure below:
Set parameters Note: enter settings may vary significantly depending on the network configuration.

Windows 7
The process of making settings in Windows 7 is simple and accessible even to inexperienced computer users.

To make them, a Windows 7 user needs take the following sequential steps:

Click on the icon similar to the PC display in the tray and click on "Connect" in the menu that appears; Click on "Connect"
If required, then print the login and access code, click the " Properties "; Click the" Properties a "
Next enter your specific parameters in the" General "tab; Enter your specific parameters
Then go to the" Parameters "tab and also enter specific data corresponding to the specificnetwork and server; Enter specific data
Open the "Security" tab, where to configure specific encryption and protection parameters; Configure specific parameters
Enter the "Network" tab, most often "Protocol 4 ..." is used, check the box; Used "Protocol 4 ...", check the box
Open the "Access" tab and after entering the required parameters click "Ok".
Note: in order to work correctly, a careful individual selection of all parameters is required.

To configure the normal functioning of the gadget with Android OS in the VPN environment, you need to do several actions:

Open "Settings";
Go to the "Other networks" tab; Go to the "Other networks" tab
Enter VPN point and enter PIN;
Specify VPN type and enter individual parameters; Enter individual parameters
Next click on the created connection and print login and access code; Print login and access code
Click "Connect" ;
Connection characteristics
These The technology includes different types of delays in data transfer procedures. Delays appear due to the following factors:

It takes some time to establish a connection;
There is a constant process of encoding the transmitted information;
blocks of transmitted information.
Setting additional names

The most significant differences are present in the technology itself, for example, routers and separate lines are not needed for VPN. To function effectively, you only need access to the world wide web and applications that provide information encoding.

Answer 59
July, 2021

The easiest and fastest ways:

The first way : use an anonymizer. Here are several options for you, choose any -,,,

Second method : use a proxy server. For example: open We choose any IP-address.

Third method : third-party programs. Internet Browser TOR, SafeIP

Answer 60
July, 2021 not register on the Internet and social. networks (Under the conditions if you do not have an account).
2. See there was no leak of personal data.
3. If you have an account in social. networks do not take off photos with your face and do not enter personal data (place of work (study), place of residence, etc.
4. Do not write to strangers or little knowledgeable people about yourself.
This is just my answer to this the question you need to choose is how you will achieve anonymity, my advice is not to do anything superfluous.

Answer 61
July, 2021

Anonymity is not required. Having caught you in actions to hide your identity, it is easier to slander and set you up. If you give an account of all your network activity, without separating it from the rest of your life, this life becomes easier and more comfortable. If there are Internet risks, they are more likely associated with identity theft when someone tries to impersonate you.

Apart from this there is the issue of privacy when you try to restrict the amount of information available about you and your actions within its "circle of trust". In matters of privacy, you have to trust the services you use:

  1. Your ISP

  2. Manufacturer / supplier / service of your electronic devices

  3. Software developer (operating environment, browser ..)

  4. Internet service provider (social media, email, etc.)

In the absence of such trust, you will have to find a way to do without questionable services in your opinion. The only thing that can be advised here is to avoid implicit transactions, when payment for services occurs indirectly, without a simple and understandable payment. As you know, free cheese can only be found in a mousetrap.

Answer 62
July, 2021

Complete anonymity on the Internet, even with vpn services, cannot be achieved. Depends on what goals the person pursues. If he is hiding from the law, the special services will still find the violator and imaginary anonymity will not help. The only thing that vpn services are good at is the protection of personal data when using public wi fi points; attackers will not be able to hack a phone through them.

Related question

Is it possible to be on the Internet completely anonymously?

Read more

Why is anonymity on the Internet important to you?

Read more

You go to some site, and tomorrow you already receive a message on a social network. How to maintain anonymity on the Internet?

Read more

How To Be Anonymous / Invisible Online - protect your privacy & anonymity

Is anonymity on the Internet nonsense? After all, a specialist can calculate ip.

Read more

What simple programs or actions (for the average user) help maximize anonymity on the Internet?

Read more

Does it make sense to anonymize on the Internet in order to express opinions that differ from the party's policy, the opinion of the majority?

Read more

How to maintain complete anonymity on the network? What do we have to do?

Read more

Who are anonymus and do you believe in the anonymity of the Internet?

Read more

A hacker explains the best way to browse the internet anonymously

What is related to legal methods of ensuring information security?

Read more

What happens if Telegram refuses to comply with the requirement of the law on anonymity?

Read more

From childhood on the Internet. Dozens of accounts. A chain of the most diverse nicknames and names will lead not the smartest person to information about me, but then to relatives. Where is the way back to anonymity?

Read more

How to make money on the Internet?

Read more

How to turn on the Internet

Read more

Becoming Anonymous: The Complete Guide To Maximum Security Online

How does the new Ask Me a Question feature on Instagram work? Is it true that the questions are anonymous?

Read more

How to extend the Internet on Megafon?

Read more

How to do business on the Internet?

Read more

How to get on the dark internet?

Read more

How much to earn on the Internet?

Read more

How to Browse the Internet Anonymously

How to maintain privacy on the Internet?

Read more

How to search on the foreign Internet?

Read more