I am NOT for you → Understanding The Reality of the Internet
When we are browsing the data on the internet, there is more than a thousand of third parties are snatching our data. We can be tracked by some companies without any permission. Many companies watch our day to day life via the internet. If you don’t think about this, just go and read this article. You will be back here after reading the article.
Is VPN a solution for this?
May be but the VPN providers know your information like ISP does. VPNs only change the IP address and make it difficult for our ISP to see and control our traffic. VPNs are useful to bypass censorship geo-blocking or throttling by our ISP but they don’t give any anonymity for us. Do you think the IP address is needed to track your identity? The answer was no since the modern trackers can tack you without your identity.
Anonymity is needed for everyone to keep their privacy. Being anonymous is not the same as being private. For example, you use the WhatsApp private chat to chat with your friends. In there, you use your original identity so you are in private but not as anonymous. The encryption is helped us to make the private chat however it will only protect our content, not our identity.
How can be anonymous on the internet?
The answer was Tor network and dark internet. You may think like oh is it good? Absolutely good to maintain our privacy. We need a verifiably untraceable system where nobody knows who you are. Tor gives this anonymity for us. Tor is an overlay network that runs on the regular internet. The goal of the tor network is to to make it impossible to tace traffic back to its origin. It achieves this by encrypting and rerouting your traffic three independent tor relays or hops. None of the relays knows the full length of the tor traffic. These relays are run by volunteers from all around the world and tor browser chooses and arranges them randomly infrequently. On average every 10 minutes or when you restart your tor-browser, you get a new set of relays giving a completely new identity.
Tor Browser
Tor browser is the tool to get access to the tor network. It can be download from the official site of tor. The beautiful thing of tor browser is not needed to install in system. It can be downloaded in USB and run it anywhere.
Tor has proxies. The first proxy will decrypt the outer layer of encryption and send it on to a middle proxy. The middle proxy does the same and sends it onto the final proxy. The final proxy finally decrypts your original request, so be aware that they can see the contents of what you are sending and to which website or server it is being sent. But they don’t know that it came from you.
Tor gives access to darknet through your websites onions. The website address of darknet is different from normal addresses.
If you read this article, you will found the difference. Facebook has an onion address to bypass nationwide firewalls but it still maintains by the Facebook so don’t expect the privacy or anonymity. Tor can be used to access clear net websites. There are tools in tor tp protect your privacy to keep you protected even on clear net websites.
For example, No script is the tool to blocks the execution of JavaScript by your browser. Normally tor browser doesn’t block the javascript. You can change this by changing tor-browser mode from standard to other modes with your preference.
Tor encrypts data and sends it through proxies before it reaches the target server, so that hides the contents of the communication and to which website or server you are talking. You can also try to hide that you are using Tor, but this is difficult and a determined ISP will be able to determine that you are using Tor.
standard → All JS Scripts are allowed
safer → Unencrypted JS scripts are blocked
safest → All JS Scripts are blocked
How can we use the Tor Browser correctly?
Don’t sign in to online accounts on tor.
You are not anonymous just for being on the Tor network if you give someone your name it doesn’t matter how much you are blocking trackers and hiding your IP address all. All online accounts can be used to track you so make sure you serve on tor signed off.
Don’t change the Tor browser settings If you don’t know it.
We need to care about these things. We can change the security settings to have flexible. I prefer that don’t install any plugins, add-ins or themes since they are not our purpose to use tor. We use the tor for anonymous on the internet.
Use the Default Tor browser to connect the Tor network
The best way to enter the tor network is tor browser since it is the best practice.
Use the Whonix wall
Tor browser is only as secure as the operating system you are running it on which is not very secure this is why we need to build an inscrutable wall around your browser that eliminates the attack surface to an absolute minimum. This is where Whonix is doing a great job. Follow this article to use the Whonix wall in VM.
Switch your host operating system to Linux If you need more privacy
Host OS can monitor all the activities you have made on computer. The thing is OS such as Mac OS, Windows can monitor you. It means you have monitored by these companies. If you need more privacy change the OS to Linux distributions since Linux is an open-source OS. Linux is very resistant to malware and vulnerabilities and is generally more stable than windows.
Conclusion What I have talked above
Privacy is important we can maintain our privacy to act as anonymous on the internet. We have looked at how can we anonymous using the tor network. We have learned how we can use the tor in a proper way.
Being Anonymous will help us to maintain our Privacy