Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

How to surf anonymously without a trace
ComputerWorld ^ | 12 March 2007 | Preston Gralla

Posted on 03/13/2007 6:29:37 AM PDT by ShadowAce

The punchline to an old cartoon is "On the Internet, nobody knows you're a dog," but these days, that's no longer true.

It's easier than ever for the government, Web sites and private businesses to track exactly what you do online, know where you've visited, and build up comprehensive profiles about your likes, dislikes and private habits.

And with the federal government increasingly demanding online records from sites such as Google and others, your online privacy is even more endangered.

But you don't need to be a victim. There are things you can do to keep your surfing habits anonymous and protect your online privacy. So read on to find out how to keep your privacy to yourself when you use the Internet, without spending a penny.

What they know about you

Whenever you surf the Web, you leave yourself open to being snooped upon by Web sites. They can track your online travels, know what operating system and browser you're running, find out your machine name, uncover the last sites you've visited, examine your history list, delve into your cache, examine your IP address and use that to learn basic information about you such as your geographic location and more. To a great extent, your Internet life is an open book when you visit.

Sites use a variety of techniques to gather and collate this information, but the two most basic are examining your IP address and placing cookies on your PC. Matching your IP address with your cookies makes it easier for them to create personal profiles.

If you'd like to see what kind of information sites can gather about you, head to these two sites, which peer into your browser and report what they find.

Privacy Analysis of Your Internet Connection
Here's some of the information Web sites can find out about you, as reported by the Privacy Analysis of Your Internet Connection site.
(Click image to see larger view.)

Protect yourself: Surf anonymously

The best way to make sure Web sites can't gather personal information about you and your computer is to surf anonymously by using an anonymous proxy server that sits between you and the Web sites you visit.

When you use an anonymous proxy server, your browser doesn't contact a Web site directly. Instead, it tells a proxy server which Web sites you want to visit. The proxy server then contacts the Web site, and when you get the Web site's page, you don't get it directly from the site. Instead, it's delivered to you by the proxy server. In that way, your browser never directly contacts the Web server whose site you want to view. The Web site sees the IP address of the proxy server, not your PC's IP address. It can't read your cookies, see your history list or examine your clipboard and cache because your PC is never in direct contact with it. You're able to surf without a trace.

There are three primary ways to use anonymous proxy servers. You can configure your browser to use a such a server (or get software to do it for you); you can visit an "anonymizer" Web site, which does the work of contacting the server; or you can download software that will ensure your anonymity when you use the Internet. We'll look at how to do each.

Keep yourself anonymous with Tor

The best free software you can find for being anonymous when you use the Web is to use the free Tor. When you use Tor, all your communications -- not just Web surfing, but also instant messaging and other applications -- are in essence bounced around a giant network of Tor servers called "onion routers" until it's impossible for sites or people to be able to track your activities.

Setting up Tor is straightforward. Download a package that includes not just Tor, but other software you need to work with it, such as Privoxy, a proxy program. All the software is self-configuring, so you won't need to muck around with port settings or the like. Tor runs as a small icon in your system tray. To start Tor, right-click it and choose Start from the menu that appears; to stop it, right-click it and choose Stop.

Once it starts, simply use the Internet as you normally would. If you're superparanoid, you can regularly change your Tor "identity" to make it even harder for anyone to track your travels. Right-click the Tor icon, and select "New Identity." That's all it takes.

Tor also includes a nice bandwidth tool that has nothing to do with anonymity but that graphs your bandwidth use. Right-click the Tor icon, and choose Bandwidth Graph. You can see it in action, along with Tor's right-click context menu, in the nearby figure.

Firefox users will want to download the Torbutton, which will let them turn Tor on and off from directly within the browser.

I've found only one drawback to Tor: At times, I've noticed a slowdown in surfing when using it. But that comes and goes, and slowdowns aren't that extreme. So if you're worried about your privacy when you surf, it's a great bet.

Tor
Tor keeps you safe when surfing and has extras such as a bandwidth graph.
(Click image to see larger view).

Web sites that let you surf anonymously for free

A number of free Web sites offer free anonymous surfing via proxy servers. The benefits of these sites are obvious: When you surf, you're anonymous. But there are some drawbacks as well. Surfing tends to be slower -- and in some cases very slow. And when you use these Web sites, some sites you visit from them don't display properly.

The sites all work pretty much the same. Head to them, and in a box, type the Web site you want to visit. From that point on, you'll be surfing anonymously; the site does the work of using an anonymous proxy server for you.

The Cloak is one such service. It lets you customize exactly how anonymous you want to be and what surfing technologies you want to leave on or off. It goes beyond providing anonymity and can protect you in other ways -- for example, by turning off Java and JavaScript or even blocking banner ads. As you can see in the nearby screenshot, you can configure all that yourself before you start to surf.

The Cloak
Configuring anonymous surfing with the Cloak
(Click image to see larger view)

Once you do that, you type in the address you want to visit, and you're off. As you browse in your browser's address bar, you'll notice an odd URL that contains the Cloak's URL as well as the site you're visiting. For example, if you visit CNN, you'll see something like this:

http://www.the-cloak.com/Cloaked/+cfg=31/http%3A//www.cnn.com/

Note that if you want to remain anonymous during your surfing session after you visit the first Web site from The Cloak, you'll have to only click links. If you type a URL directly into the address bar, the Cloak will no longer work.

The Cloak is free, but it has some limitations. You'll surf more slowly than normally, and the slowdown may become noticeable. One reason is that the site also offers a for-pay service, and so it throttles down free users, while letting those who pay surf without a throttle. And the site may also limit the amount of time you surf anonymously as well, depending on whether many users are logged in simultaneously.

Use your browser with an anonymous proxy

If you don't like the limitations imposed on you by sites like the Cloak or would simply prefer to configure anonymous surfing yourself, you can easily set up your browser to use an anonymous proxy server to sit between you and the sites you visit.

To use an anonymous proxy server with your browser, first find an anonymous proxy server. Hundreds of free, public proxy servers are available, but many frequently go offline or are very slow. Many sites compile lists of these proxy servers, including Public Proxy Servers and the Atom InterSoft proxy server list. To find others, do a Google search.

I prefer Atom InterSoft proxy server list because it provides more information about each server. It lists server uptime percentage and the last time the server was checked to see if it was online.

Find the server with the highest percentage of uptime. Write down the server's IP address and the port it uses. For example, in the listing 24.236.148.15:80, the IP address is 24.236.148.15, and the port number is 80.

In Internet Explorer, select Tools-->Internet Options, click the Connections tab, and click the LAN Settings button. Check the "Use a proxy server for your LAN" box. In the Address field, type in the IP address of the proxy server. In the Port field, type in its port number. Check the "Bypass proxy server for local addresses" box; you don't need to remain anonymous on your local network. Click OK and then OK again to close the dialog boxes. Now when you surf the Web, the proxy server will protect your privacy. Keep in mind that proxy servers can make surfing the Web slower, depending on the proxy you're using.

Anonymity with IE
Setting up Internet Explorer to surf the Web anonymously
(Click image to see larger view.)

In Firefox, select Tools -->Advanced, click the Network tab, and click the Settings button. Choose "Manual proxy configuration," enter the proxy information (IP address and port number), and click OK and then OK again

Problems with anonymous proxy servers

If you set up your browser to use anonymous proxies, as I just outlined, you need to keep in mind that there's one potential danger: Theoretically, a hacker could set up a proxy server, and then use it to capture information about the Web sites you visit. And if you type in user names and passwords, he could steal those as well.

I haven't heard of this actually happening in the real world, but you should be aware that it's a possibility. Using software like Tor or a free proxy server like the Cloak won't expose you to this danger; only the use of public proxy servers does.

How can you protect yourself against this? Before using a proxy server, do a Google search on its name and address to see if there are any reports about hackers using it. And it's also a good idea to only use a server that you notice have been on the lists a long time, because hackers are not likely to keep a server running a long time without being caught or shutting it down.

What else you can do

There are other ways to help protect your anonymity online. If you're worried that your searches may be used by search engines or government agencies to invade your privacy or create a profile about you, see Seven ways to keep your search history private.

If you want to be able to send e-mail anonymously so that no one can find out that you sent it, you can use an anonymous remailer such as the Web-based Anonymouse's AnonEmail or the downloadable QuickSilver.

There are also plenty of for-pay anonymity services, such as the Anonymizer, and the Anonymizer's new Nyms service, which uses utilizes disposable e-mail addresses to protect your true e-mail identity.

Finally, for a very good all-around resource about how to protect your privacy online, check out the Electronic Privacy Information Center's Online Guide to Practical Privacy Tools. It has plenty of links to software and sites to help protect your privacy.


TOPICS: Computers/Internet
KEYWORDS: anonymous; applebaum; internet; jacobapplebaum; proxy; proxyserver; tor
Navigation: use the links below to view more comments.
first 1-5051-94 next last

1 posted on 03/13/2007 6:29:41 AM PDT by ShadowAce
[ Post Reply | Private Reply | View Replies]

To: rdb3; chance33_98; Calvinist_Dark_Lord; PenguinWry; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; ..

I'm flying across the country today, so I may not be able to check back today.

2 posted on 03/13/2007 6:30:40 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

BFLR


3 posted on 03/13/2007 6:39:31 AM PDT by cgk (I am emboldened by my looks to say things Republican men wouldn’t. - Ann Coulter)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

BTTT


4 posted on 03/13/2007 6:52:32 AM PDT by dashing doofus (Those who are too smart to engage in politics are punished by being governed by those who are dumber)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

book marked 4 later reading


5 posted on 03/13/2007 6:55:05 AM PDT by SouthernBoyupNorth ("For my wings are made of Tungsten, my flesh of glass and steel..........")
[ Post Reply | Private Reply | To 1 | View Replies]

Comment #6 Removed by Moderator

To: arbooz

ping


7 posted on 03/13/2007 7:02:00 AM PDT by Chickensoup (WE are the media....The New Media.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: ShadowAce

I'm already using it-but then again there's no way you could have known that, is there?


8 posted on 03/13/2007 7:12:45 AM PDT by TravisBickle (Are you talkin' to me?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Famishus

BM4L


9 posted on 03/13/2007 7:45:24 AM PDT by Famishus (North of the equator, the Death Spiral is clockwise.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Thanks for posting this interesing and useful article.


10 posted on 03/13/2007 7:49:40 AM PDT by Draco
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Thanks for posting this interesting and useful article.


11 posted on 03/13/2007 7:50:04 AM PDT by Draco
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Thank you so much for this valuable information!


12 posted on 03/13/2007 7:50:28 AM PDT by alwaysconservative (Blessed are the flexible, for they shall not get bent out of shape)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

BM4L


13 posted on 03/13/2007 7:53:44 AM PDT by KeyesPlease
[ Post Reply | Private Reply | To 2 | View Replies]

To: ShadowAce

bttt


14 posted on 03/13/2007 7:55:59 AM PDT by 1rudeboy
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Very helpful to the potential terrorist!


15 posted on 03/13/2007 8:07:06 AM PDT by Hawthorn
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Just a question. Who pays for the "free" proxy service? Is this just excess bandwidth that would otherwise go unused?


16 posted on 03/13/2007 8:13:39 AM PDT by Pete from Shawnee Mission
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Good article...

Tried all three methods--strongly recommend Tor.


17 posted on 03/13/2007 8:23:23 AM PDT by rzeznikj at stout (Boldly Going Nowhere...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

btt


18 posted on 03/13/2007 8:34:49 AM PDT by marine86297 (I'll never forgive Clinton for Somalia, my blood is on his hands)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Well done! Thank you.


19 posted on 03/13/2007 8:50:37 AM PDT by lonevoice (It's always "Apologize to a Muslim Hour"...somewhere)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce
Firefox users will want to download the Torbutton, which will let them turn Tor on and off from directly within the browser.

Just don't do it from work on your employer's computer/internet connection.

20 posted on 03/13/2007 9:01:21 AM PDT by martin_fierro (< |:)~)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

ping


21 posted on 03/13/2007 9:11:05 AM PDT by JerseyHighlander
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

I just RDP into a box in another country and surf from there.

Like if anyone checked the IP on this post, they'd be in for a bit of a "hmmf" moment :).

Furthermore, If I really want to get snarky, I turn on IPscramble in Admuncher, and fake out the referrer, browser, etc.


22 posted on 03/13/2007 9:19:12 AM PDT by Malsua
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce
I've been using the Proxomitron as a localhost proxy server for years...in addition to a NAT firewall and Outpost Pro software firewall.

Firefox also has a nice extension called Stealther that shuts off all browser logging from cache to cookies and everything else. I may give Tor a try. Sounds nice.

23 posted on 03/13/2007 9:29:26 AM PDT by Bloody Sam Roberts (Don't question faith. Don't answer lies.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

bump for later


24 posted on 03/13/2007 10:04:34 AM PDT by bobbyd (Flyer, I love and miss you...Lords best my FRiend)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

bump


25 posted on 03/13/2007 10:36:01 AM PDT by TwoSue
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

bump for later reading


26 posted on 03/13/2007 10:43:17 AM PDT by zeugma (MS Vista has detected your mouse has moved, Cancel or Allow?)
[ Post Reply | Private Reply | To 1 | View Replies]

BM


27 posted on 03/13/2007 11:54:05 AM PDT by girlscout
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

I'm not here. I'm someplace else.


28 posted on 03/13/2007 12:08:07 PM PDT by lowbridge ("Of course Americans should vote Democrat" -Jihad Jaara, senior member, Al Aqsa Martyrs Brigade)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

bump for later (at home)


29 posted on 03/14/2007 4:26:18 AM PDT by fredhead (Teach a man to fish.......and he'll fish for a lifetime.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

BTTT


30 posted on 08/25/2007 8:37:49 PM PDT by Cold Heart
[ Post Reply | Private Reply | To 1 | View Replies]

To: abbi_normal_2

*


31 posted on 08/25/2007 9:08:05 PM PDT by abbi_normal_2
[ Post Reply | Private Reply | To 25 | View Replies]

To: abbi_normal_2

Quick question, though...who’s watching Tor???


32 posted on 03/12/2009 9:38:38 PM PDT by pray4liberty (Always vote for life!)
[ Post Reply | Private Reply | To 31 | View Replies]

To: ShadowAce

BTTT!


33 posted on 07/09/2009 1:19:37 AM PDT by neverdem (Xin loi minh oi)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cindy; neverdem; TigerLikesRooster

ping


34 posted on 07/09/2009 4:19:33 PM PDT by GOPJ (Unemployed? MISSING BUSH YET?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce
Anybody naive enough to doubt that all of these are creations of the NIS.
35 posted on 07/09/2009 4:26:25 PM PDT by MilspecRob (Most people don't act stupid, they really are.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

bflr


36 posted on 07/09/2009 4:35:43 PM PDT by Clink (The more you complain, the longer God lets you live.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GOPJ

Thanks GOP J.

Interesting.

Personally, I go on the internet and figure nothing I do is private so that keeps me in check pretty much.


37 posted on 07/09/2009 7:28:08 PM PDT by Cindy
[ Post Reply | Private Reply | To 34 | View Replies]

To: ShadowAce
What's to prevent someone (or an entity) from designing and making available on the Internet an application that is advertised as being a secure and anonymous way of surfing, but which in fact is exactly the opposite: an application that painstakingly tracks Internet activity and allows a spy to extract every last shred of information from the computer and email accounts of the user?

Things aren't always what they seem to be.

Most of us have downloaded and installed software over the Internet merely on faith that the provider of the software is honest and not interested in spying. We have no way of really knowing if that's in fact the case. It seems to me that a really sophisticated and well-funded programmer or group of programmers (on a country's payroll?) could wreak all sorts of havoc and none of us would be the wiser.

Most of us likely need not worry about it. But other people might well be lucrative targets.

38 posted on 07/09/2009 7:54:18 PM PDT by behzinlea
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

thanks ,,, bump


39 posted on 07/09/2009 8:00:27 PM PDT by piroque
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

read later


40 posted on 07/09/2009 8:37:37 PM PDT by Jen
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce; AdmSmith; Berosus; bigheadfred; Convert from ECUSA; dervish; Ernest_at_the_Beach; ...

Thanks ShadowAce! Good information.


41 posted on 07/09/2009 9:11:11 PM PDT by SunkenCiv (https://secure.freerepublic.com/donate/__Since Jan 3, 2004__Profile updated Monday, January 12, 2009)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

bump


42 posted on 07/10/2009 6:04:42 AM PDT by Drew68
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cindy
I go on the internet and figure nothing I do is private...

Good assumption.

43 posted on 07/10/2009 7:32:51 AM PDT by GOPJ
[ Post Reply | Private Reply | To 37 | View Replies]

To: GOPJ

Yep, plus I know.


44 posted on 07/10/2009 12:31:01 PM PDT by Cindy
[ Post Reply | Private Reply | To 43 | View Replies]

To: ShadowAce

bttt


45 posted on 07/10/2009 12:31:53 PM PDT by TWfromTEXAS (Life is the one choice that pro choicers wonÂ’t support.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

BFL


46 posted on 01/10/2010 10:11:35 PM PST by smokingfrog (Don't mess with the mocking bird! - http://tiny.cc/freepthis)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce
Eh, thanks Mr. Hand!!

Cool!!

47 posted on 01/10/2010 10:19:36 PM PST by Osage Orange (Life, Liberty and the Pursuit of Anyone Who Threatens It)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

ping for later


48 posted on 01/11/2010 2:43:32 AM PST by Upstate NY Guy
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

later


49 posted on 01/11/2010 2:56:44 AM PST by piroque
[ Post Reply | Private Reply | To 2 | View Replies]

To: ShadowAce

I used to use ghost surf but many times internet sites wouldn’t allow me access with it for some reason. I’ll have to check out this Tor.


50 posted on 01/11/2010 3:12:17 AM PST by RC one (WHAT!!!)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-5051-94 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson