If you Like HowToVanish on Facebook then we will give you one of the $2-3 30 page Mini-Guides for free. Just send us a message on Facebook and let us know which one you want: (1) Financial, (2) Political or (3) Personal.

hansel gretel

Anonymous Web Surfing – Learn How To Protect Your Internet Privacy

by Bill Rounds Esq. on August 3, 2009

Reading time: 5 – 8 minutes

Hansel and Gretel wandered through the forest leaving tasty bread crumbs behind to find their way home. Unfortunately, the various little critters of the forest found those little bread crumbs irresistible and gobbled them up leaving Hansel and Gretel lost and hungry.

There is less anonymity on the internet than many people realize.  When people surf the web they also leave behind bread crumbs, well their IP address is left behind. And, unfortunately, those crumbs are awfully tasty to many little creatures like search engines, snoopers, and cookie monsters.

The wrong creatures getting a hold of those crumbs can leave you much more than lost and hungry if you are not careful. You may even incur tax liability of you do not properly guard your IP address.   From building a user profile to viewing sensitive data, there are many opportunities for others to benefit from knowing your IP address.  Fortunately there are ways of keeping your web surfing anonymous.

FREE PROXY SERVERS

In simple terms, anonymous web surfing is connecting to another computer that does the surfing for you and keeps your own IP address, your unique identifier, secret. There are a number of free anonymous web proxies available and each has a different user experience (for example some are slower, you may be subjected to annoying advertising, time limits, some don’t allow you to log in to sites like Facebook, etc.) so each individual should choose which is best for them.

It is a good idea to do a simple Google search to find reviews and information about particular proxy servers before using them.  One that I have found useful is Anonymouse.org.  You can even send an anonymous email from their site.

Anonymous Web Browsing

Using a proxy server is very straight forward.  Once you have searched and found a proxy server you are comfortable with using, you can either enter a URL directly into the text box which is the search prompt of the site, or you can enter the URL of your favorite web browser and begin surfing anonymously from that point.

SUBSCRIPTION SITES FOR ANONYMOUS WEB SURFING

There are also paid subscription services which may be more secure or that open a secure encrypted host service. They tend to run faster and offer more flexibility than the free sites. Those sites are often by subscription, $10US each month is typical, many of which are offered as an upgrade from a free service. We like Identity Cloaker but ….

private internet access bitcoin vpn

Bitcoins a decentralized digital currency that allows you to remain anonymous when making payments over the Internet. We even wrote a Free Bitcoin Guide that will help you understand how to use this extremely powerful tool for protecting your privacy.

This is particularly important when you buy VPN services. What good is the VPN service if it can easily be tied to your identity which is based on the credit or debit card you use to pay with? As we discuss in the guide, you can easily buy bitcoins with cash which severs the link in transactional databases between you and the bitcoins.

Plus, when you pay with bitcoins there is no need to give them a name, address, credit card number, etc. that could be compromised in the future and subject you to identity theft. So, using bitcoins shields your privacy with the transaction and protects you from identity theft in the future. Win!

Then you can use the bitcoins to pay for services like Private Internet Access, The Bitcoin Store (which sells hundreds of thousands of products often cheaper than Amazon), or an online pharmacy, etc.

And this is how you pay using bitcoins VPN service from Private Internet Access:

ANONYMIZING INTERNET SOFTWARE

In addition to the paid services is free (TOR is awesome!) or paid software that can be downloaded and can be activated any time that you are surfing the internet to block your IP address.  Some of these software are better than others, so read the reviews before using them to make sure you are getting what you want.

Although some are free of charge, they usually require some time to configure and some attention whenever you use them to make sure that you are maintaining the desired privacy.  As with any software, download it and follow the installation instructions to maximize your utility.  The paid software usually offers better customer support and usually has other desired features that you aren’t likely to find in free software.

Keep in mind that most of these options will keep your browsing anonymous for the most part, but cannot offer online invincibility, so you may still be vulnerable to an expert hacker.

CONCLUSION – USE ANONYMOUS WEB SURFING

Ultimately, the internet can be as private of a place as you want it to be.  Without taking measures to protect your anonymous browsing, your identity is displayed by your IP address to whoever might be interested, be it advertisers, search engines, governments or others.

Even more tools and techniques for creating a comprehensive plan for online privacy can be found in How To Vanish The Book.  So use handy software like Private Internet Access to become an anonymous web surfer for security, privacy, peace of mind, and yes, even for fun.

No tips yet.
Be the first to tip!

Support How To Vanish - Tip With Bitcoin

1CVQ51GACNrGGWMYqgeKwT92CjiXSAM9uw

Find this post helpful? Please consider tipping with Bitcoin. Each article gets a unique Bitcoin address so by tipping you help make How To Vanish sustainable and give valuable feedback on which content is most appreciated!

48,827 random numbersEmail Email Print Print

4 comments

ABOUT THE AUTHOR: Bill Rounds, Esq. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from California Western School of Law. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties. This is merely one article of 123 by .
Free HowToVanish Privacy Guide

{ 4 comments… read them below or add one }

1 Paul April 25, 2010 at 6:49 am

Bill, I’d like an article written specifically about computer hardware security. I heard that you should purchase a laptop instead of a desktop system, in case someone breaks in your house. You should pay cash when you purchase a computer. And you should not register any software in your name. What else am I missing? Thanks.

2 ItsASecretTeeHee April 4, 2011 at 8:06 pm

Oh My dear Paul Paul Paul. What you are missing is the answers found in the book “How To vanish” Why Even more tools and techniques for creating a comprehensive plan for online privacy can be found in How To Vanish The Book.

3 scroog June 4, 2013 at 3:25 pm

I disagree with two major principles presented in the way this site conducts business. This is a site, supposedly dedicated to anonimity in a modern world, but you are required to leave a name and emil address to leave a comment. Thus, you are leaving personal information on the internet. This should lead you to believe that they either do not know what they are doing, or that the site is a scam. To further the idea that this site is a scam, they will give you a book in exchange for a facebook message. While you might have all false information on facebook, or better yet not have one entirely, this seems like a data-mining tactic, and is indeed what many developers and businesses try to use to mine data. Thus Paul you should not buy their book. If you must read it, get it under a psuedonym through interlibrary loan.

4 sohoryan June 29, 2013 at 5:38 am

I put a question on Yahoo answers, regarding proxies, in this case I was particularly citing Firefox, Foxy proxy. The Yahoo answers community overwhelmingly agree that Proxies are a source of malware, viruses and spyware. So it is a choice between being spied on by the Government or spied on by some other criminal agency.

Leave a Comment

Previous post:

Next post: