Mutt
Professional
- Messages
- 1,459
- Reaction score
- 1,105
- Points
- 113

All information is provided for informational purposes only and does not call for action.
Data protection on the Internet is one of the pressing issues. We spend more and more time on the Internet and leave more and more personal information there. This information can be used by intruders. And although there is no way to completely hide the fact of your presence on the Internet, you can seriously complicate the process of collecting information about you.
Ways to stay anonymous online
Proxy
A proxy is a server that acts as an intermediary between a small local network and the Internet. Many internet users rely on proxies to hide IP addresses or access region-restricted content. Most proxy services are free, but there are paid proxies as well.
Tor
Tor is free and open source software for the implementation of the second generation of the so-called onion routing. It is a proxy server system that allows you to establish an anonymous network connection, protected from eavesdropping.
VPN
VPN is an anonymous surfing service that allows you to hide your real IP address and encrypt Internet traffic so that no one can spy on you. Because of its ease of use, a VPN is considered one of the most popular anonymous surfing methods.
Encrypting messages
Information leakage is one of the most common online privacy issues. To maintain the confidentiality of your data and correspondence, install an application where messages are encrypted end-to-end.
Use encrypted email
Of course, services like Gmail or Yandex.Mail will not be able to provide anonymity. Among the alternatives: Tutanota is a fully encrypted mailbox application. Another option is ProtonMail. The service offers encrypted email accounts and does not require any personal information when creating an account. However, the free plan offers only 500 MB for storing emails.
Disable geolocation
Almost all social networks or sites like Google track your device's location. While they use this information to provide more personalized services, it is clear that partners also have access to this information. And it's not a fact that third-party servers are protected from hacking.
Check access levels in mobile applications
Almost every application on your mobile device asks for permission to access at least one of your smartphone's functions. While this will be justified in most cases, applications can be overly intrusive at times. For example, sometimes applications require you to show your location in real time, access to your photos, or even your contact list.
Cryptocurrencies
Anonymity is considered one of the defining characteristics of a cryptocurrency: to complete transactions, the user does not need to provide his personal data. So, in the bitcoin blockchain, not the names and surnames of the senders are recorded, but the digital addresses of wallets and the amount of items sent.
10 programs to ensure anonymity
STZBlaster
Program to change PC name, host, processor ID, HDD volume, MAC adress and more. Also in the program, you can additionally change the regional settings. The only thing I want to note is that you should not trust her to change the MAC.
RMOSChange.exe
The program changes the HTTP headers of popular browsers. The essence of the program and why is it needed? Firstly, if scripts are enabled, data such as browser version, browser language, user-agent, OS are transmitted. Wouldn't it be strange if we access the shell from a Russian browser, but via American socks \ ssh? Secondly, if you use the Pindossian Dedicated Server \ Soks \ Vpn, then you need to change the settings for IE, because there it is the most popular browser. Why this is necessary, I think, is not worth telling.
SMAC 2.0
The program spoofs the MAC address of the network card. You can change the MAC addresses once a month and everything will be ok.
Privacy Suite Main Menu
We encrypt and hide our container already created by TrueCrypt in jpg, wav files. You can also create a safe. Another indisputable plus of this software is that it irrevocably destroys files. You can also encrypt to a USB flash drive.
TrueCrypt
I think this is the best data encryption software.
Proxifier
Simple proxy. It is possible to specify the application that needs to be oxidized.
OpenVPN GUI
OpenVPN client, needed to connect to a vpn server.
VPSProxy
The essence of the program is that we use flooded gates for shells \ hosting \ servers, like socks. The key feature of the software is that the incoming and outgoing gate is constantly changing. Use only over vpn / ssh.
VMware workstation
The most popular system virtualization software. If you have scripts enabled in your browser (which is needed for shells), then together with ip, dns, etc. the language of the OS is also transmitted. The scheme is simple, we put the cook, then we buy a backdoor patch for the cook, or we use the one in the public one (if you find a patch without a virus, then you're in luck). We take and throw all the gray software on the cook. If you sense that something is amiss, then use the three Privacy Suite and format it in NTFS with some program.
O&O SafeErase
A program you can trust to permanently delete files.
This is the minimum set of software that should be available to everyone who is engaged in dashing things, even if not very dirty.