{"id":905,"date":"2019-04-03T15:16:46","date_gmt":"2019-04-03T13:16:46","guid":{"rendered":"http:\/\/65.108.60.219\/?p=905"},"modified":"2025-04-25T12:06:51","modified_gmt":"2025-04-25T10:06:51","slug":"anonimity-a-way-to-safe-browsing","status":"publish","type":"post","link":"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing","title":{"rendered":"Staying anonymous in web &#8211; a way to safe browsing &#8211; popular solutions and good practices"},"content":{"rendered":"<p><i><span style=\"font-weight: 400;\">The article below is purely educational. The author presents solutions, that can assure safe browsing if used for legal purposes only. Utilising the tools listed below in illegal ways might cause criminal liability.<\/span><\/i><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">While using the internet, we tend to think we\u2019re anonymous in the digital environment. No physical contact, name hidden under an alias, custom email address. These are the elements that make us feel isolated from the rest of the users. It might look like our inline alter-ego is inaccessible for others. Well, it\u2019s not. Surfing on the waves of the internet leaves traces &#8211; very specific and accurate information about our persona. The actual us, sitting in front of the computer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Nonetheless, there are some solutions that allow us to utilise anonymization techniques. If used responsibly, they&#8217;ll make us unrecognized and tracing who we are and where we\u2019re from will be significantly harder, sometimes even impossible. There are many ways of anonymization and the toolset that you use depends on the situation we\u2019re planning to be at.<\/span><\/p>\n<h3>The traces we leave<\/h3>\n<p><span style=\"font-weight: 400;\">In the article below I\u2019m going to present commonly available solutions, that are worth to use during everyday online activities. I\u2019ll also focus on behavioural approach, trying to maximize the potential of anonymization by raising awareness of how to think and behave.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Before we proceed to technical solutions, we should learn the ropes. If a person wants to stay undisclosed on the Internet, a certain behavioural pattern should be implemented:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">plan your actions,<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">select the right tools,<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">be consistent in what you do,<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">don\u2019t get outsmarted.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">As I\u2019ve mentioned before, every internet user leaves prints. They\u2019re inevitable and critical for proper functioning of the world wide web. It\u2019s caused by a multitude of reasons. Operators that offer access to the web must assign an IP address to a user. It\u2019s an individual address that allows data transfer between certain devices and makes the data travel precisely where channelled. An IP address is assigned automatically and it\u2019s written in system\u2019s Event Log at the beginning of every session. It\u2019s inseparable from the user during the whole session, therefore it stays in the memory of every page we\u2019ve visited. Comparing the information from the provider and the receiver side may compromise the user\u2019s identity and the data he downloaded. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The data we leave while using the web without using anonymizing solutions:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">IP address<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">date and time of our visit<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">information about the device we use, its operating system and browser<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">queries we type in the browser<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">data we share in unsecured sources <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">our geolocalization<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Now that we know what do we want to conceal, let\u2019s proceed to the main point. How to stay anonymous to assure safe browsing?<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">The safe browsing toolbox<\/span><\/h2>\n<h3><span style=\"font-weight: 400;\">VPN (Virtual Private Network)<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">It\u2019s a so-called tunnel network, through which the network is channelled between end users. That architecture makes the network transparent for the transferred data packets. The tunnel connects the user\u2019s device directly to the server, that sends data without collecting information about the user. There is no go-between, that could intercept the data. At the same time, data transmitted through the VPN channel is properly encrypted and compressed for the highest transfer quality. The operator sees, that there is data transmitted, but he doesn\u2019t know any specific information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The technical construct looks as follows:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">a query from the provider reaches the anonymizing service<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">the service decrypts the query<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">the query is being masked by proxy or NAT routing<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">decyphered page call has a new IP address and it\u2019s the anonymizing service address, not the one of the user<\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-906 size-full\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/04\/vpn-architecture-1.jpg\" alt=\"TestArmy Cyberforces VPN system architecture\" width=\"543\" height=\"204\" \/><\/p>\n<p style=\"text-align: center;\"><em><span style=\"font-weight: 400;\">Fig. 1 VPN network architecture<\/span><\/em><\/p>\n<p><span style=\"font-weight: 400;\">While choosing the VPN service provider, the user should pay attention to its popularity. Why? Other users contribute to the overall anonymity provided by the service, by using it a the same time. The more service is popular, the bigger the probability, that the user will be unnoticed in the crowd, as the provider cannot determine which sites were opened by which user. Yet popular serves have one flaw &#8211; a high amount of users equals lower bandwidth. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you choose a VPN from another country than the one you occupy, be careful. In case of any illegal actions, you\u2019re under the law of both countries.<\/span><\/p>\n<h4>Rule 1 &#8211; stay consistent<\/h4>\n<p><span style=\"font-weight: 400;\">A user that wants to browse the internet safely, must remain consistent in his actions. That means if he\u2019s searching the web using a VPN, he should do so every time. To be extra careful he should switch servers he uses. There\u2019s little sense in a situation where a user browses a shady website with a VPN and then comes back using a standard connection. In that case, even if he\u2019s hidden the data before, now they\u2019re all visible to the receiver or an interceptor. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">A safe VPN connection is commonly used in countries that have limited freedom of speech or while using services that assign its assets basing on geolocalisation. Good examples of services with those restrictions are YouTube and Netflix, where a user that has an active VPN with an IP address assigned to a certain localization might have access to local content. For example, if a user is connecting with an IP from the territory of US, the service will recognize him as a person from this territory and allow to receive all the content available in that particular localization.<\/span><\/p>\n<h4>VPN vs Legal systems<\/h4>\n<p><span style=\"font-weight: 400;\">It\u2019s worth to mention, that although VPN might ensure anonymity while using the web and indispose the third party to intercept the transmission, it has a significant weak spot. A company that delivers VPN services, if asked by authorities (f.e. police) is entitled to present any data gathered about its clients.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Anyone that cares about maximum privacy should consider choosing a provider that doesn\u2019t collect users\u2019 data and has servers located in a country that doesn\u2019t respect the Geneva Convention, for example, Panama or Hongkong. Panama seems good as it doesn&#8217;t cooperate with other countries\u2019 law enforcement agencies. We must remember, that VPN provides different IP address only from the perspective of the server we connect to.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Incognito mode <\/span><\/h3>\n<p><span style=\"font-weight: 400;\">It\u2019s a browsers\u2019 feature, that allows using the internet without saving the data that the user leaves. It means no search history, cookies or browser history. Of course, the data we create will be visible for the receiver, but won\u2019t be saved locally after ending the session. Therefore next user of the same device won\u2019t have access to them.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Incognito mode is viable in public places or devices that are used by multiple users. For example, if you finish using a browser in the internet cafe, just close the page and no data will be stored in a browser\u2019s memory. It\u2019s strongly advised to use incognito mode while accessing pages that may contain sensitive data, for example, while logging to the bank account.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">TOR network (The Onion Router)<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">TOR is a project aimed at preventing analysing web traffic. Its architecture refers to many layers of an onion. It enables anonymous communication by hiding a user\u2019s localization and providing with hidden, anonymous services. Putting it simply, it\u2019s a decentralized, \u00a0multi-layer router network, that uses cryptography to cypher communication between them. A router at the beginning never directly sees the router at the end, only the nearest data provider\/receiver from the next\/previous communication layer. If somebody wanted to trace the communication, he\u2019d only see the last intermediate router. There are, however, many items controlled by governments, that analyze that movement. This analysis combined with data from internet providers and knowing of logging time allows capturing criminals that thought they\u2019re safe and unidentified.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-908 size-full\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/04\/torarchitecture-1.jpg\" alt=\"TestArmy Cyberforces safe browsing TOR system architecture\" width=\"687\" height=\"262\" \/><\/p>\n<p style=\"text-align: center;\"><em><span style=\"font-weight: 400;\">Fig. 2 TOR Network architecture<\/span><\/em><\/p>\n<p><span style=\"font-weight: 400;\">Using TOR Network is really simple and requires you to install TOR Browser. It\u2019s a software based on Mozilla Firefox, that is used pretty much the same way. While browsing the internet, you get an anonymous IP address, that protects the user\u2019s identity, leaves no trace and prevents from hacking. To maximize TOR\u2019s potential it\u2019s important to keep the Browser updated and don\u2019t maximize the window, as it gives information about screen resolution.<\/span><\/p>\n<h4>Safe browsing with TOR<\/h4>\n<p><span style=\"font-weight: 400;\">Connecting to TOR network with a TOR Browser allows to browse pages, but it has certain limitations that come directly from its specifics. JavaScript support is turned off, so many pages won\u2019t work the way they\u2019re meant to. Also turning it on will give out a significant amount of information about a user. Still, the browser is very user-friendly and intuitive. It connects automatically at the start. Since that moment very asset and every domain of the internet is accessible anonymously.