How Sweet To Be Notified

Nice to know who can and who can’t see my IP…

Your IP address is available to web sites all over the web because for every connection you make your IP address has to be tacked on to the request information to be able to send the data you requested back to your system.

Welcome to the real world.

I know that. Guess I should have worded it differently.

There is no privacy or anonymity on the internet.
If you want to stay private, stay off the internet.
(Oh, it’s already too late. :slight_smile: )

+1000
Never ceases to amaze me when reading in forums about people thinking they can stay hidden/private while using the internet. To me, that’s like thinking you can go to a concert/sports game etc. etc. and no one can see you. ::slight_smile:

I didn’t say I could stay hidden/private while using the internet. I know I can’t.

I get that, I was speaking in general. :wink:

The use Norton DNS will not hide your real IP network. To surf anonymously you will need to resort to a VPN server, and one of the best on the market is the CyberGhost.
This software has a free version and paid another. The free version works great and can be obtained from the developer’s website (in English):

http://cyberghostvpn.com/en/surf-anonym.html

Sorry to burst your bubble Mr Santiag but even that will not keep you hidden. :slight_smile:

Hi -midnight,

You are never really hidden, because that machine if you acquired it through a vendor and did not build it yourself has been registered and it bears a unique ID called MAC ID. So it is you or another person in your household that is sitting behind the keyboard of that unique computer or using that smartphone on that concert and everything you do is logged with ever so many uniquely identifiable pieces of code every time and all of the time that you are connected. Some can make it a little bit more difficult to trace them using Tor (but where you go onto Tor it’s start and end points may be logged and you will only arouse suspicion- why would she like to use tor?) or a webproxy and all is being logged. In some countries you can only log in under your own true identity and you have to show an ID card.
So you cannot register anymore as “Marie Mitternacht” from a long gone address in the now no longer existing German Democratic Republic as some spoofs would do in the past.
But then again using Marie Mitternacht would stand out to much. Just simple Nachtwacht would be better, because those that search for that name would have to go through all the search results of Rembrandt’s world famous painting before getting to the data they are after. But with geo-location also that would not work any longer. So why would you try to go into all that trouble? Do not give out data to the world like your computer name, your mail address or other data that you do not like to share with others. What you do not share with the Interwebs is private. All secrets you share are no secrets any longer,

polonus

+1
That’s what I mean; some folks just don’t get it! :wink:

If you really care about privacy, one of the only ways to not be tracked and keep history is not with Tor It is a program that works from a large set of servers maintained by users. It also eliminates the censorship of content, which allows you to see virtually anything available on the web.

The good side is that you do not need to install it and it can be run from a USB drive. So you can get on the Internet from any computer and never leave their traces on it. That’s because Tor has its own browser, which guarantees total anonymity while you use it.

The only problem is that this application is very slow, so it requires patience. But is the price you pay for trying to circumvent the system of the machine you’re using and staying completely anonymous.

Alternative: use the Tor Browser. :slight_smile:

Sorry but again your advice is misleading.
There is no privacy on the internet.

It is important to bear in mind that any computer will never be 100% protected. It’s like the old saying goes: “Trust in God but lock your car.” That is, we will not make life easier for an attacker, is not it? :smiley:

Hi jefferson santiag,

Wake up to the real world where the citizens have become fully transparent, especially on the Interwebs.
Else “they” would not allow us on in the first place.
Well I would not trust my private data that easily to the Internet, even surfing within a tor browser.
Yes, even then your every move on the Internet will be logged.
Read this: http://lifehacker.com/5923017/how-can-i-prevent-my-isp-from-tracking-my-every-move

Do not believe this?
Tor is not secure and neither is https.
Try to run a tor browser with javascript blocking & request policy blocking active.
Know the result?

Tried that out.

