Fully anonymous #39



Do you Know

Most of the governments especially USA government watches out for an ordinary person’s secrets like what he has sent, what he has downloaded or surfed.

It is exceptionally vital for a typical individual to surf the web anonymous

I am discussing the tools and ways that can be utilized to be anonymous.

 

Using VPN

There are both free and paid VPN. But, some of them are exceptionally futile.

They give their user’s logs to the surveillance and other official authorities if they give an order to them.

 

Using TOR

TOR browser is most loved by both great individuals and black hats since the dark web can be surf by utilizing this programmed.

 

Working of TOR

Tor program makes a circuit of IPs. It makes numerous layer of IPs to shroud your genius IP.

 

Precautions for TOR

Don’t resize your TOR browser windows. Leave it as the default size.

Don’t use mobile 2 steps verification in tor. Some website provides 2 steps verification for safe log in but it will help to track you down.

Don’t use the google search engine for browsing the internet. Use the DuckDuckGo search engine.

Don’t post your personal information such as credit card details, name, address, etc. while using Tor.

Don’t use tor for windows operating system. Use a Linux operating system. As windows have some vulnerabilities.

Don’t use HTTP website on TOR. If you use that types of website there are more chances to get your unencrypted data and to break your anonymity down.

Don’t forget to delete your browser cookies and history after finishing browser.

An the last one is Don’t use VPN with TOR. It’s my personal advice because then you gave access to your exit node to the provider..

Comments

Popular posts from this blog

Hacker Directory #49

Programmer Know about following concept #21

You are Founder of Software company #20