Browse the Internet privately
Instructions: Real private mode for the browser
When it comes to anonymity on the Internet, the "porn mode" doesn't help. However, there are ways and means of disguising the web addresses visited and actually browsing the Internet anonymously.
Every browser today provides a function for protecting privacy on the Internet. In Google Chrome it is called “incognito window”, in Firefox “private window”, Microsoft offers the “Inprivate window” in Edge. It used to be known as porn mode.
The function is used to disguise the web addresses visited, for example to hide from the employer what the computer was used for. In incognito mode, the web addresses accessed and the data entered in forms are not saved. In addition, all cookies received are deleted when you exit the incognito window. In practice this means: When other people are sitting at your computer, they cannot see which pages you have visited.
Many users believe that incognito mode also enables anonymous surfing. However, there can be no question of that. If you are connected to a company network, for example, the administrator can easily determine from the log files on his servers which IP addresses were accessed by your PC, regardless of whether this was done in incognito or normal browser mode. Your provider can also track your forays through the Internet at any time. In addition, it is always possible for the websites you visit to see where you came from, because the cookies are only deleted when you close the browser tab for private mode.
And: If you add a web address to your bookmarks or favorites, this entry is retained even after you exit incognito mode. The same goes for downloading files.
There are ways and means to actually roam the Internet undetected - as presented below. However, incognito mode is not one of them.
Surf anonymously at work
In a professional corporate network, the administrator has complete control over the connected devices and can determine at any time who has connected to which website and when. To bypass this monitoring, you have the option of either changing the hardware or the network - or both.
The easiest and safest way to do this is to use your smartphone. Switch off the WLAN function so that you can access the Internet via the cellular network. Now you can surf the web and write e-mails without hesitation: The connection data only end up with the provider, who is only allowed to provide them to authorities. And even for this there have been high hurdles since a ruling by the Federal Constitutional Court in July 2020. The data queries are only permitted if there is an initial suspicion that a serious crime such as the formation of a terrorist group is being committed. Second, it is often possible to change networks. In all federal states there are now free Wi-Fi hotspots in the larger cities and at many tourist attractions.
Municipalities and federal states can use EU funding programs for this purpose; You can find a map and a list of the locations at www.europakarte.org/wlan/deutschland. At the same time, the Freifunk initiative has also set up a network with thousands of WLAN access points and also provides free internet access there to non-members. A map is available at www.freifunk-karte.de. Many of these Internet connections are secured against eavesdropping by VPN, the log files are on servers abroad. In addition, many hotels, restaurants, supermarkets and most train stations also offer free WiFi.
Third, you can also use your smartphone's cellular connection with your computer to access the Internet. The function is called tethering and is supported by all Android models. You can find it in the “Settings” under “Network & Internet -› Hotspot and Tethering ”. There you choose whether you want to establish the connection between PC and smartphone via WLAN, via a USB cable or via Bluetooth, with Android 11 there is also an Ethernet option. The easiest and most inconspicuous is the USB connection. Connect the smartphone to the PC using a USB cable and activate "USB tethering". Windows will now display a newly recognized network connection, which you can select with a click. If no notification appears, click on the network symbol in the systray and look for a connection with a name such as "Network 1".
Disguise visited websites
Another case is when your employer allows private surfing at work, but you want to prevent the administrator from tracking your forays through the Internet based on the IP addresses. You can of course also use the methods described below in order to remain anonymous with your private connection on the Internet.
A simple solution is to use a proxy server. In the past, these servers were used as a kind of cache and often held websites that were accessed locally. Today they are usually used to disguise your own IP address and / or the location from the page you are visiting. If you use a proxy server, the administrator only sees that you are navigating to its IP address, but not what happens afterwards.
Usually you set the proxy server centrally in Windows. Open the "Settings" in the start menu, go to "Network and Internet" and click on "Proxy". Under “Manual proxy setup”, set the switch for “Use proxy server” to “On” and enter the IP address and port of the server. Place a check mark in front of “Do not use proxy server for local addresses (intranet)” and confirm with “Save”.
On the Internet you will find hundreds of free proxy servers that you can access, as well as dozens of regularly updated directories for these servers, which include the IP address, the port used and the current speed. Examples are: https://hidemy.name/de/proxy-list or https://de.proxyservers.pro.
Fingerprinting - the alternative to cookies
Websites recognize returning visitors by cookies, small files that they save on the computer the first time they visit. However, since cookies can be easily deleted and many users simply refuse to accept them, the website operators have developed other methods of identification.
Fingerprinting systematically analyzes the information transmitted by your computer and stores it in a digital profile. A distinction is made between browser, device and canvas fingerprinting.
With browser fingerprinting, the websites visited combine information about the browser used, the version, the installed plug-ins, the language, screen resolution, time zone and other configuration options in a profile. All this information is voluntarily transmitted by the browser to the website so that the pages are optimally displayed.
The device fingerprinting also evaluates information about the operating system, the installed fonts, the IP and MAC address of the network adapter, the battery status and the location.
- Do we need the Green New Deal
- How do you grow your hair faster
- When does TCS send a call letter
- How do you say stranger in German
- What is the presence of the find
- How many lumens does the sun produce
- Why does the sun need us
- Can I speak to a NASA cosmologist?
- Wait to buy a Tesla
- Has Barack Obama appeared in comics
- Can I perform regional anesthesia for pediatrics?
- Can we learn the Koran online anywhere
- What can you catch when you kiss someone
- How do I shave a fake beard
- How does a steam generator work
- Where did the wrapping paper come from?
- How can economic sanctions affect a country?
- Eating bananas can cause ulcers
- Misoprostol can be taken twice a week
- What does it mean to avoid obfuscation
- Bob Seger is still touring
- Is SRM IS not worth it at all
- How was your friend's family weird
- Why does Facebook have no competitors