We all have the right to our privacy. If you do not want to be tracked by governments or companies, there are several steps you can take to keep all your traffic under a security blanket, say disguise it a little, or much as you need.
There are several tools that help us achieve this goal, whether you want to keep track of what you do on the web, or want to anonymize your traffic completely, there are several ways to do it, we explain what options you have and what habits you should Change when surfing the Internet to keep yourself hidden.
Acronyms that have become very fashionable lately, but what is a VPN and what is it for? A VPN or virtual private network is a technology that allows you to extend your local network over a public network, and in this way, the sending and receiving of data are treated as a private network. Simply explained, a VPN disguises private network to your Internet connection, so your traffic is governed by the same security and encryption policies of local networks. Confidentiality and privacy guaranteed.
There are several services of this type that you can use for free, or paying for subscriptions. Some of the ones I like the most are Hi Unblocker, Spotflux, or Hotspot Shield. There are plenty of alternatives, but these three are extremely easy to use, require virtually no user attention, and can be used free of charge without significant limitations.
Tor was originally designed as a routing project of the United States Naval Research Laboratory in order to protect government communications. Nowadays it can be used by anyone, it is a very powerful service that offers you enormous security when it comes to encrypting your Internet traffic. Tor is a network of virtual tunnels, protect your communications by bouncing them into a huge network maintained by volunteers around the world.
Tor can be used on Windows, OS X, and Linux, through the Tor Browser Bundle, a modified version of Firefox configured to protect your identity on the network and does not even require installation, you can carry it on a USB stick and run it as A portable application. If you use Android you can get all the benefits of Tor through Orbot.
If you want to go one step further and protect yourself with all irons, you can use the distribution of Linux Tails, which combines the robustness of Debian and Tor in an operating system specially designed to keep its user completely anonymous. It is a “Live” distribution, that is, it is not installed on a computer, it is portable, and you can run it from a CD, DVD, SD card, or USB stick if you leave no trace. Tails are what Edward Snowden uses to evade NSA surveillance.
Finally, it is important that you know that you cannot use the web as you are used to if you want to remain completely anonymous, it would be useless to use all these tools if you are going to connect to Google or Facebook, at that time you will reveal your identity.