It frustrating to know that when you surf the Internet, the computer leaves traces. Indeed, when one connects to a site, the computer is identified by its IP address stored by the remote site and all sites displaying banners or dynamic content on the site. In addition, cookies used by sites, are small files used to store the preferences of the user throughout the session, particularly the data entered by the user in various forms. If they originally used to customize the browser, these cookies can be used to store information for commercial purposes, including to sell your email address (spam case) or your browsing habits and consumption sites profiling. There are ways to limit those risks, along with other constraints and that's what this tip is all about:
Principle of Internet browsing
When browsing the Internet, the computer uses a unique address called an IP address, allowing remote web servers to respond. For most users, the IP address is provided by the ISP and will change or not at each new connection to the Internet. Each connection to a remote site, it keeps logs (log files) linking to your IP address pageviews. Similarly, your ISP keeps a log of your connections and can therefore maintain a correspondence between you (with your real coordinates Subscriber), IP address and web pages viewed. It is virtually impossible to falsify its IP address, while viewing web pages, because you do not receive the web pages delivered by the remote site.
Principle of anonymous surfing
The only way to make use of anonymous surfing is to go through an intermediary server that connects to websites that you visit (it will act like a cache). This server is called agent or proxy. The only limitations of this system are the constraints of an intermediary:
- Connection time takes longer, because the packet must travel from your computer to the proxy, then from proxy to the website, then the same thing in return and the processing time by the proxy server itself!
- Security constraints, no one knows who is behind this proxy and if the data traveling through the intermediary will not be intercepted and maliciously reused.
There are several ways to surf anonymously:
- Using the services of an anonymous website.
- Using software.
Websites for anonymous browsing
The main sites anonymous surfing include:
The main software for anonymous browsing:
- Torpark, a derivative of the portable version of the popular web-browser Mozilla Firefox set to use a network of routers, called "onion rings" for the random exchange of encrypted data to cover their tracks.
- Download Torpark
- JAP (Java Anon Proxy) is a multi-platform tool developed in Java, to manage a list of proxies in cascades, namely a list of servers acting as an intermediary to ensure that the user stays anonymous.
This document, titled « Anonymous web browsing », is available under the Creative Commons
license. Any copy, reuse, or modification of the content should be sufficiently credited to CCM