Endpoint

1/26/2017
04:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

How to Stay Truly Anonymous Online in 2017

NordVPN gives advice on how to enhance your anonymity online.

January 13, 2017. Online security is becoming a bigger issue than ever, as 2016 seemingly brought one of the worst years ever when it comes to staying secure and private online. 2017 is not promising to be any better, considering increasingly restrictive surveillance laws are being passed around the world and authoritarian regimes are increasingly censoring the Internet.

When it comes to using public Wi-Fi, and especially managing financial transactions,  it’s known that it’s not safe to use one’s credit card or to disclose any other personal information. For example, it has been shown that a Visa credit card can be hacked online in 6 seconds. Using cryptocurrency helps users stay anonymous to some extent– but what are the other ways to remain completely invisible online?

NordVPN, a Virtual Private Network service provider, identifies five key services that could significantly enhance your online anonymity and security.

Bitcoin. Bitcoin is a decentralized currency that does not belong to any country – just its user.  And when it comes to security, it’s hard to beat it. Bitcoin online transactions are conducted without disclosing any personal financial information. When it comes to privacy, it’s certainly reassuring that no one can trace who is the owner of a certain bitcoin account. However, not all merchants accept bitcoin. In those cases when using a credit/debit card is the only option - extra security steps should be taken.  Using strong passwords and updating them often, ensuring the websites are trusted (double check for https), being wary of any suspicious redirects and using trusted encryption services (i.e. VPN service) to protect one’s Internet traffic are bare minimum.

Encrypted Email. While bitcoin is great for financial transactions online, it’s advisable to stay private while conducting any other activities – such as emailing. Emails might also contain some private and sensitive information, which could be easily intercepted by hackers or any unwanted snoopers. The solution is to use one of the encrypted email services. There are a few good examples, including Tutanota, or the Gmail-like ProtonMail that offer an automatic end-to-end encryption, and no personal information is required to create a secure email account.

Encrypted Messaging. Everybody uses their mobile devices for instant messaging - but how safe are regular communication apps? For example, WhatsApp has received some harsh criticism for tracing user chats even after their deletion. Signal, on the other hand,is an encrypted messaging and voice calling app that provides end-to-end encryption by default to secure all communications. The app can also verify the identity of people one is messaging with and the integrity of the channel they are using. When texting with non-Signal users, one has an option to invite them to an encrypted conversation via Signal.

PGP (Pretty Good Privacy). If a user is  looking for an advanced option to secure their communication and personal files, it might be wise to turn to PGP, which is actually one of the most popular encryption softwares used worldwide. OpenPGP is used to encrypt data and create digital signatures and could be used to encrypt your personal files or to exchange encrypted communication. It protects all communication with a digital signature and is available for all operating platforms.

VPN (Virtual Private Network). Anyone who is taking their online security and privacy seriously, will use a VPN – a Virtual Private Network. A VPN encrypts all user’s Internet data into a secure tunnel and creates a secure connection between one’s device and a VPN server. All the information traveling between the  user’s Internet-enabled device and the secure server remains invisible to any third party. Those who want a guaranteed protection, will be disappointed that not all VPNs accept bitcoin as method of payment – but there are a few that do. NordVPN, for example, allows to pay by bitcoin and, most importantly, does not store any logs. It also offers an option to encrypt all the data twice for extra safety, which is a rare feature for a VPN. A helpful kill-switch feature allows a user to select Internet programs that would be terminated if the Internet connection dropped for any reason, to make sure that no unprotected Internet activity was exposed. Privacy issues have taken another shape completely over the past year. 31% of Internet users used a VPN in 2016, and VPNs will be increasingly popular in 2017 as online security issues grow to monumental proportions.

In addition to these super tough security measures, anonymity-minded Internet users should be more vigilant, use extra caution when sharing information or opening messages from unknown recipients, while making sure that their device’s Firewall is turned on and a reliable anti-virus program is installed and kept up to date.

To find out more, visit www.nordvpn.com

ABOUT NORDVPN

NordVPN is the world’s most advanced VPN service provider that is more security oriented than most VPN services. It offers double VPN encryption, anti DDoS & Tor Over VPN services. The product is very user friendly, offers one of the best prices on the market, has over 700 servers worldwide and is P2P friendly. One of the key features of NordVPN is zero log policy. www.nordvpn.com

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
riverway
50%
50%
riverway,
User Rank: Apprentice
1/7/2018 | 5:06:43 PM
Re: Anonymous Online
I agree with the VPN. Also it's important to be careful with phones as well. Using that Burner App is good or Sarahah . Also Roboshout . Or even getting an actual burner phone. A smart phone makes it so easy to be spied upon and everyone  follows like sheep. lol
SofiaH889
50%
50%
SofiaH889,
User Rank: Apprentice
6/14/2017 | 5:27:30 AM
Anonymous Online

Using VPN is the best solution for that case to bypass restriction or censorship. Once you are connected to a VPN server, you can virtually access any website you want. This does include Google, Youtube and social sites like Facebook, Instagram, and Twitter. Using Annonymous VPN your connection router and your ISP can't able to see what you watching. Detail mentioned are below https://www.reviewsdir.com/best-anonymous-vpn/

AshadA063
50%
50%
AshadA063,
User Rank: Apprentice
2/26/2017 | 2:01:59 PM
Nice read, but is incomplete.
While pushing NordVPN too far, I'm surprised why other VPNs service are not being discussed?

Also, for the secure and private email part, I certainly would like to see Mailfence (https://www.mailfence.com) in that list, as it surely is one of the best candidate.
GeorgiaB272
100%
0%
GeorgiaB272,
User Rank: Apprentice
1/27/2017 | 2:44:18 AM
Interesting read.
I also recently grabbed a VPN (PureVPN) for my online transactions and privacy on public WiFi's. And I think all of us must take measures against cyber crimes. 
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12697
PUBLISHED: 2018-06-23
A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.
CVE-2018-12698
PUBLISHED: 2018-06-23
demangle_template in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM) during the "Create an array for saving the template argument values" XNEWVEC call. This can occur during execution of objdump.
CVE-2018-12699
PUBLISHED: 2018-06-23
finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.
CVE-2018-12700
PUBLISHED: 2018-06-23
A Stack Exhaustion issue was discovered in debug_write_type in debug.c in GNU Binutils 2.30 because of DEBUG_KIND_INDIRECT infinite recursion.
CVE-2018-11560
PUBLISHED: 2018-06-23
The webService binary on Insteon HD IP Camera White 2864-222 devices has a stack-based Buffer Overflow leading to Control-Flow Hijacking via a crafted usr key, as demonstrated by a long remoteIp parameter to cgi-bin/CGIProxy.fcgi on port 34100.