{"id":24159,"date":"2014-06-21T00:45:31","date_gmt":"2014-06-21T04:45:31","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24159"},"modified":"2014-06-21T00:45:31","modified_gmt":"2014-06-21T04:45:31","slug":"how-to-stay-anonymous-online","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/how-to-stay-anonymous-online.php","title":{"rendered":"How to stay anonymous online"},"content":{"rendered":"<p><p>    One year after the first revelations of Edward Snowden,    cryptography has shifted from an obscure branch of computer    science to an almost mainstream notion: It's possible, user    privacy groups and a growing industry of crypto-focused    companies tell us, to encrypt everything from emails to IMs to    a gif of a motorcycle    jumping over a plane.  <\/p>\n<p>    But it's also possible to go a step closer toward true privacy    online. Mere encryption hides the content of messages, but not    who's communicating. Use cryptographic anonymity tools to hide    your identity, on the other hand, and network eavesdroppers may    not even know where to find your communications, let alone    snoop on them. \"Hide in the network,\"     security guru Bruce Schneier made his first tip for evading the    NSA. \"The less obvious you are, the safer you are.\"  <\/p>\n<p>    Though it's hardly the sole means of achieving online    anonymity, the software known as Tor has become the most    vouchsafed and developer-friendly method for using the Internet    incognito. The free and open source program triple-encrypts    your traffic and bounces it through computers around the globe,    making tracing it vastly more difficult. Most Tor users know    the program as a way to anonymously browse the Web. But it's    much more. In fact, Tor's software runs in the background of    your operating system and creates a proxy connection that links    with the Tor network. A growing number of apps and even    operating systems provide the option to route data over that    connection, allowing you to obscure your identity for    practically any kind of online service.  <\/p>\n<p>    Some users are even experimenting with using Tor in almost all    their communications. \"It's like being a vegetarian or a    vegan,\" says Runa Sandvik, a privacy activist and former    developer for Tor. \"You don't eat certain types of food, and    for me I choose to use Tor only. I like the idea that when I    log onto a website, it doesn't know where I'm located, and it    can't track me.\"  <\/p>\n<p>    Here's how you can use the growing array of anonymity tools to    protect more of your life online.  <\/p>\n<p>    Web browsing    The core application distributed for free by the non-profit Tor    Project is the Tor    Browser, a hardened, security-focused version of Firefox    that pushes all of your Web traffic through Tor's anonymising    network. Given the three encrypted jumps that traffic takes    between computers around the world, it may be the closest thing    to true anonymity on the Web. It's also rather slow. But the    Tor browser is getting faster, says Micah Lee, a    privacy-focused technologist who has worked with the Electronic    Frontier Foundation-one of the organisations that funds the Tor    Project-and First Look Media. For the past month or so, he's    tried to use it as his main browser and only switch back to    traditional browsers occasionally, mostly for flash sites and    others that require plugins.  <\/p>\n<p>    After about a week, he says, the switch was hardly noticeable.    \"It may not be entirely necessary, but I haven't found it that    inconvenient either,\" Lee says. \"And it does have real privacy    benefits. Everyone gets tracked everywhere they go on the Web.    You can opt of out of that.\"  <\/p>\n<p>    Email    The simplest way to anonymously send email is to use a webmail    service in the Tor Browser. Of course, that requires signing up    for a new webmail account without revealing any personal    information, a difficult task given that Gmail, Outlook, and    Yahoo! Mail all require a phone number.  <\/p>\n<p>    Runa Sandvik suggests Guerrilla Mail, a    temporary, disposable email service. Guerrilla Mail lets you    set up a new, random email address with only a click. Using it    in the Tor Browser ensures that no one, not even Guerrilla    Mail, can connect your IP address with that ephemeral email    address.  <\/p>\n<p>    Encrypting messages with webmail can be tough, however. It    often requires the user to copy and paste messages into text    windows and then use PGP to scramble and unscramble them. To    avoid that problem, Lee instead suggests a different email    setup, using a privacy-focused email host like Riseup.net, the    Mozilla email app Thunderbird, the encryption plugin Enigmail,and    another plugin called TorBirdy    that routes its messages through Tor.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Excerpt from:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.wired.co.uk\/news\/archive\/2014-06\/18\/be-anonymous-online\/RK=0\/RS=IpJQNEKa0ciZj.gymlb7amLCHgk-\" title=\"How to stay anonymous online\">How to stay anonymous online<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> One year after the first revelations of Edward Snowden, cryptography has shifted from an obscure branch of computer science to an almost mainstream notion: It's possible, user privacy groups and a growing industry of crypto-focused companies tell us, to encrypt everything from emails to IMs to a gif of a motorcycle jumping over a plane. But it's also possible to go a step closer toward true privacy online. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-24159","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24159"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24159"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24159\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24159"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}