20 Ways to Stay Anonymous Online
In 2013 Yahoo revealed the biggest data breach in the internet’s history. Over 3 billion accounts were compromised, and the details recovered by hackers included real names, dates of birth, email addresses, telephone numbers, and even their actual password, security questions, and answers.
Staying anonymous online is no longer about being a conspiracy theorist or a privacy nut. Every year large corporations reveal staggering data breaches. These are companies that invest millions of dollars into cybersecurity.
Staying anonymous online thankfully has never been easier, with the advent of new and easier-to-use technology like affordable VPN providers, and the growing number of anonymous browsers like DuckDuckGo which have responded to people’s concerns about what might happen to their data.
As ultimately identity theft is a real and present threat to people’s peace of mind and wellbeing. Hackers can literally assume your identity to commit all forms of cybercrime or just take out a bunch of credit cards in your name and run up thousands of dollars worth of debt which could take years for you to find and remove from your file.
Here are 20 simple steps for you to take to stay anonymous online, and protect your data, identity, and sanity.
1. Use a Trusted VPN
VPN stands for Virtual Private Networks. These give you a secure method to connect to the internet. They allow you to hide or change your IP (Internet Protocol) address, which can reveal your exact physical address.
Also, by encrypting your data and browsing history they secure your information against hackers and malevolent agents wanting to steal your personal information.
Trusted providers today use 256 Bit AES encryption technology and sophisticated security protocols. That’s the same technology used by the US Military to keep their data and communications secure. What’s more, prices have dropped so much, that you can now get a VPN for less than $5 a month.
Make sure to find a trusted and highly rated VPN provider. Many sites promise anonymity and privacy and can’t deliver.
How to Install Surfshark VPN on Firestick
If your Firestick still has the older interface, read this article to learn how to update it: Update Firestick Interface.
You can download Surfshark directly from the Amazon App store. It will be easy for you to find Surfshark with your Firestick’s Find feature. Refer to our screenshots below.
1. Go to the Home screen of your Firestick.
2. Navigate towards the Find tab. Press the Search button from the resulting dropdown.
3. Type in the keyword of SurfShark and select from the suggestions that will appear.
4. Click the official SurfShark icon from your search results.
5. Press the Download (You own it) button.
6. The SurfShark VPN installer will download on your device.
7. SurfShark VPN’s app will automatically install itself on your Fire TV stick.
8. Press the Open button after completing SurfShark VPN’s installation process.
9. Please wait for the SurfShark VPN to load its user interface.
10. You can now log in with your SurfShark VPN account credentials.
Learn more about Surfshark and Grab the Best Surfshark Deal Now!
For more VPN discounts, go to ReviewVPN Deals and purchase the best VPN for you.
2. Adjust Your Browser Privacy Settings
Your internet browser tracks all your information. From the websites that you visit downloads and cookies which help advertisers show you adverts based on your browsing habits. As well as keeping your credit card, passwords and form information if you let it.
Depending on your browser you can change your settings, to give a “do not track request” for your browser traffic. This means sites, in theory, can’t track as you go from one website to the next.
But bear in mind, that the most common browser Google Chrome is run by a multibillion-dollar technology company, that needs your data for its Google AdSense department to then sell to advertisers.
Some browsers ensure a greater level of privacy like Chromium, Firefox, and Brave a new browser made by the inventor of JavaScript.
But if you want a higher level of anonymity then read on to Step 3.
3. Use an Anonymous Browser
Hands down the best browser for anonymity is Tor which we talk about in Step 7.
The idea of an anonymous browser is simply that it does not track or collect anything about your browsing habits. From what search for, to the sites you visit, and even the parts of a website you click on or read.
A browser like Epic will have a built VPN service, will not generate error reports, does not track the URLs you visit, and therefore will be a clean slate every time you browse.
There are many more anonymous browsers built on either the open-source code for Firefox or Chromium (The open-source code for Google Chrome) including Brave, SRWare Iron Browser, and Comodo Ice Dragon Browser.
Importantly these are all browsers that are being updated, with an active open source development community behind them. Browsers need to be updated regularly for functionality and for security patches that deal with new online threats.
4. Keep Your Email Private
Your private email is like your home address. You wouldn’t advertise it for the whole world could hear, and let anyone in.
Firstly, there are the practicalities of not having an inbox full of spam and sales emails.
Secondly, every unknown email you answer runs the risk of infecting your computer with malware which could contain a virus, tracking software, or even a keyboard logger.
Email phishers and cybercriminals always becoming increasingly sophisticated with the types of emails they send. Don’t think that just because it’s not from a Nigerian prince you aren’t receiving an email-filled virus.
Always be careful of opening files and clicking on the links from senders you do not know. If in doubt google the sender’s address first i.e. steve@barclaysbankltd.group. Though the email looks legitimate you will quickly find out the website is not and realize the email is fake.
But by using different email accounts to register online, you keep your personal email address safe for important and trusted correspondence only. Once one spammer has your address it is quickly sold and transmitted across the web.
5. Live in a Country That Values Privacy
Some countries value the privacy and online safety of their citizens more than others. The US is a good example of an online culture where data is freely bought and sold.
A good example of solid pushback is the EU’s GDPR (European Union’s General Data Protection Regulation) act which meant users are now better protected from retaining their privacy.
For example, frequently when signing up to a site you were automatically put on their mailing list and bombarded, whereas now if you browse in Europe, companies must allow you to tick and choose the way you wish to be contacted. Thankfully you can now choose to now be contacted at all.
If you don’t have the luxury of moving, then you can vigorously pursue the rest of these steps and be an agent of change to promote an individual’s right to privacy.
6. Get an Anonymous Operating System
Your Operating System runs your computer and gives it a GUI (Graphical User Interface) like icons. For example, Windows, iOS, or Linux. But they frequently send user data to Microsoft, Apple, or Linus to let them know what’s going wrong with their system and in turn collect valuable data to fine-tune their service.
So, if you want an anonymous browser, you are going to have to get used to Linux. Tails OS is the front runner.
You can download it and use it in “Live” mode from a USB stick. This means you wouldn’t use it as your permanent operating system, but only when you browse online and interact with the web.
The system is fast, clean, and efficient and can get you up and online within 1-2 minutes.
7. Use Tor
Tor stands for The Onion Router. Made famous by the Silk Road drug scandal where people were buying and selling drugs online supposedly anonymously.
Originally developed by the US Navy, Tor works like VPN, but instead of using a company’s servers, you instead use other computers in the network as nodes. Your traffic is bounced through several nodes to obscure your traffic, while your data is encrypted.
The great thing about Tor is that there are no adverts, trackers, or websites that can store and track your data. Tor is also home to hidden services and is host to many criminally minded cyber criminals so proceed with caution if you browse these hidden sites.
8. Avoid Plug-Ins
Plugins are services that can be used as extensions to your browser. For example, translation services, games, and cloud services.
They also collect user data to improve their services which means they will track some of your browsing histories that relate to the plug-ins.
So, as much as you can just avoid them. It may cost you a bit of extra time to use Google Translate as opposed to a translation app, but if you are browsing anonymously or using a VPN your data can’t be stored or tracked.
Apart from inbuilt ad blockers, you shouldn’t need plugins for everyday browsing, so don’t choose convenience and stick to maintaining your privacy.
One plug-in we do recommend you get is Privacy Badger. Created by the Electronic Frontier Foundation which champions internet privacy. This plugin works by showing you what scripts, cookies, and trackers are being used by each sight. All are arranged in a color-coded order from green which is safe, to red which is possibly malicious. You will need to use Privacy Badger for Firefox or Opera. Google Chrome has banned its use (as it hurts their AdSense trackers).
9. Only Use HTTPS
HTTPS stands for HyperText Transfer Protocol Secure, as opposed to HTTP which isn’t secure.
The ‘S’ makes all the difference as it means that the site uses Secure Sockets Layer (SSL) which basically means that the web protocol which is being used by that website to receive your data (like payment information and credit card details) is secure and encrypted, meaning that hackers cannot intercept your information.
You will see the HTTP/HTTPS, just before the “//www.” Prefix for any website that you visit. Previously people only worried about this for payments. But remember that any information you give on an HTTP site, including your location and IP can be intercepted.
Reputable sites will have an HTTPS prefix, others with HTTP should be avoided or at best treated with suspicion.
Since it isn’t feasible to only browse HTTPS websites, the Electronic Frontier Foundation and Tor collaborated to make a plugin called HTTPS Everywhere. This plugin works with Chrome, Firefox, Opera, and Firefox on Android. Given the quality of the collaborating sources, this is a plugin that everyone should look into using.
YOUR INTERNET ACTIVITY IS BEING WATCHED
ReviewVPN cannot attest to the legality, security and privacy of the applications discussed on this site. It is highly recommended that you use a VPN service while streaming or using Kodi.
Currently, your IP 18.97.14.83 is visible to everyone and your Browser is being tracked by Advertisers & ISP Provider.
Here are the main reasons why you must use a VPN:
- Your activities are hidden from your ISP, the government, and from the apps you are using.
- You can access additional movies and TV streams.
- ISP attempts to throttle are thrwarted thus reducing buffering issues.
- Geographically restricted content like Netflix and Hulu can be unblocked.
A VPN works be replacing your ISP-assigned IP address and creating an encrypted tunnel. We recommend the no log service offered by IPVanish. It works well on a Firestick and offers the fastest possible speeds.
10. Avoid Unnecessary Applications
Just like Plugins on your internet browser. We use various applications which as part of their function need to connect to the information to communicate with their company’s server.
Even popular applications like Microsoft Office send regular usage reports to Microsoft which contain information and data that you may not want to share. These are generally explained away as “user experience data”
You can often swap popular products for Open Source software that will not transmit user data, or at least will give you greater control over the information that you provide.
11. Turn Off Your Location and Microphone
If you use Google, the chances are that they track your location. Often location services are automatically turned on so that you can easily find local services to you.
Though seemingly harmless, this also means that malicious agents can accurately track your movements at a location at any given time.