You are more than probably totally blocked because you do not appear to be human,
but are considered by google to be an automated bot.
so Google will block your browsing from the word go.
And with a “webkit” mono-culture you cannot unblock that.
Older browsers won’t be supported…

Know that your every move is web beacon tracked.
Obfuscated compressed and packed track code will track you constantly.
All these mechanisms are intertwined to be able to build a long time Internet profile within a couple of secs,
even enabling to predict your next clicks within a certain probability.
All your footprints are being covered and your data stored,

polonus

When you hear of attacks against computers soon to think: what if they invade my machine? Yeah, it can happen and is more common than you think. This is because attackers use computers for ordinary people to achieve their goals

The forms used by an attacker to access your machine are varied. The most common are by malicious programs. These programs take over your computer with a simple click in the wrong place. You may have invaded your machine via an e-mail, installation of software and even browsing a Web page that appears harmless.

Another group that became well known through the media because of his attacks in the U.S. is Anonymous. The organization was known for his actions dubbed “hacker activism,” ie, its main purpose is to disseminate information and make the world open their eyes to the corrupt rulers who insist on maintaining power in a distorted way and against the people. Because of this thinking, Anonymous gained a physical representation, she being the mask used by the Guy Fawkes character (which in turn is inspired by a real figure, but that’s another story) of the graphic novel “V for Vendetta” by Alan Moore.

I did not get an answer on my conclusion that combining vidalia and NoScript and Request Policy add-ons would stop a tor browser from working.
So that proofs that anonymity on the Internet is a non-existing animal.

The average user is helpless against a directed hack attack.

The impact of geo-location tracking has been grossly underestimated by many.
Officials would know how many persons with the same Christian name would be sitting in a stadium at a given time,
or they must have borrowed that smartphone from someone with that name.

As I said with modern technology one is fully “smart metered”…

polonus

I am not referring
Deep Web is the collection of Internet content not directly accessible by search engines. This includes, for example, documents hosted within sites that require login and password.

Its origin and its proposal are legitimate. After all, not every material must be accessed by any user. The problem is that, far from public scrutiny, this huge secret area - 500 times greater than conventional web - turned
a lawless land, full of illegal activities and even I would say frightening.

Addresses

The addresses of the Deep Web can be quite bizarre, as a succession of letters and numbers followed by the suffix. Onion instead of the traditional. With.
Originally, its function is positive: to protect sensitive content, such as governments, banks, corporations, the military and universities, accessible only with a login and password, for example.

Hidden Data

The Deep Web sites may be common within - in the form of downloadable files and data - hidden or excluded addresses purpose search engines.
Google and other search engines do not have no idea what there: fishing boats as they would be playing their networks and locate their prey only on the “surface” of the sea.
You can not directly access the Deep Web with common browsers.
The most famous application to access the Deep Web is the “Tor”, an open source application which consists of a network of proxies, this network is called onion, and theoretically guarantees anonymity to those who wish to access the Deep Web
The horrible side of Deep Web
The scary side of Deep Web reprehensible and has a name: Dark Web
There is everything from virtual stores of drugs, child pornography and terrorist connections to arms sales.
As everything becomes, so to speak, in the depths, there is no way governments and even the police take the air. It is as if they had lives of their own sites, without owners, records and any documentation.

Risk zone

This is a real war zone.
Many of these sites are full of Deep Web crackers waiting for user (victims) that can be easily “hooked”.
Since there is no security filters, they can easily turn the computer user who ventures into a zombie, controlling the distance and also performing data theft.

Hi jefferson santiag,

Are you lecturing us here or quoting from your own version of Wikipedia’s?
You are not participating in any form of forum discussion.
Real discussion is given attention to both sides of the story, no monologues.
That has never brought insight, just add to assumptions and hear-say.
Nobody will learn anything or could make up his own mind and learn.
Are you speaking from experience or bordering on trolling again,

polonus

@Jefferson Santig,
Please stop filling up this topic with copied material.
If you want to supply usable information, that’s fine
Copy and paste is a waste of every ones time.