SlideShare a Scribd company logo
1 of 23
Anonymity on the internet
Anonymity
The noun anonymity comes from a Greek word
meaning "without a name." If you have anonymity, you have
namelessness, and people will not know who you are.
Some words that are the opposite of anonymity are
"celebrity" and "fame." Sometimes people request
anonymity, as in "he phoned the police to report the break
in across the street but requested anonymity so the burglars
wouldn't know who turned of.
1
Anonymity on the Internet
applies to any interaction a
user has on the Internet that
protects his or her identity
from being shared with
another user or with a third
party. Users are able to flirt
with others while remaining
anonymous
2
There are folowing basic are below
Some people don't believe in anonymity, but without it, lives can be
ruined forever. Here's why you need online anonymity.
In fact, there are many good reasons to care about anonymity,
especially online. Being unable to keep your identity private when
necessary can cause serious problems.
Here are some reasons that you might choose to remain
anonymous on the internet, and why online anonymity is important.
Plus we'll some tips on how to protect your anonymity online.
3
4
Sometimes you just don't want anyone to know
who you really are. Even if you aren't involved in
anything illegal or questionable. There's a level of
social safety that comes with anonymity. And that
can be really important for introverts in online
communities.But more than that, imagine if you
were a celebrity of global recognition. It can be
tiresome to have paparazzi everywhere and no
room for being alone. You'd be surprised how
many well-known figures use sites like Reddit and
4chan in secret.
5
Online anonymity also plays
an important role in freedom
of expression. One of the
most amazing things about
the internet is that it can give
voices to those who are
actively being silenced. This
allows them to speak without
fear of repercussion.
6
Online harassment can manifest in many ways, including but not limited to:
Doxing: When someone releases your personal information on the internet.
This often results in invasive pranks, stalkers, and even death threats.
Swatting: When someone calls 911 and reports that you are dangerous. This
resulting in police officers busting down your door and arresting you. The police
have even shot people who were "swatted" by someone online.
Revenge Porn: When someone releases intimate photos or videos of you on
the internet without your knowledge. At best, it's a violation of privacy. At worst,
it can obliterate your reputation, your future, and even your sanity.
7
There's one other major category of
people who benefit from anonymity: those
who need more information on a given
topic but don't want to be caught seeking
out that information. Most people actually
fall into this group without realizing it.One
common example is someone who's
struggling with their sexuality, hasn't gone
public with that struggle, but has many
unvoiced questions and concerns. This
person can ask all of their questions in an
online community without revealing their
identity and risking premature exposure.
8
• We've all been in situations where we've taken our online
anonymity for granted. We'll find ourselves in many more of those
same situations as the years go by. How would you feel if every
single question of yours was tied to your real-life identity?
• This is one reason why Reddit is so popular as a hub for online
communities. You don't even have to provide an email address to
create an account, which allows people to make "throwaway"
accounts and ask or provide information without risking their
identities.
9
If you're worried about your anonymity online, there are some
practical steps you can take to protect it:
Use a VPN (Virtual Private Network)
USE TOR Browser
Proxy
Virtual Machines
DNS
Incognito mode
ad blocker sd
Secure massage apps 10
File shredder
safe search engines
safe browsers
safe chatting app
Fake emails
Service Provider
Firewall
Spam
Phone call confidentailt
Keep rotating your MAC and public IP adress 11
A VPN is one of the best
investments you can make to
protect yourself online. It works
by encrypting the data you send
over the internet. This stops
other people from being able to
see what you do online. There
are hundreds of VPN providers
you can choose from.
But avoid free VPNs as these
companies often make money
by selling off user data 12
If you want to browse the internet with as much anonymity as
possible, you should try the Tor browser. Unlike most browsers like
Google Chrome or Mozilla Firefox, Tor uses a process called onion
routing.
This is where data is passed through multiple nodes in an encrypted
format. This means you can still visit websites as usual (though they
may load a bit slower) but it's extremely difficult for anyone to track
you online
13
• The Onion Router (Tor) is a
free piece of software that
facilitates anonymous
communications and
browsing. It's a secure option
for browsing the internet, and
comes with its own browser.
• Here's how to get online
securely with the Tor browser,
and keep your activity private.
14
Alone, Tor cannot guarantee your
security and privacy; you need to
understand the best practices and
usage tips to ensure maximum
security and benefits.
15
• This use for make
anonyms on internet
• Its include 2nd party
network in between
internet server and our PC
• On this we make request
on 2nd Pc through our PC
16
• The Domain Name System (DNS) is the phonebook of the
Internet. Humans access information online through domain
names, like nytimes.com or espn.com. Web browsers interact
through Internet Protocol (IP) addresses. DNS translates domain
names to IP addresses so browsers can load Internet resources.
• Each device connected to the Internet has a unique IP address
which other machines use to find the device. DNS servers
eliminate the need for humans to memorize IP addresses such as
192.168.1.1 (in IPv4), or more complex newer alphanumeric IP
addresses such as 2400:cb00:2048:1::c629:d7a2 (in IPv6).
17
• A user types ‘example.com’ into a web
browser and the query travels into the
Internet and is received by a DNS
recursive resolver.
• The resolver then queries a DNS root
nameserver (.).
• The root server then responds to the
resolver with the address of a Top Level
Domain (TLD) DNS server (such as .com
or .net), which stores the information for its
domains. When searching for
example.com, our request is pointed
toward the .com TLD.
• The browser makes a HTTP request to the
IP address.
• The server at that IP returns the webpage
to be rendered in the browser (step 10).
• The resolver then makes a request to the
.com TLD.
• The TLD server then responds with the IP
address of the domain’s nameserver,
example.com.
• Lastly, the recursive resolver sends a query
to the domain’s nameserver.
• The IP address for example.com is then
returned to the resolver from the
nameserver.
• The DNS resolver then responds to the web
browser with the IP address of the domain
requested initially.
18
19
• Many sites let you use your Facebook or Google account to
create a new login, which is very convenient. You don't need to
create a new username or remember a new password. However,
linking your accounts from multiple sites together in this way is a
big threat to your anonymity.
• This is especially the case if you use your real name for your
Facebook or Google accounts. Instead, you should create a new
account for each site you want to use. If you're worried about
forgetting your passwords, you can use a password manager.
20
Although internet users can send messages by borrowing other user's
accounts or by forging identities, one of the most common and least
complicated ways of obtaining anonymity on the internet is by making
use of one of many anonymity services. Some of these services are
connected directly to specific newsgroups on the usenet. Other
anonymity providers are global and service the entire internet. These
anonymity servers make use of what are called "remailers", which are
basically computers on the internet that forward electronic mail or files to
other network addresses. Before the remailer forwards the information, it
strips the header from the original email so that the information showing
where the message originated is no longer attached to the email.
21
• Many anonymity services replace the header with anonymous
addresses such as nobody@nowhere. The eventual recipient of
the message then has no idea about who sent the email and
where it originated. This type of service is termed truly
anonymous. Other anonymity services use similar remailers, but
also give each user an anonymous ID, almost like a mailbox on
the server, which stores the address of the sender so that any
replies to anonymous email can be forwarded to the original
sender. This type of anonymity, called pseudonymity, allows
users to be anonymous but reachable.
22
• For users:
• Use anonymity only if you have to. Frivolous uses weaken the seriousness and usefulness of the capability for
others.
• Do not use anonymity to provoke, harass, or threaten others.
• Be aware of the policies of the anonymous site and respect them. Be prepared to forfeit your anonymity if you abuse
the privilege.[19]
• For operators:
• Document thoroughly acceptable and unacceptable uses in an introductory file that is sent to new users. Have a
coherent and consistent policy and stick to it. State clearly what logging and monitoring is occuring.
• Formulate a plan for problematic ethical situations and anticipate potentially intense moral quandaries and
dilemmas.
• Take precautions to ensure the wecurity of the server from physical and network-based attacks and infiltrations.[19]
• Require a vote either to allow or disallow anonymous posts on individual newsgroups.
• For readers:
• React to the anonymous information unemotionally. Abusive posters will be encouraged further if they get irrationally
irate responses. Sometimes the most effective response is silence.
• Notify operators if very severe abuses or criminal activity occur, such as piracy, harassment, extortion, etc.[19]
23

More Related Content

What's hot

Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018PKF Francis Clark
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comBusiness.com
 
25 Internet Terms YSK - Color
25 Internet Terms YSK - Color25 Internet Terms YSK - Color
25 Internet Terms YSK - ColorKatrina Dibbini
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internetdevashishicai
 
Bittorrent - Piracy Sailing on Web 2.0
Bittorrent - Piracy Sailing on Web 2.0Bittorrent - Piracy Sailing on Web 2.0
Bittorrent - Piracy Sailing on Web 2.0RedRyu
 
Oscon 2008 Open Micro Blogging Presentation
Oscon 2008 Open Micro Blogging PresentationOscon 2008 Open Micro Blogging Presentation
Oscon 2008 Open Micro Blogging PresentationEvan Prodromou
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerAnonDownload
 
The Deep Web -- From Spooky to Creepy
The Deep Web -- From Spooky to CreepyThe Deep Web -- From Spooky to Creepy
The Deep Web -- From Spooky to CreepyNicholas Davis
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop newforensicsnation
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshopforensicsnation
 
Online Security & Privacy: Updated
Online Security & Privacy: UpdatedOnline Security & Privacy: Updated
Online Security & Privacy: UpdatedAmanda L. Goodman
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Bruce Wolfe
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerAnonDownload
 
Web 3.0 explained with a stamp (pt I: the basics)
Web 3.0 explained with a stamp (pt I: the basics)Web 3.0 explained with a stamp (pt I: the basics)
Web 3.0 explained with a stamp (pt I: the basics)Freek Bijl
 

What's hot (17)

Security Primer
Security PrimerSecurity Primer
Security Primer
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
25 Internet Terms YSK - Color
25 Internet Terms YSK - Color25 Internet Terms YSK - Color
25 Internet Terms YSK - Color
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Bittorrent - Piracy Sailing on Web 2.0
Bittorrent - Piracy Sailing on Web 2.0Bittorrent - Piracy Sailing on Web 2.0
Bittorrent - Piracy Sailing on Web 2.0
 
Oscon 2008 Open Micro Blogging Presentation
Oscon 2008 Open Micro Blogging PresentationOscon 2008 Open Micro Blogging Presentation
Oscon 2008 Open Micro Blogging Presentation
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messenger
 
The Deep Web -- From Spooky to Creepy
The Deep Web -- From Spooky to CreepyThe Deep Web -- From Spooky to Creepy
The Deep Web -- From Spooky to Creepy
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
Online Security & Privacy: Updated
Online Security & Privacy: UpdatedOnline Security & Privacy: Updated
Online Security & Privacy: Updated
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?
 
Developer’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messengerDeveloper’s silence raises concern about surespot encrypted messenger
Developer’s silence raises concern about surespot encrypted messenger
 
Web 3.0 explained with a stamp (pt I: the basics)
Web 3.0 explained with a stamp (pt I: the basics)Web 3.0 explained with a stamp (pt I: the basics)
Web 3.0 explained with a stamp (pt I: the basics)
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 

Similar to Anonomity on Internet

Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfExtremelyDarkness2
 
How can i hide my ip on permanent basis
How can i hide my ip on permanent basisHow can i hide my ip on permanent basis
How can i hide my ip on permanent basishidemyipaddress
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
Chp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptxChp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptxAsmajaved42
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxShubhamGupta833557
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteGab Billones
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos Beretas
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5558240
 

Similar to Anonomity on Internet (20)

Web Technologies.pptx
Web Technologies.pptxWeb Technologies.pptx
Web Technologies.pptx
 
Web Technologies.pptx
Web Technologies.pptxWeb Technologies.pptx
Web Technologies.pptx
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
 
How can i hide my ip on permanent basis
How can i hide my ip on permanent basisHow can i hide my ip on permanent basis
How can i hide my ip on permanent basis
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Chp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptxChp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptx
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
ICT 2.pptx
ICT 2.pptxICT 2.pptx
ICT 2.pptx
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TE
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 

Recently uploaded

FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 

Recently uploaded (20)

FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 

Anonomity on Internet

  • 1. Anonymity on the internet Anonymity The noun anonymity comes from a Greek word meaning "without a name." If you have anonymity, you have namelessness, and people will not know who you are. Some words that are the opposite of anonymity are "celebrity" and "fame." Sometimes people request anonymity, as in "he phoned the police to report the break in across the street but requested anonymity so the burglars wouldn't know who turned of. 1
  • 2. Anonymity on the Internet applies to any interaction a user has on the Internet that protects his or her identity from being shared with another user or with a third party. Users are able to flirt with others while remaining anonymous 2
  • 3. There are folowing basic are below Some people don't believe in anonymity, but without it, lives can be ruined forever. Here's why you need online anonymity. In fact, there are many good reasons to care about anonymity, especially online. Being unable to keep your identity private when necessary can cause serious problems. Here are some reasons that you might choose to remain anonymous on the internet, and why online anonymity is important. Plus we'll some tips on how to protect your anonymity online. 3
  • 4. 4
  • 5. Sometimes you just don't want anyone to know who you really are. Even if you aren't involved in anything illegal or questionable. There's a level of social safety that comes with anonymity. And that can be really important for introverts in online communities.But more than that, imagine if you were a celebrity of global recognition. It can be tiresome to have paparazzi everywhere and no room for being alone. You'd be surprised how many well-known figures use sites like Reddit and 4chan in secret. 5
  • 6. Online anonymity also plays an important role in freedom of expression. One of the most amazing things about the internet is that it can give voices to those who are actively being silenced. This allows them to speak without fear of repercussion. 6
  • 7. Online harassment can manifest in many ways, including but not limited to: Doxing: When someone releases your personal information on the internet. This often results in invasive pranks, stalkers, and even death threats. Swatting: When someone calls 911 and reports that you are dangerous. This resulting in police officers busting down your door and arresting you. The police have even shot people who were "swatted" by someone online. Revenge Porn: When someone releases intimate photos or videos of you on the internet without your knowledge. At best, it's a violation of privacy. At worst, it can obliterate your reputation, your future, and even your sanity. 7
  • 8. There's one other major category of people who benefit from anonymity: those who need more information on a given topic but don't want to be caught seeking out that information. Most people actually fall into this group without realizing it.One common example is someone who's struggling with their sexuality, hasn't gone public with that struggle, but has many unvoiced questions and concerns. This person can ask all of their questions in an online community without revealing their identity and risking premature exposure. 8
  • 9. • We've all been in situations where we've taken our online anonymity for granted. We'll find ourselves in many more of those same situations as the years go by. How would you feel if every single question of yours was tied to your real-life identity? • This is one reason why Reddit is so popular as a hub for online communities. You don't even have to provide an email address to create an account, which allows people to make "throwaway" accounts and ask or provide information without risking their identities. 9
  • 10. If you're worried about your anonymity online, there are some practical steps you can take to protect it: Use a VPN (Virtual Private Network) USE TOR Browser Proxy Virtual Machines DNS Incognito mode ad blocker sd Secure massage apps 10
  • 11. File shredder safe search engines safe browsers safe chatting app Fake emails Service Provider Firewall Spam Phone call confidentailt Keep rotating your MAC and public IP adress 11
  • 12. A VPN is one of the best investments you can make to protect yourself online. It works by encrypting the data you send over the internet. This stops other people from being able to see what you do online. There are hundreds of VPN providers you can choose from. But avoid free VPNs as these companies often make money by selling off user data 12
  • 13. If you want to browse the internet with as much anonymity as possible, you should try the Tor browser. Unlike most browsers like Google Chrome or Mozilla Firefox, Tor uses a process called onion routing. This is where data is passed through multiple nodes in an encrypted format. This means you can still visit websites as usual (though they may load a bit slower) but it's extremely difficult for anyone to track you online 13
