1. Anonymity on the internet
Anonymity
The noun anonymity comes from a Greek word
meaning "without a name." If you have anonymity, you have
namelessness, and people will not know who you are.
Some words that are the opposite of anonymity are
"celebrity" and "fame." Sometimes people request
anonymity, as in "he phoned the police to report the break
in across the street but requested anonymity so the burglars
wouldn't know who turned of.
1
2. Anonymity on the Internet
applies to any interaction a
user has on the Internet that
protects his or her identity
from being shared with
another user or with a third
party. Users are able to flirt
with others while remaining
anonymous
2
3. There are folowing basic are below
Some people don't believe in anonymity, but without it, lives can be
ruined forever. Here's why you need online anonymity.
In fact, there are many good reasons to care about anonymity,
especially online. Being unable to keep your identity private when
necessary can cause serious problems.
Here are some reasons that you might choose to remain
anonymous on the internet, and why online anonymity is important.
Plus we'll some tips on how to protect your anonymity online.
3
5. Sometimes you just don't want anyone to know
who you really are. Even if you aren't involved in
anything illegal or questionable. There's a level of
social safety that comes with anonymity. And that
can be really important for introverts in online
communities.But more than that, imagine if you
were a celebrity of global recognition. It can be
tiresome to have paparazzi everywhere and no
room for being alone. You'd be surprised how
many well-known figures use sites like Reddit and
4chan in secret.
5
6. Online anonymity also plays
an important role in freedom
of expression. One of the
most amazing things about
the internet is that it can give
voices to those who are
actively being silenced. This
allows them to speak without
fear of repercussion.
6
7. Online harassment can manifest in many ways, including but not limited to:
Doxing: When someone releases your personal information on the internet.
This often results in invasive pranks, stalkers, and even death threats.
Swatting: When someone calls 911 and reports that you are dangerous. This
resulting in police officers busting down your door and arresting you. The police
have even shot people who were "swatted" by someone online.
Revenge Porn: When someone releases intimate photos or videos of you on
the internet without your knowledge. At best, it's a violation of privacy. At worst,
it can obliterate your reputation, your future, and even your sanity.
7
8. There's one other major category of
people who benefit from anonymity: those
who need more information on a given
topic but don't want to be caught seeking
out that information. Most people actually
fall into this group without realizing it.One
common example is someone who's
struggling with their sexuality, hasn't gone
public with that struggle, but has many
unvoiced questions and concerns. This
person can ask all of their questions in an
online community without revealing their
identity and risking premature exposure.
8
9. • We've all been in situations where we've taken our online
anonymity for granted. We'll find ourselves in many more of those
same situations as the years go by. How would you feel if every
single question of yours was tied to your real-life identity?
• This is one reason why Reddit is so popular as a hub for online
communities. You don't even have to provide an email address to
create an account, which allows people to make "throwaway"
accounts and ask or provide information without risking their
identities.
9
10. If you're worried about your anonymity online, there are some
practical steps you can take to protect it:
Use a VPN (Virtual Private Network)
USE TOR Browser
Proxy
Virtual Machines
DNS
Incognito mode
ad blocker sd
Secure massage apps 10
11. File shredder
safe search engines
safe browsers
safe chatting app
Fake emails
Service Provider
Firewall
Spam
Phone call confidentailt
Keep rotating your MAC and public IP adress 11
12. A VPN is one of the best
investments you can make to
protect yourself online. It works
by encrypting the data you send
over the internet. This stops
other people from being able to
see what you do online. There
are hundreds of VPN providers
you can choose from.
But avoid free VPNs as these
companies often make money
by selling off user data 12
13. If you want to browse the internet with as much anonymity as
possible, you should try the Tor browser. Unlike most browsers like
Google Chrome or Mozilla Firefox, Tor uses a process called onion
routing.
This is where data is passed through multiple nodes in an encrypted
format. This means you can still visit websites as usual (though they
may load a bit slower) but it's extremely difficult for anyone to track
you online
13
14. • The Onion Router (Tor) is a
free piece of software that
facilitates anonymous
communications and
browsing. It's a secure option
for browsing the internet, and
comes with its own browser.
• Here's how to get online
securely with the Tor browser,
and keep your activity private.