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A very important aspect of the TOR network is the so-called Dark Net. It&#8217;s a hidden part of the internet, inaccessible from the standard browser. Darknet\u2019s structure is based on particular server software, known as pseudodomain \u201c.onion\u201d. The most common services the Darknet offers are hidden websites, forums and marketplaces. They don\u2019t always offer legal contents.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">TOR network may be used for purposes that are considered illegal by some legal systems. Political criticism, copyrights violation, drugs, guns and pornography distribution &#8211; all those contribute to the Darknet\u2019s aura of mystery and doubt. It\u2019s worth to remember, that TOR\u2019s main purpose is to keep users safe. Many TOR users obey the law and use the web legally. For others, it\u2019s the only safe option to use the internet under heavy government censorship or human rights violation.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Tails (the Amnestic Incognito Live System)<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Tails is a GNU\/Linux (Debian) system distribution, that works as a live operating system DVD\/USB. It\u2019s meant to provide safe and anonymous use of the web. It consists of several tools and functions that will keep a user\u2019s privacy while online. Tails\u2019 main attribute its utility. Web browsers, communicators or email clients that are integrated with Tails system, are automatically configured with the launch of a system. The automatic mechanism that keeps you anonymous is based on the TOR network. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Tails operating system\u2019s bundle includes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">an anonymous TOR network witch Onion Circuits interface,<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">TOR Browser,<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">NetworkManager,<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Mozilla Thunderbird,<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Florence virtual keyboard,<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">KeePassX password manager,<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">MAT metadata anonymization tool.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">ProtonMail<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">It\u2019s an e-mail operator registered in Switzerland. What distinguishes it from thousands of other services is that it aims to keep its users anonymous. Its localization is non-contingent as the servers are under Switz law system jurisdiction. Therefore the data is inaccessible for other countries (such as US and NSA agency). The main advantage that contributes the most to the users&#8217; privacy is automatic end-to-end encryption of every message. It means, that encryption takes place on the client\u2019s side and it\u2019s decrypted on the receiver&#8217;s side. Even ProtonMail\u2019s employee cannot decipher the emails, not to mention any third party interceptors. Also, ProtonMail doesn\u2019t gather any personal information while creating an account and assures that it doesn\u2019t collect IP addresses and logging data, so they cannot be connected to the user\u2019s account.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Temporary mailbox<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Typing your email address on a website might cause some unpleasant consequences. Nobody likes receiving spam or malware emails just because he used his real email to comment on a\u00a0forum section.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Temporary emails, also known as anti-spam mailboxes seems a great solution to this problem. Their main asset is no need to sign in and the content is restricted by time. They\u2019re used mostly to register to services or forums that may be unsafe. They also work great as testing accounts. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">While using anti-spam mailboxes you must remember that there are certain circumstances where they\u2019re no good. Some services have temporary email blacklists and automatically prevent them from being used. I also suggest to don\u2019t use them on websites where you want to have a working account. In case of losing the password, there might be a problem with recovering it. Temporary mailboxes don\u2019t have passwords and are available for everyone, so if you have used one to create an account it might easily be taken over by someone that knows your temporary address.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Identity generators<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Every user of the internet has found himself in a situation where he had to put some personal information in a form, for example, to use a certain feature or to download a pdf. file. What\u2019s worse, in some cases the page asks you for sensitive information. Of course, you can take a while to make them up, but what to do when your session had a timeout and you have to put them again or if they don\u2019t have proper validation?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Identity generators (personal data generators) are perfect for a situation like this. They are free to use and very fast in creating fictional information. They come in many forms, from a simple ID number generator to a full bundle containing a name, address, social security number, company name and credit card number.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Identity generators are useful in some cases, as they can keep your personal data safe, but they shouldn\u2019t be overused. Using artificially generated data for, for example, banking agreements, is considered fraud and may cause a person to be held to account.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Don\u2019t send document scans<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">A thing that might seem obvious is often not. We should never send copies of documents via the internet. Many people tempted by quick loan or an attractive job offer tend to send an ID scan to a person they don\u2019t know. \u00a0You never know what happens to them afterwards. They might fall into the wrong hands and be used to commit a crime. They might be processed with violation of GDPR or be sent between financial institutions employee. It might happen, that an employee that has access to clients\u2019 personal information will be fired, so in an act of revenge, hell download them and sell to third parties. Generally, there\u2019s a high risk of losing control over your documents and a stolen identity can cause a lot of problems.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Safety comes from wisdom<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The tools I\u2019ve mentioned are worth to use, although some rules must be followed. Most importantly be consistent in your actions. If you\u2019re not cautious and don\u2019t take care of your safety, sooner or later you\u2019ll slip and let someone else obtain your data. A very basic mistake many users make is the inability to divide actions performed in anonymous web and those they perform in open internet. An excellent example of such practice is Ross Ulbricht, creator of Darknet forum Silk Road. He has committed a crime, but thanks to TOR network he was uncapturable. He made a serious mistake of using the same nickname in TOR as well as on the open internet. That led FBI agents to his real persona. After they\u2019ve gathered solid evidence against him, he was prosecuted. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the end, I\u2019d like to say, that there\u2019s more to say about the topic of anonymization. As I\u2019ve mentioned at the beginning &#8211; different goals require different methods. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">While writing this article I was aiming at presenting the case in the most accessible way. I&#8217;ve wanted to avoid tools that might lead to conflicts with law and point out possible risks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Every internet user should be aware that staying anonymous is strictly connected to his approach and mindset. If you\u2019re not consistent in what you do, no matter how sophisticated methods you use, you won\u2019t be able to stay hidden. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The article below is purely educational. The author presents solutions, that can assure safe browsing if used for legal purposes only. Utilising the tools listed below in illegal ways might cause criminal liability. &nbsp; While using the internet, we tend to think we\u2019re anonymous in the digital environment. No physical contact, name hidden under an [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[29,37],"tags":[],"class_list":["post-905","post","type-post","status-publish","format-standard","hentry","category-security","category-guide"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Anonymity as a way to safe browsing - CyberForces<\/title>\n<meta name=\"description\" content=\"Safe browsing of the internet is a dream of every user. One of the ways to achieve it is to stay anonymous. See our tools selection and surf securely.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Anonymity as a way to safe browsing - CyberForces\" \/>\n<meta property=\"og:description\" content=\"Safe browsing of the internet is a dream of every user. One of the ways to achieve it is to stay anonymous. See our tools selection and surf securely.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing\" \/>\n<meta property=\"og:site_name\" content=\"CyberForces\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-03T13:16:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-25T10:06:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/04\/Employee-Opinion-Surv.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Wojciech Lika\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wojciech Lika\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing#article\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing\"},\"author\":{\"name\":\"Wojciech Lika\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/person\/20d6af1ce53ab5420523df690ab70647\"},\"headline\":\"Staying anonymous in web &#8211; a way to safe browsing &#8211; popular solutions and good practices\",\"datePublished\":\"2019-04-03T13:16:46+00:00\",\"dateModified\":\"2025-04-25T10:06:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing\"},\"wordCount\":2645,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/04\/vpn-architecture-1.jpg\",\"articleSection\":[\"Security\",\"Guide\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing\",\"url\":\"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing\",\"name\":\"Anonymity as a way to safe browsing - CyberForces\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/04\/vpn-architecture-1.jpg\",\"datePublished\":\"2019-04-03T13:16:46+00:00\",\"dateModified\":\"2025-04-25T10:06:51+00:00\",\"description\":\"Safe browsing of the internet is a dream of every user. One of the ways to achieve it is to stay anonymous. See our tools selection and surf securely.\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing#primaryimage\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/04\/vpn-architecture-1.jpg\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/04\/vpn-architecture-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/cyberforces.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Staying anonymous in web &#8211; a way to safe browsing &#8211; popular solutions and good practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberforces.com\/#website\",\"url\":\"https:\/\/cyberforces.com\/\",\"name\":\"CyberForces\",\"description\":\"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!\",\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberforces.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberforces.com\/#organization\",\"name\":\"TestArmy Group S. A.\",\"url\":\"https:\/\/cyberforces.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"width\":1210,\"height\":173,\"caption\":\"TestArmy Group S. A.