New Civilization News: The Secrets to Securing Internet Anonymity    
 The Secrets to Securing Internet Anonymity
19 Oct 2001 @ 14:38, by sindy

Dave Wilson:

America both reveres anonymity as a sanctuary for the oppressed and rejects it as a refuge for conspirators. Laws guarantee you the right to confront your accuser in court. At the same time, secret ballots remain the bedrock of self-governance, offering you a chance to freely vote your conscience without fear of retribution.

The Internet, which offers anonymity to knowledgeable users through a historical accident of engineering, is currently caught up in that dichotomy. The events of Sept. 11 have spurred many to ask whether it's reasonable and responsible to let anybody--even potential terrorists--use the Internet to communicate anonymously. That debate, which is currently raging in Washington, will not be resolved soon.

But it's likely that courts won't allow the complete elimination of anonymity in cyberspace, if only because in the past they've held that anonymous speech is critical for a democratic society. Beginning with the Federalist Papers, speaking your mind without letting people know who you are has played a critical role in this nation's development. As Supreme Court Justice John Paul Stevens wrote in a 1995 case, "Under our Constitution, anonymous pamphleteering is not a pernicious, fraudulent practice, but an honorable tradition of advocacy and of dissent." In that spirit, there are a number of ways to keep your identity a secret in cyberspace.

First, you need to get a sense of how much information you give up when you visit a Web site. To get a demonstration, check out [link]

Every time you visit a Web site, you leave behind facts about your computer, your Web browser, your Internet Protocol address, whether you're dialing in from work.

Fortunately, there are ways to maintain your privacy and move anonymously in cyberspace. You can use e-mail addresses that can't be traced back to your Internet account without a subpoena, using services such as [link] or [link] Accessing the network from a terminal that can't be traced back to your credit card, such as a public library, also can be effective. Use of a credit card online can provide immediate proof of identity to a Web site, and that information is sometimes shared with other Web sites.

In addition, there are a number of tools that can help shield your activities from prying eyes.

Start with Guidescope, at [link] Guidescope is a relatively new program that blocks advertisements from showing up on your Web browser. This is great because it can keep both cookies and Web bugs off your computer.

Cookies are a way for Web sites to note information about your preferences--like the way you'd like information on their Web page presented on your screen. Cookies serve as a kind of identifier, primarily noting when you make a return visit. The site has no idea who you are until you tell it, usually by buying something with a credit card.

Once that happens, pretty much everything you do on the site can be tracked through the cookie. Web bugs are more insidious; they're invisible bits of code that can track your movements and activities between Web sites. Guidescope, and other proxies, can block those nasties, but you've got to pay attention and configure things properly. It's free.

Anonymizer offers similar protection and is available through [link] There's a free service with limited features and a paid subscription that costs $50 annually and offers better features.

"There are no logs or tracking on any individual," Chief Executive Bill Unrue said. "We do stand on our heads to cooperate with law enforcement, but they won't find any logs here." But the service is not meant to be a tool for bad guys, Unrue said. His crew will block inappropriate uses--such as death threats.

Finally, consider using encryption. E-mail traverses the Internet in the clear, meaning anybody who can see the data passing by on the network can read it. Encryption can put the equivalent of an envelope on the postcard, so only the intended recipient can read it. The standard form of encryption is PGP. You can get a free copy from [link]


Dave Wilson is The Times' personal technology columnist. He can be reached at

[< Back] [New Civilization News]


Other entries in
10 Jul 2010 @ 13:01: Strong Elastic Links
13 Oct 2008 @ 14:42: Call for Papers: (Online) Conference On Systemic Flaws and Solutions 2009
25 Oct 2007 @ 21:47: Static or dynamic web metaphors
28 Mar 2007 @ 05:36: The Tyee - Vancouver's Online Newspaper
11 Jul 2006 @ 15:12: Response to Josep L.I. Ortega's Statement for Unity of Action
25 May 2006 @ 10:14: Squidoo lenses
8 Apr 2006 @ 23:44: Web2.0
10 Jan 2006 @ 22:55: Agora and Antigora
14 Dec 2005 @ 15:15: Ruby on Rails
19 Nov 2005 @ 14:12: Saving the net from the pipe owners

[< Back] [New Civilization News] [PermaLink]?