14
15. Alone, Tor cannot guarantee your
security and privacy; you need to
understand the best practices and
usage tips to ensure maximum
security and benefits.
15
16. • This use for make
anonyms on internet
• Its include 2nd party
network in between
internet server and our PC
• On this we make request
on 2nd Pc through our PC
16
17. • The Domain Name System (DNS) is the phonebook of the
Internet. Humans access information online through domain
names, like nytimes.com or espn.com. Web browsers interact
through Internet Protocol (IP) addresses. DNS translates domain
names to IP addresses so browsers can load Internet resources.
• Each device connected to the Internet has a unique IP address
which other machines use to find the device. DNS servers
eliminate the need for humans to memorize IP addresses such as
192.168.1.1 (in IPv4), or more complex newer alphanumeric IP
addresses such as 2400:cb00:2048:1::c629:d7a2 (in IPv6).
17
18. • A user types ‘example.com’ into a web
browser and the query travels into the
Internet and is received by a DNS
recursive resolver.
• The resolver then queries a DNS root
nameserver (.).
• The root server then responds to the
resolver with the address of a Top Level
Domain (TLD) DNS server (such as .com
or .net), which stores the information for its
domains. When searching for
example.com, our request is pointed
toward the .com TLD.
• The browser makes a HTTP request to the
IP address.
• The server at that IP returns the webpage
to be rendered in the browser (step 10).
• The resolver then makes a request to the
.com TLD.
• The TLD server then responds with the IP
address of the domain’s nameserver,
example.com.
• Lastly, the recursive resolver sends a query
to the domain’s nameserver.
• The IP address for example.com is then
returned to the resolver from the
nameserver.
• The DNS resolver then responds to the web
browser with the IP address of the domain
requested initially.
18
20. • Many sites let you use your Facebook or Google account to
create a new login, which is very convenient. You don't need to
create a new username or remember a new password. However,
linking your accounts from multiple sites together in this way is a
big threat to your anonymity.
• This is especially the case if you use your real name for your
Facebook or Google accounts. Instead, you should create a new
account for each site you want to use. If you're worried about
forgetting your passwords, you can use a password manager.
20
21. Although internet users can send messages by borrowing other user's
accounts or by forging identities, one of the most common and least
complicated ways of obtaining anonymity on the internet is by making
use of one of many anonymity services. Some of these services are
connected directly to specific newsgroups on the usenet. Other
anonymity providers are global and service the entire internet. These
anonymity servers make use of what are called "remailers", which are
basically computers on the internet that forward electronic mail or files to
other network addresses. Before the remailer forwards the information, it
strips the header from the original email so that the information showing
where the message originated is no longer attached to the email.
21
22. • Many anonymity services replace the header with anonymous
addresses such as nobody@nowhere. The eventual recipient of
the message then has no idea about who sent the email and
where it originated. This type of service is termed truly
anonymous. Other anonymity services use similar remailers, but
also give each user an anonymous ID, almost like a mailbox on
the server, which stores the address of the sender so that any
replies to anonymous email can be forwarded to the original
sender. This type of anonymity, called pseudonymity, allows
users to be anonymous but reachable.
22
23. • For users:
• Use anonymity only if you have to. Frivolous uses weaken the seriousness and usefulness of the capability for
others.
• Do not use anonymity to provoke, harass, or threaten others.
• Be aware of the policies of the anonymous site and respect them. Be prepared to forfeit your anonymity if you abuse
the privilege.[19]
• For operators:
• Document thoroughly acceptable and unacceptable uses in an introductory file that is sent to new users. Have a
coherent and consistent policy and stick to it. State clearly what logging and monitoring is occuring.
• Formulate a plan for problematic ethical situations and anticipate potentially intense moral quandaries and
dilemmas.
• Take precautions to ensure the wecurity of the server from physical and network-based attacks and infiltrations.[19]
• Require a vote either to allow or disallow anonymous posts on individual newsgroups.
• For readers:
• React to the anonymous information unemotionally. Abusive posters will be encouraged further if they get irrationally
irate responses. Sometimes the most effective response is silence.
• Notify operators if very severe abuses or criminal activity occur, such as piracy, harassment, extortion, etc.[19]
23