\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\",\"https:\/\/www.linkedin.com\/company\/cyberforcescom\/\",\"https:\/\/www.instagram.com\/cyberforces__\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/person\/20d6af1ce53ab5420523df690ab70647\",\"name\":\"Wojciech Lika\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/04\/a-PL-Legitymacja-szkolna-35x45-mm-min-e1554288057111-100x100.jpg?wsr\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/04\/a-PL-Legitymacja-szkolna-35x45-mm-min-e1554288057111-100x100.jpg?wsr\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/04\/a-PL-Legitymacja-szkolna-35x45-mm-min-e1554288057111-100x100.jpg?wsr\",\"caption\":\"Wojciech Lika\"},\"description\":\"QA Software Engineer. Niezale\u017cny doradca ds. bezpiecze\u0144stwa. Pasjonat zarz\u0105dzania cyberbezpiecze\u0144stwem i bezpiecze\u0144stwem fizycznym w kontek\u015bcie biznesowym.\",\"url\":\"https:\/\/cyberforces.com\/en\/author\/wojtek\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Anonymity as a way to safe browsing - CyberForces","description":"Safe browsing of the internet is a dream of every user. One of the ways to achieve it is to stay anonymous. See our tools selection and surf securely.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing","og_locale":"en_US","og_type":"article","og_title":"Anonymity as a way to safe browsing - CyberForces","og_description":"Safe browsing of the internet is a dream of every user. One of the ways to achieve it is to stay anonymous. See our tools selection and surf securely.","og_url":"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing","og_site_name":"CyberForces","article_publisher":"https:\/\/www.facebook.com\/TestArmyCyberForces\/","article_published_time":"2019-04-03T13:16:46+00:00","article_modified_time":"2025-04-25T10:06:51+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/04\/Employee-Opinion-Surv.png","type":"image\/png"}],"author":"Wojciech Lika","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Wojciech Lika","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing#article","isPartOf":{"@id":"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing"},"author":{"name":"Wojciech Lika","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/20d6af1ce53ab5420523df690ab70647"},"headline":"Staying anonymous in web &#8211; a way to safe browsing &#8211; popular solutions and good practices","datePublished":"2019-04-03T13:16:46+00:00","dateModified":"2025-04-25T10:06:51+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing"},"wordCount":2645,"commentCount":0,"publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"image":{"@id":"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing#primaryimage"},"thumbnailUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/04\/vpn-architecture-1.jpg","articleSection":["Security","Guide"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing","url":"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing","name":"Anonymity as a way to safe browsing - CyberForces","isPartOf":{"@id":"https:\/\/cyberforces.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing#primaryimage"},"image":{"@id":"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing#primaryimage"},"thumbnailUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/04\/vpn-architecture-1.jpg","datePublished":"2019-04-03T13:16:46+00:00","dateModified":"2025-04-25T10:06:51+00:00","description":"Safe browsing of the internet is a dream of every user. One of the ways to achieve it is to stay anonymous. See our tools selection and surf securely.","breadcrumb":{"@id":"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing#primaryimage","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/04\/vpn-architecture-1.jpg","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/04\/vpn-architecture-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberforces.com\/en\/anonimity-a-way-to-safe-browsing#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/cyberforces.com\/"},{"@type":"ListItem","position":2,"name":"Staying anonymous in web &#8211; a way to safe browsing &#8211; popular solutions and good practices"}]},{"@type":"WebSite","@id":"https:\/\/cyberforces.com\/#website","url":"https:\/\/cyberforces.com\/","name":"CyberForces","description":"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!","publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberforces.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberforces.com\/#organization","name":"TestArmy Group S. A.","url":"https:\/\/cyberforces.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","width":1210,"height":173,"caption":"TestArmy Group S. A."},"image":{"@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TestArmyCyberForces\/","https:\/\/www.linkedin.com\/company\/cyberforcescom\/","https:\/\/www.instagram.com\/cyberforces__"]},{"@type":"Person","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/20d6af1ce53ab5420523df690ab70647","name":"Wojciech Lika","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/04\/a-PL-Legitymacja-szkolna-35x45-mm-min-e1554288057111-100x100.jpg?wsr","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/04\/a-PL-Legitymacja-szkolna-35x45-mm-min-e1554288057111-100x100.jpg?wsr","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/04\/a-PL-Legitymacja-szkolna-35x45-mm-min-e1554288057111-100x100.jpg?wsr","caption":"Wojciech Lika"},"description":"QA Software Engineer. Niezale\u017cny doradca ds. bezpiecze\u0144stwa. Pasjonat zarz\u0105dzania cyberbezpiecze\u0144stwem i bezpiecze\u0144stwem fizycznym w kontek\u015bcie biznesowym.","url":"https:\/\/cyberforces.com\/en\/author\/wojtek"}]}},"_links":{"self":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/comments?post=905"}],"version-history":[{"count":12,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/905\/revisions"}],"predecessor-version":[{"id":250967,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/905\/revisions\/250967"}],"wp:attachment":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/media?parent=905"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/categories?post=905"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/tags?post=905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}