How Net Anonymity Works?

In practice, most of internet anonymous services are only exposing your net identity in a different manner, even more obvious and only in a noisier way!

Long story short, if your are concerned about so-called ‘Privacy‘, do Not rely on popular techniques and tools of net anonymity!

When you connect to a (Anonymous) VPN service to hide your real IP address, either free or paid, you just enter a private smaller, easier to monitor (of course does not necessary mean ‘eavesdropping’), easier to track part of the larger internet.

Do solutions like VPN really hide our net presence, or they only change our internet footprint exposure to an exclusive state?

That simply means, tracing back to you with each single element of your online movement bound and an integral part to your identity, aka ‘your unique online presence’ and your internet footprint or online signature, is much more easier and precise. Even not considering the fact, that no one can stay 100% hidden forever, or being naturally born hidden, which means you already have some (a lot of) footprint on larger public internet, and now with browsing for example via a private IP, you just consciously connect the dots for data brokers. This is not a fiction and it is actually happening practically when dealing with browser cache, cookies and many other server and client-side elements of your online activity.

Net Anonymity services simply change the scope of your identity exposure to a exclusive, limited and restricted environment which leads to a highly precise identification and a better, realistic version of your internet footprint!

The real Net anonymity is not achievable via popular online services. However, there are certain techniques which can be implemented via free simple tools on a paid dedicated hosting, within an small community, for example your family, or your friends. In a nutshell, it is technically possible to have practical and reasonable anonymous internet identity only via a private entity with a limited restricted ownership:

Get a dedicated physical server online, or set it up with dynamic DNS on your current home internet connection, setup a few application to mimic a fast HTTP and SOCK proxy and then route your peers via VPN or P2P protocols to real world. in this case, the footprint would belong to only that small community, and ‘retain’ and accessible only within that P2P network. With certain techniques, you can send and receive communication completely untraceable to individuals. This can be accomplished if you have an IT guru nearby.

Kaveh Mofidi

By Kaveh Mofidi

I find simple solutions for complex problems. While I enjoy working with information security and computers, our challenges extend far beyond securing data. The real task is to discover solutions for unlimited clean energy, drinkable water, and addressing the root causes of hunger, war, and injustice. Our primary goal should be to keep our planet livable; that is the true challenge we face on Earth!

Leave a comment