How to avoid being tracked online
Posted on 20 Jul 2012 at 16:52
Danvers Baillieu, COO of the firm, told PC Pro that it collects only the name a user supplied, how he or she paid, and the time a user logs in and out – but has to pass it over if required by UK authorities.
According to EFF’s Schoen, most VPNs are paid-for, making the subscriber easy to identify: the name is on the credit card. Second, the VPN itself can see the traffic.
“With a VPN, you’ve essentially moved the ability to intercept or spy on your communications from your local network and ISP to other service providers,” says Schoen. “In a sense, it just moves the problem from one place to another.”
With a VPN, you’ve essentially moved the ability to intercept or spy on your communications from your local network and ISP to other service providers
That doesn’t mean VPNs are useless: one with routers based in a different country can bypass local censorship or site-blocking, but users need to be aware the system has limits – and find out what data a company collects before signing up.
Many firms are aware of the potential weaknesses, so hold their servers in countries that don’t require logs; services such as Air VPN and Cryptocloud told P2P-watching site TorrentFreak that they don’t keep data on user activity, so can’t hand it over.
There’s a more comprehensive means of covering your tracks online: Tor – the onion router. It takes content and wraps it in an encrypted envelope with routing instructions. A web query, for example, is sent via three places, so the website or network provider can’t see where the traffic is coming from. “Tor separates who you are from where you’re going,” says Andrew Lewman, Tor’s executive director.
To use it, simply download the Tor Browser Bundle, and surf from the Tor version of the Firefox browser: it includes the HTTPS Everywhere extension, so content is encrypted inside the encrypted routing envelope.
It doesn’t mean you’re invisible, however. Lewman related an example of an abused woman who used Tor to access a victim support forum hosted on Facebook. As soon as she logged into Facebook, that site knew who she was – a fact she didn’t realise.
“Once you log in, Facebook knows who you are; it just doesn’t know where you are in the world.” While this may seem of little use to us, it gives people banned from accessing a site via their IP address a way to log in, such as when activists from Iran used Tor to access the social network.
The main downside to Tor is frustratingly slow browsing. “Your traffic is likely bouncing across oceans and going all over the world,” says Lewman. “It takes time. If your first relay is in Japan, your second is in Argentina, the third relay is in Germany, and you’re sitting in the UK, it means your traffic has to traverse the world three times, every time.”
Your traffic is likely bouncing across oceans and going all over the world
While Tor has 3,000 relays through which to divert traffic, the system has been downloaded 36 million times in the past year alone, with between half a million and a million users a day. “That scale, between 3,000 relays, means some really busy relays,” he says. To help out, you can either set up your own relay or donate to groups running them.
There are three types of relays: “bridges” to help people in heavily censored countries access the Tor network, plus non-exit and exit relays. “A non-exit relay can be either the first or the second hop of those three. As someone running a relay, all you’ll see is encrypted traffic coming and going,” says Lewman.
Interesting but why?
I found this an interesting read. But I'm struggling to find a legitamate reason for needing to do it. Are there any?
By NR5674 on 23 Jul 2012
For more details about purchasing this feature and/or images for editorial usage, please contact Jasmine Samra on firstname.lastname@example.org
- Google I/O live stream and blog: how to watch 2014 Google I/O keynote speech live
- Google testing its own domain registration service
- Adobe announces first hardware: Adobe Ink and Slide
- Vote now in the PC Pro Excellence Awards 2014!
- What’s new in OS X 10.10? Apple Yosemite’s new features
- Samsung Z Tizen phone helps loosen ties with Android
- Microsoft rumoured to launch smartwatch this summer
- LG G3 launched: LG takes the wraps off smartphone that offers “more with less effort”
- LG G3 launch live video stream and blog: as it happened
- Apple fixes iMessage lock-in for Android switchers
- How Google Glass ruined my lunch hour
- Smartphone battery packs: can a USB power pack beat the festival battery blues?
- Windows Easy Transfer – not so "easy" in Windows 8.1
- Formula 1: what a difference virtualisation makes
- Office of the future: comfy chairs and tablets everywhere
- I went to Glastonbury and the only thing that got high was my smartphone
- Meet the robots helping teach children
- PaperLater: would you pay to print the internet?
- Amazon vs Kobo: how much to make the ebook switch?
- Phishing emails: how I nearly got caught out