Online Anonymity

Anonymous communication is seen as the cornerstone of an Internet culture that promotes sharing and free speech and is overtly anti-establishment. Anonymity, so the argument goes, ensures governments cannot spy on citizens and thus guarantees privacy and free speech. The recommendations of the American Association for the Advancement of Science’s conference on “Anonymous Communication Policies for the Internet” support this view. Among the findings were that “online anonymous communication is morally neutral” and that “it should be considered a strong human and constitutional right.”
There are many options to get anonymity online, I am going to discuss about a few of them. Before understanding the concept on anonymity let us see what a Proxy Server is.


Proxy Server

A Computer System which offers a Computer Network Client to make network connections to other Network Services. These servers act as an intermediator in the request from the client to the source server. They allow the user to connect to desired network indirectly. 

Now let us see the different ways you can get anonymity online.  
  •  Web based Proxy Server
  • Application based Proxy Server 
  • Plugin based Proxy Server
  • VPN(Virtual Port Network)

Web based Proxy Server

These are websites which gives users the option of accessing the internet without showing their actual identity. Here are some common and popular ones

Application based Proxy Server

These are softwares or applications which can give the user anonymity online. These can be used to get a fake IP. These connect directly to pool table of proxy server and gives the user a fake IP. Here are some common application based proxy server

Plugin based Proxy Server

These are browser plugins or addons which provide the anonymity online. They are useful and better than the other as it is very easy to access and, it decreases the possibility of forgetting the application of the proxy. 

Virtual Private Network

These are private lines extended over public network. It allows a network-enabled device to send data to other user across public network. It creates a virtual point to point connection through use of dedicated connection ( Tunneling ). They in some cases provide encryption to the data too. Also they do not let the ISPs to know the IP address on which the user is trying connect. A few popular VPNs are 


1 comments:

hey bro this is a good content, but i think there should be "private" and not "port" ... vpn stands for virtual private network and not virtual port network

Reply

Post a Comment