ComputersSoftware

Anonymous browser: the concept and what it is needed for

In connection with the latest revelations of various intelligence services of foreign countries, many users have almost developed a persecution mania. They are interested in ways to save their personal data, in bulk, delete their accounts from social networks.

To some extent, all these actions are justified, but how much more important for the real preservation of anonymity to learn "not to litter" on the network when visiting sites on a daily basis. This will help you an anonymous browser. What is it, and how does it work? We will try to answer all these questions in this article.

Definition of concept

What kind of Internet browser is this, which ensures the safety of user data? Let's deal with this by reviewing the anonymous browser "Tor".

Since it is based on the source code of the notorious Firefox, to ensure the anonymity is widely used its extension FoxyProxy. In addition, the data is distributed to hundreds of thousands of independent servers, so that their interception is almost impossible.

This is facilitated by the fact that all transmitted information is encrypted: together with splitting it into thousands of fragments that are sent independently of each other, the risk of disclosure of your identity is minimal.

Because of this "layering" this anonymous browser on its logo has an onion. All technologies that are embedded by developers in their offspring are aimed at reducing the effectiveness of traffic analysis mechanisms that operate in many countries around the world.

What is it all about?

Reading all of the above, you can come to the conclusion that care can be taken to hide the traces of their activities on the Internet unless some kind of intruders. Alas, but quite law-abiding citizens are increasingly faced with this every year.

What is the matter? And the reason lies in the notorious blocking of sites that have spoiled a lot of blood to domestic users. The law on the termination of access to them is working very badly: our deputies have followed the path of least resistance, deciding to limit requests for IP resources.

As a result, dozens of normal websites that hang on the same hosting sites where truly untrustworthy resources live, are undeservedly blocked. With this injustice, any anonymous browser is called upon to fight.

How can I protect my browser?

Since not everyone uses the "Torah", we will consider the process of converting the usual "Flareglass" or "Chrome" into its analogues. This is not difficult at all: since both of these browsers support the use of extensions, we will use them.

First of all, we need to install the above-mentioned FoxyProxy plug-in. What is its role? The fact is that it allows you to literally switch a browser to the use of anonymous proxies with a couple of mouse clicks. Of course, you can use the "Setup-Network" item for this, but each time you navigate through this menu is rather tedious.

In addition, the plugin allows you to encrypt the data stream. Without this, no anonymous browser can cope with its purpose.

Secondly, turning your browser into an unassailable bastion, be sure to install the Ghostery extension. This useful add-on hides the traces of your stay on the sites, and also removes the buttons of all social networks tracking "cookies" and other things that can reveal your identity when you visit a certain site.

Finally, do not forget about the NoScript installation. This plugin completely blocks all scripts that not only serve certain functions of the sites, but also expose your location.

What else?

What other ways to protect your own anonymous Internet browser from outside attacks? First of all it is necessary to use anonymous proxy servers. They guarantee you complete confidentiality when entering any Internet resource.

They can be found on relevant sites that are on any normal search service. Where should they be inserted? Let's consider this process using the example of Firefox. Click on the settings button located in the upper left corner. In the dialog box, you need to find the "Advanced" tab. There is an internal tab "Network" in which you need to click on the "Configure" button.

The "Connection Settings" dialog box appears. In it, you must enter the proxy server information in the "Manual proxy service settings" field.

How to do this in Google Chrome

In this browser, all this is no more difficult. In the right upper part of its working window there is a settings button. After clicking it, a drop-down list appears , in which you select the "Settings" item. It has a button "Change proxy server settings". In the opened window, just the same settings are entered.

Finally

Please do not consider all of the above in the context of criminal access to really pirated sites. We have already mentioned that many portals are blocked completely unjustly, just because of the imperfection of the locking mechanism.

Often it happens that even "sites" appear in "disgrace", where the process of manufacturing plastic windows or something similar is illuminated. What kind of piracy can there be? Of course, users have the right to receive information that was blocked incorrectly. And the anonymity of the browser should facilitate this.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.atomiyme.com. Theme powered by WordPress.