Make sure that location services are turned off both on your Operating System and your browser, and that your applications must ask for your location first before revealing it.
Also, you should turn off your microphone to be set off automatically. Otherwise, a reasonably gifted hacker who accesses your system can listen in to you at your computer.
12. Clear Your Cookies and History Regularly
Have you ever wondered why you look at a holiday to Spain and then the next day, there seem to be adverts for Spain wherever you go?
That’s cookies! They are essentially trackers which can map your journey online from one site to another. Down to your search preferences, browsing habits, and the time you have spent on each site, and even on a section or button, you hovered over.
When you browse, next to the URL bar, will be a small padlock bar on the left-hand side of the web address you are on. If you right-click on it, you can see how many cookies are in use.
If you aren’t using an anonymous browser, regularly clear out your cookies and history, at least once a week. Apart from privacy, the number of images and websites that you cache (store to load quicker next time you visit) quickly piles up and can slow down your browsing speed.
13. Block JavaScript
JavaScript is used to control elements of a website. When you load your browser with a new site, a DOM (Document Object Model) is loaded, showing you all the elements of your site.
This is mainly related to anything animated or requiring a submission. Like a form, or a menu. So, it is not critical to load the entire site that is built primarily in HTML and CSS.
JavaScript also allows the site’s designers to track your behaviors, and actions on the site and potentially maliciously inject a script into your browser allowing them to track you.
Though malicious scripts are rare, the fact remains that this script can be used to track you and track your data without your permission.
If all mainstream browsers there are advanced security and scripting settings that allow you to turn off JavaScript. Though it can make general browsing a bit fiddlier as it is so ingrained in modern websites.
14. Share Files Anonymously
You may use a Cloud-based storage system like Dropbox or Google Drive. The fact that you receive some storage for free, and the rest for a very low price, gives you some indication that you and your data are the product.
As part of their security protocol, these companies will scan and catalog your downloads. They explicitly state that all your files are scanned to customize your experience.
There are 3 options. You can either continue to use Dropbox for example or use VeraCrypt to encrypt your files prior to upload. You can invest in an external hard drive.
Or you can use an anonymous file-sharing site like Firefox Send or Zippy Share. There are tonnes of sites that allow you to anonymously upload and share files with a link, without even registering. Some also expire the link after 24 hours to give additional security.
15. Avoid Credit Cards
Credit Cards contain all your personal information. Not only does putting your credit cards anywhere online mean that you run the risk of your details being stolen.
But they also contain your address, and possibly even your date of birth and spending history.
If you want complete anonymity online then use a cryptocurrency like Bitcoin.
16. Test for DNS Leaks
Hopefully, if you are using a stable and reputable VPN provider like Surfshark or ExpressVPN this won’t even be a problem. You would be fine using the Tor browser as well.
But your location and data can be leaked through more than just your IP. DNS stands for Domain Name System. Your internet provider will contact a DNS to get the connecting IP to send you to when you write a URL and click enter.
Though everything may be secure on your end, if your VPN isn’t up to scratch, the DNS can still leak your IP.
You can check this by searching for “DNS leak test” as well as other leaks like IPv6 and ROTC.
17. Create Expendable Email Addresses
In Step 4 we spoke about how crucial it is to keep your personal email private. But, when you browse you will find a cool site you want to explore more, and they, in turn, will want you to register to access their services and read their content.
So, you need an email address you can access and verify your details.
Now you can do that without ever giving away your personal email again. Simply by using a service like Mailinator. Which gives you access to a public email inbox, where you can receive verification emails which are then destroyed.
18. Avoid Social Media
Probably the leakiest ship of all for people concerned with their privacy is social media. Facebook probably being the main perpetrator.
Though it’s a double-edged sword, maybe like me you use Facebook to stay in touch with friends in far-flung places and don’t want to give up access to your free window into their lives.
If you can’t avoid social media altogether, then make sure all your details are set to private, and anything you share does not divulge data that could breach your privacy. Remember as well that everything you do on Facebook and other social media sites feeds their algorithms and goes to third parties.
19. Don’t Give Away Your Mobile Number
Your mobile phone number can be traced directly back to you. Plus, let’s face it who really needs your step unless you need to secure an account with 2-step verification.
If possible, don’t give away your mobile number, or for those who may need to provide a number for business purposes, have a spare phone on hand with a pay-as-you-go SIM which you can use to selectively screen calls.
20. Create a Fake Online Identity
If you really want to go hardcore. You can go to great lengths and create a whole new fake online identity. With a website, social media accounts, and email address someone can connect the dots that you want them to.
Though this method can be very time-consuming if you haven’t scrubbed old accounts for years.
This means you want to engage with the online community on your terms. Only for those highly committed to keeping their identity private.
Conclusion
But what if you just want one single step. One solution that fits most of the criteria and keeps you safe today.
To save time and money we recommend finding a great VPN provider. Leave them to secure your data and your privacy today.
With a VPN you can go anonymous online. Malicious hackers or keen advertisers will never again be able to easily track and target you.
Once you know just how easy it is to find your personal data online. Your view towards browsing online will never be quite the same.