S3SS10N Wednesday – Guide to Anonymity

Join Cybrary

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here
< Back to S3SS10NS

S3SS10N Wednesday – Guide to Anonymity

Published: July 6, 2016 | By: | Views: 12555
save
This post has been saved to your profile

This Weeks S3SS10N Wednesday


You must be a Cybrary member to view this S3SS10N Wednesday video. Join for free.

Join Now

Login

In this “Session Wednesday” video, learn the basics of covering a online footprint, and how to remain anonymous while on the web. Even with advanced applications like tor, anonymity cannot be guaranteed. But at the same time, the harder it is to track an individual, the less likely someone would pursue. VPNs add another layer to the anonymity of a user, but how trustful is the VPN? Does the VPN keep logs? If so, it defeats the purpose of anonymity.

Even when behind Tor and a VPN, a simple browser leak will give information away.
check out BrowserLeaks.com to test your browser.
Be sure to keep browsers updated, certain vulnerabilities in browser could lead to loss of anonymity.

For optimal anonymity, a privacy oriented distro is a must. A few popular ones include Whonix and Tails. In addition, Qubes, a privacy based OS that focusing on isolating processes and programs, has gotten a lot of attention lately, and was even endorsed by whistle blower Edward Snowden and Tor developer Lovecruft.

WebRTC is an easy way to get information from a browser and is often overlooked. Certain plugins can claim to block WebRTC, however a few were beaten by an iframe. STUN requests can also give information away.

Downloading a massive amount of privacy plugins could also lead to a loss of anonymity. The unique set of plugins creates a profile for that user, which could also lead to anonymity. When combined with behavior analytics such as time of activity, diction, and other patterns, it will not matter how many names that individual has.

< Back to S3SS10NS

About This S3SS10N Wednesday's Contributor

An information security enthusiast with a personal passion for red-teaming and malware.
Enjoy this S3SS10N Wednesday? Want more Cybytes?
Invite a Friend
and share now
Facebook Twitter LinkedIn Email
Join Cybrary
17 Comments
  1. Is there any possibility to find the exit nodes by ourselves…

  2. Great information, but couldn’t you find a human to read all the text?

  3. Great session……

  4. At first I was concerned about the first description of TOR but as it went on I understood that it was just the baseline for your video and everything was going to build off of it. Very good stuff in here.

Page 3 of 3«123
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel