Nothing is more frustrating to know that
when you surf the Internet, the computer leaves traces. In fact, when you
connect to a site, the computer is identified by its IP address stored by the
remote site and all sites displaying banners or dynamic content on the site. In
addition, cookies are used by the sites are small files to store user
preferences throughout the session, in particular the data entered by the user
in various forms. They originally used to customize the navigation, these
cookies may be used to record information for commercial purposes, including to
sell your e-mail address (if spam) or your browsing habits and consumption
sites profiling.
There are ways to mitigate these risks with
other constraints that this article tries to explain. The best defense remains
what happens vigilance of Internet users for personal information supplied to
remote sites.
Principle of navigation on the Internet
When browsing the Internet, the computer
uses a unique address, called an IP address, allowing remote web servers to
respond.
For most users, the IP address is provided
by the internet service provider and change or not each new connection to the
Internet. At each connection to a remote site, it keeps logs (log files)
associating your IP address to the pages visited.
Similarly, your ISP keeps a log file of
your connections and can therefore maintain a correspondence between you (with
your subscriber real coordinates), the IP address and the web pages viewed.
It is almost impossible to fake IP address,
while viewing web pages, because you do not receive web pages delivered by the
remote site.
Principle of anonymous surfing
The only way to make a anonymous surfing is
therefore to go through an intermediate server that will connect to the
websites that you visit your place and send you to turn the pages. This server
is said agent or proxy,
Your ISP: you always connect to the same
server, ie proxy for the remote site, you do not exist, the proxy server
connects.
The only limitations of this system are the
constraints of an intermediary, namely:
Connection times longer because the packet
must travel from your computer to the proxy, then the proxy website, then the
same in return, not including processing time by the proxy server itself!
Uncertainty on the third because no one
knows who is behind the proxy and the data passing through the intermediary
will not be intercepted and reused maliciously.
Solutions to surf anonymously
There are several ways to surf anonymously:
Use the services of a website anonymization,
displaying page views in its own interface
Use an anonymizing software.
Anonymous Browsing Websites
The main sites of anonymous surfing are:
No comments:
Post a Comment