Web Anonymization Techniques 101

Credit
This triangle graphic illustrates how convenience detracts from security and privacy

Conflating Anonymization With Privacy

Telemetry and Metadata

Credit: Tribune Media Services

Web Browser Options

Credit: Statista & Mashable
Apple is one company that takes user privacy seriously

Internet Search Engines

Credit: Statista
Credit: @businessunions

Privacy Tools

Privacy Badger

Panopticlick

Tor & Virtual Private Network Web Proxies

Virtual Private Networks (VPN)

Credit: PrivacyTools.io

The Onion Router (Tor)

Tor Bridges

Credit: ProtonVPN
Twitter post I made about the topic of Tor over VPN money trail vulnerabilities

Command Line Interface (CLI)

Proxychains

Mobile Devices

Physical Anonymity Hacks

Additional Resources:

think bad, do good | cybersecurity & privacy engineering | keybase.io/d3structo

Get the Medium app