  • 14. • The Onion Router (Tor) is a free piece of software that facilitates anonymous communications and browsing. It's a secure option for browsing the internet, and comes with its own browser. • Here's how to get online securely with the Tor browser, and keep your activity private. 14
  • 15. Alone, Tor cannot guarantee your security and privacy; you need to understand the best practices and usage tips to ensure maximum security and benefits. 15
  • 16. • This use for make anonyms on internet • Its include 2nd party network in between internet server and our PC • On this we make request on 2nd Pc through our PC 16
  • 17. • The Domain Name System (DNS) is the phonebook of the Internet. Humans access information online through domain names, like nytimes.com or espn.com. Web browsers interact through Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so browsers can load Internet resources. • Each device connected to the Internet has a unique IP address which other machines use to find the device. DNS servers eliminate the need for humans to memorize IP addresses such as 192.168.1.1 (in IPv4), or more complex newer alphanumeric IP addresses such as 2400:cb00:2048:1::c629:d7a2 (in IPv6). 17
  • 18. • A user types ‘example.com’ into a web browser and the query travels into the Internet and is received by a DNS recursive resolver. • The resolver then queries a DNS root nameserver (.). • The root server then responds to the resolver with the address of a Top Level Domain (TLD) DNS server (such as .com or .net), which stores the information for its domains. When searching for example.com, our request is pointed toward the .com TLD. • The browser makes a HTTP request to the IP address. • The server at that IP returns the webpage to be rendered in the browser (step 10). • The resolver then makes a request to the .com TLD. • The TLD server then responds with the IP address of the domain’s nameserver, example.com. • Lastly, the recursive resolver sends a query to the domain’s nameserver. • The IP address for example.com is then returned to the resolver from the nameserver. • The DNS resolver then responds to the web browser with the IP address of the domain requested initially. 18
  • 19. 19
  • 20. • Many sites let you use your Facebook or Google account to create a new login, which is very convenient. You don't need to create a new username or remember a new password. However, linking your accounts from multiple sites together in this way is a big threat to your anonymity. • This is especially the case if you use your real name for your Facebook or Google accounts. Instead, you should create a new account for each site you want to use. If you're worried about forgetting your passwords, you can use a password manager. 20
  • 21. Although internet users can send messages by borrowing other user's accounts or by forging identities, one of the most common and least complicated ways of obtaining anonymity on the internet is by making use of one of many anonymity services. Some of these services are connected directly to specific newsgroups on the usenet. Other anonymity providers are global and service the entire internet. These anonymity servers make use of what are called "remailers", which are basically computers on the internet that forward electronic mail or files to other network addresses. Before the remailer forwards the information, it strips the header from the original email so that the information showing where the message originated is no longer attached to the email. 21
  • 22. • Many anonymity services replace the header with anonymous addresses such as nobody@nowhere. The eventual recipient of the message then has no idea about who sent the email and where it originated. This type of service is termed truly anonymous. Other anonymity services use similar remailers, but also give each user an anonymous ID, almost like a mailbox on the server, which stores the address of the sender so that any replies to anonymous email can be forwarded to the original sender. This type of anonymity, called pseudonymity, allows users to be anonymous but reachable. 22
  • 23. • For users: • Use anonymity only if you have to. Frivolous uses weaken the seriousness and usefulness of the capability for others. • Do not use anonymity to provoke, harass, or threaten others. • Be aware of the policies of the anonymous site and respect them. Be prepared to forfeit your anonymity if you abuse the privilege.[19] • For operators: • Document thoroughly acceptable and unacceptable uses in an introductory file that is sent to new users. Have a coherent and consistent policy and stick to it. State clearly what logging and monitoring is occuring. • Formulate a plan for problematic ethical situations and anticipate potentially intense moral quandaries and dilemmas. • Take precautions to ensure the wecurity of the server from physical and network-based attacks and infiltrations.[19] • Require a vote either to allow or disallow anonymous posts on individual newsgroups. • For readers: • React to the anonymous information unemotionally. Abusive posters will be encouraged further if they get irrationally irate responses. Sometimes the most effective response is silence. • Notify operators if very severe abuses or criminal activity occur, such as piracy, harassment, extortion, etc.[19] 23