Before we look at techniques that allow you to browse the Internet anonymously, we should take a moment to answer the question why someone would want to do so in first place.
Why would someone with no illegal intention want to browse anonymously at all? I can think of lots of reasons, here are a few:
Hope that's settled now. Let us start with the methods and technology to stay anonymous.
Before I start I would like to remind you to use common sense as well. It does not help you if you use a proxy to post on a message board but use your real identity there. The same principle is valid for all other means of communication. Don't mention information about you that someone else could use to track you down.
I will discuss the following methods to stay anonymous on the internet: a) web proxies, b) proxies, c) tunneling software, d) cookies, spyware and the like.
Update: VPN added to the list of options
A VPN, or virtual private network, is basically another computer system that your traffic gets routed through. Most VPN services are paid, but there are some free ones available but those are usually limited.
The server you connect to using VPN software sits between your device and the Internet. Any service or site you access interacts only with the VPN and not with your computer directly; this means that these sites and services don't interact with your device's IP address but with that of the VPN server.
Downsides to using VPNs are that you have to pay usually to use them (and figure out a way to make the payment).
Check out the VPN Comparison chart for information on many VPN services.
Web proxies are a great way to stay anonymous with almost no work required on your side. You open the url of the web proxy, enter the url you want to visit and visit the site you want to visit using the IP of the web proxy. Easy and fast method that has some problems as well.
First, it might not support all scripts that the site you want to visit uses.This does not necessarily has to be a problem, as it may only affect the site's design or a functionality you do not use at all. Sometimes however it may render features of the site useless so that you can't use it for whatever activity you want it to use. If that's the case try different web proxy server.
The servers can easily be blocked by a firewall or other means of blocking scripts / urls. If that is the case you can try and setup your own web proxy. All you need is web space that supports php / cgi. You then have the advantage that only you or a few people know about this proxy and it's less likely that it will be banned. You can try cgi proxy or php proxy or search the web for more scripts.
Another disadvantage of web proxies is that you don't know usually who operates them. This is a problem, especially since you don't know whether logs are kept or if your activities are logged.
Unlike web proxies, proxies are mere IP addresses that route your request to the destination. The important factor if a proxy can be used to hide your identity is if it spills your IP. It does not make sense to use a proxy to stay anonymous if the destination sees your IP and not the proxy IP.
That means you will have to check proxies before you are using them. A program that does this is charon by my friend rhino. It checks the proxies for speed and anonymity. Now, all is left is to add the proxy to your browser and check a site for your IP. If it shows the IP of the proxy you are surfing anonymously. Beware that certain scripts and plugins, like Java, are may still reveal your real IP to the server you are connected to even if you are using a proxy.
Firefox has some great proxy extensions like Proxy Switcher. You probably would like to know where you get the proxies that you check in Charon? You can perform searches for proxy lists, visit irc or scan for yourself for example.
Proxies have a big problem. If one monitors the proxy one does know what anyone who uses the proxy is doing. It's a good idea to use a proxy server that is not located in your home country. The US government will have problems asking a North Korean proxy server owner for their server log or access to it. It's not likely that this is ever going to happen, but still possible.
But, the possibility exists and it's always good to be on the safe side. Tunneling tools allow you to use software on your computer that do not support proxies in first place so that they can be used with proxies. Some simply require you to enter a proxy in the tunneling software and you are free to go, others encrypt your data transfer and route if through several servers to make sure no one is able to find out about the source and destination and the data itself.
Cookies, spyware and the like
This should be common sense but I thought I add it anyway to the article. Other tracking methods exist that do not rely on the IP address. This includes cookies for instance: take a look at the excellent wikipedia article about cookies if you want to find out more about cookies.
Spyware is another threat that may track your movement on the Internet: make sure you scan your system regularly with up to date security software such as Spybot Search and Destroy or Malwarebytes Anti-Malware.
Advertising revenue is falling fast across the Internet, and independently-run sites like Ghacks are hit hardest by it. The advertising model in its current form is coming to an end, and we have to find other ways to continue operating this site.
We are committed to keeping our content free and independent, which means no paywalls, no sponsored posts, no annoying ad formats or subscription fees.
If you like our content, and would like to help, please consider making a contribution:
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.