LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 04-28-2020, 09:46 AM   #1
Rocky3
LQ Newbie
 
Registered: Apr 2020
Posts: 2

Rep: Reputation: Disabled
Trackers, vpn and Tor


I don't have a clue about computers, however I am trying to know something about privacy and anonymity on internet. I need help, because it is much easier to ask someone, rather to finding information on several pages. But, don't worry: I wont ask, if uploading photos of my child on facebook can be private. So, I will write some thinking, please confirm if it is correct.

Tracker. There are several browser extensions that block tracker who are collecting metadata. But It seems that it can be... well... scam, maybe. Firstly: different extensions for blocking trackers are blocking cookies. But their interpretations of which cookie is tracker or which cookie is necessary for correct working of concrete web page are different. One extension will say:"Tracker! Block it!". The second will say "Well, it is tracker, but page wont work correct, If I block it." The third one will maybe say:"It is not a tracker." So, my conclusion can be that extensions for blocking cookies won't disable tracking, they will just limit it. So your metadata of visiting some pages will still leak.

VPN is similar. It seems that some companies are advertising VPN like something that will make your browsing private. Bullshit! It will just "change" your location and IP by "faking". Everything else will pages be able to read: your computer ID and your fingerprint. After all, if you visit page not through VPN firsty and then you will use VPN secondly, page will still say:" It seems that you have changed your location, but by browser fingerprinting we still know who you are."

Fingerprinting: it seems that it is more important than hiding your IP and location: there can be several computers on one location, but browser fingerprint is unique to everyone. There are several extension for hiding or faking some parameters of fingerprint. But am I right, if i say that they just don't work? I've tried, but several pages still recognized me. The problem is that browser are collecting a lot of different date. Every extension, every bookmark and so on will make your browser unique. Or is there a method that works?

TOR: It seem that the most effective way to be anonymous on internet is Tor. But can I use it for random browsing, like reading the news. As I know, I can. But what about your personal email. Yeah, I know that I must refuse google and yahoo, but what will happen if I will use TOR for mail who are declaring to care on out privacy? By using Tor, I will hide my location. But, will be wrong something else?

HTTPS: I wonder why Tor don't block some pages that have just HTTP? Is my understanding correct? It the page don't have HTTP, everyone can watch data on page. It can be risky, if there are hackers who are watching it. Why is HTTP so dangerous for privacy and anonymity?

If I conclude for now: it is fucking impossible to be anonymous on net. By blocking tracker and refusing google, facebook and similar companies, you can do a lot. But the problem is that email and shopping can't be anonymous. You buy online on page with HTTP and your browser will refuse blocking tracker of google, and your privacy will gone. They will know your browser fingerprint and will connect metadata on other pages with your name.

What to do?
 
Old 04-30-2020, 12:39 AM   #2
pan64
LQ Addict
 
Registered: Mar 2012
Location: Hungary
Distribution: debian/ubuntu/suse ...
Posts: 21,990

Rep: Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337
I do not really know what do you expect (as an answer). Just imagine if you do something you can be seen. That is quite normal. VPN, ssh (or in more general the tunnels) will connect you to the target host and nobody will see what are you doing in the middle.
Your browser (or host) can/may/will remember your activity (cookies, logfiles, passwords, history, who knows what). This is something like the photos were made about you on your excursions. You can delete them if you wish, but otherwise will be there and will be available (even if you forgot about that).
If you want to protect your personal data you need to take care about it.

The other thing is to remain unknown/anonymous on the net. Again, you need to take care about the data available on your host and what are you doing, because that will make you tracked/recognized. There are some software available to help, like manage your data, secure the communication, but anyway it depends on the user.
 
1 members found this post helpful.
Old 05-07-2020, 12:03 AM   #3
sxy
Member
 
Registered: Aug 2019
Posts: 43

Rep: Reputation: Disabled
If online anonymity is really that important to you, consider separating your online IDs using virtual / physical machines and "tor over vpn" with different tor nodes, and always use virtual phone numbers when you register new accounts. The idea here is to hide your real ip address and make it difficult to connect together your IDs. For example, you're Rocky3 when you use your VM and torrc for LQ, and you're SomeUser when you use another VM for Reddit, then it's not easy to find out Rocky3 at LQ and SomeUser at Reddit are in fact the same person.

Also I'd recommend to bookmark this site.
 
Old 05-07-2020, 12:28 AM   #4
//////
Member
 
Registered: Nov 2005
Location: Land of Linux :: Finland
Distribution: Arch Linux && OpenBSD 7.4 && Pop!_OS && Kali && Qubes-Os
Posts: 824

Rep: Reputation: 350Reputation: 350Reputation: 350Reputation: 350
Code:
Why is HTTP so dangerous for privacy and anonymity?
it is because http servers are usually malicious, *they use sniffers and collect login names and passwords.
using vpn with tor is advisable so they cant sniff ur login credentials.


*http servers that are "exit nodes".
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Tor Browser Bundle/Tor and IPTables: Solution Needed Nonetas Linux - Networking 3 03-01-2018 11:27 PM
Tor Browser Bundle/Tor and IPTables: Working Solution Sought Nonetas Linux - Security 1 01-14-2018 06:23 PM
LXer: Tails 2.6 Anonymous Linux Live CD Is Out, Brings Tor 0.2.8.7 and Tor Browser 6.0.5 LXer Syndicated Linux News 0 09-21-2016 01:32 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 02:10 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration