The Belarusian authorities are systematically tracked down regime disgruntled through the Internet . Often it is enough to know the IP-address of the computer from network of which goes "objectionable" content. What to do?
Several opposition moderators communities in social networks were detained in Minsk on August 30. The experience of other countries in which the opponents of the regime are being repressed, shows that online activists hide their real names for reasons of security. In this case, the alias is usually enough - after evaluating the IP-address, the security forces can easily find the owner of the account. For those who want to avoid such trouble, we offer some practical advice.
There are many ways to hide or anonymize IP-address of your computer. The most appropriate option depends on three factors: special technical qualification, installing a software on your computer and speed connection. In addition, it is important to realize the risks. For example, in some countries, the use of Web proxy is prohibited by law.
New email address
Do not use your primary email address to register on social networking or blogging platforms. First, you probably have "inherited" them on the web. For example, by making a purchase at the online store, you will surely have indicated not only in your email address and real name, home or work address. Second, if you use a local mail host, the law enforcement agencies will not be difficult to find out from your ISP's IP-address.
But it is extremely difficult to get this information from a foreign hosting provider. International organization "Reporters without Borders" in its memo "How to blog anonymously" specifically recommends hushmail.com and gmail.com. Both mail service by default encrypt traffic, so keep track of what and who sends the user is almost impossible.
Anonymous Proxy Server
If you go to the Web from your home computer, it's best to do it through an anonymous proxy. List of free proxy servers can be found, for example, at: publicproxyservers.com . Another way - to drive in the search box Google the phrase "proxy server high anonymity".
Most of the proposed sites are English-speaking, but it is easily to navigate. It is nough to enter in the search box the URL-address of the desired resource. As result you’ll get access to the resource, but your Internet provider that does not "see" it.
But he sees that you have opened a website offering services anonymization. Another minus is a slow connection, because your request goes first to the server located abroad, and then back to you.
Anonymous network connection
If you have the ability and expertise to install the software on your computer, we recommend you to download the so-called multi-layered, or onion router - TOR (The Onion Router). First, you will no longer depend on the availability of Web resources that offer anonymization. Second, TOR provides the highest degree of confidentiality.
When a user sends a request from your computer, it goes through a chain of three randomly selected proxy servers, and before sending the data packet is encrypted with three keys. Each of the three nodes stands for the upper shell and passed on.
TOR program can be downloaded at: torproject.org
If the address is blocked, then the web can easily find a copy of this resource. To do this, type in a search string "onion routing".
TOR also offers a "mobile" version - Xero Bank Browser, you can install on USB-drive and use, for example, in an Internet cafe. It's enough to run the file xB-Browser.exe.
TOR automatically updates a chain of proxy servers every ten minutes, so typing long messages or blog posts better in a text editor, not in a browser window.
Liked this post? Why not to Subscribe to Hide IP Soft by Email for FREE
There are many ways to hide or anonymize IP-address of your computer. The most appropriate option depends on three factors: special technical qualification, installing a software on your computer and speed connection. In addition, it is important to realize the risks. For example, in some countries, the use of Web proxy is prohibited by law.
New email address
Do not use your primary email address to register on social networking or blogging platforms. First, you probably have "inherited" them on the web. For example, by making a purchase at the online store, you will surely have indicated not only in your email address and real name, home or work address. Second, if you use a local mail host, the law enforcement agencies will not be difficult to find out from your ISP's IP-address.
But it is extremely difficult to get this information from a foreign hosting provider. International organization "Reporters without Borders" in its memo "How to blog anonymously" specifically recommends hushmail.com and gmail.com. Both mail service by default encrypt traffic, so keep track of what and who sends the user is almost impossible.
Anonymous Proxy Server
If you go to the Web from your home computer, it's best to do it through an anonymous proxy. List of free proxy servers can be found, for example, at: publicproxyservers.com . Another way - to drive in the search box Google the phrase "proxy server high anonymity".
Most of the proposed sites are English-speaking, but it is easily to navigate. It is nough to enter in the search box the URL-address of the desired resource. As result you’ll get access to the resource, but your Internet provider that does not "see" it.
But he sees that you have opened a website offering services anonymization. Another minus is a slow connection, because your request goes first to the server located abroad, and then back to you.
Anonymous network connection
If you have the ability and expertise to install the software on your computer, we recommend you to download the so-called multi-layered, or onion router - TOR (The Onion Router). First, you will no longer depend on the availability of Web resources that offer anonymization. Second, TOR provides the highest degree of confidentiality.
When a user sends a request from your computer, it goes through a chain of three randomly selected proxy servers, and before sending the data packet is encrypted with three keys. Each of the three nodes stands for the upper shell and passed on.
TOR program can be downloaded at: torproject.org
If the address is blocked, then the web can easily find a copy of this resource. To do this, type in a search string "onion routing".
TOR also offers a "mobile" version - Xero Bank Browser, you can install on USB-drive and use, for example, in an Internet cafe. It's enough to run the file xB-Browser.exe.
TOR automatically updates a chain of proxy servers every ten minutes, so typing long messages or blog posts better in a text editor, not in a browser window.
Liked this post? Why not to Subscribe to Hide IP Soft by Email for FREE
No comments:
Post a Comment