Endpoint
1/26/2017
04:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

How to Stay Truly Anonymous Online in 2017

NordVPN gives advice on how to enhance your anonymity online.

January 13, 2017. Online security is becoming a bigger issue than ever, as 2016 seemingly brought one of the worst years ever when it comes to staying secure and private online. 2017 is not promising to be any better, considering increasingly restrictive surveillance laws are being passed around the world and authoritarian regimes are increasingly censoring the Internet.

When it comes to using public Wi-Fi, and especially managing financial transactions,  it’s known that it’s not safe to use one’s credit card or to disclose any other personal information. For example, it has been shown that a Visa credit card can be hacked online in 6 seconds. Using cryptocurrency helps users stay anonymous to some extent– but what are the other ways to remain completely invisible online?

NordVPN, a Virtual Private Network service provider, identifies five key services that could significantly enhance your online anonymity and security.

Bitcoin. Bitcoin is a decentralized currency that does not belong to any country – just its user.  And when it comes to security, it’s hard to beat it. Bitcoin online transactions are conducted without disclosing any personal financial information. When it comes to privacy, it’s certainly reassuring that no one can trace who is the owner of a certain bitcoin account. However, not all merchants accept bitcoin. In those cases when using a credit/debit card is the only option - extra security steps should be taken.  Using strong passwords and updating them often, ensuring the websites are trusted (double check for https), being wary of any suspicious redirects and using trusted encryption services (i.e. VPN service) to protect one’s Internet traffic are bare minimum.

Encrypted Email. While bitcoin is great for financial transactions online, it’s advisable to stay private while conducting any other activities – such as emailing. Emails might also contain some private and sensitive information, which could be easily intercepted by hackers or any unwanted snoopers. The solution is to use one of the encrypted email services. There are a few good examples, including Tutanota, or the Gmail-like ProtonMail that offer an automatic end-to-end encryption, and no personal information is required to create a secure email account.

Encrypted Messaging. Everybody uses their mobile devices for instant messaging - but how safe are regular communication apps? For example, WhatsApp has received some harsh criticism for tracing user chats even after their deletion. Signal, on the other hand,is an encrypted messaging and voice calling app that provides end-to-end encryption by default to secure all communications. The app can also verify the identity of people one is messaging with and the integrity of the channel they are using. When texting with non-Signal users, one has an option to invite them to an encrypted conversation via Signal.

PGP (Pretty Good Privacy). If a user is  looking for an advanced option to secure their communication and personal files, it might be wise to turn to PGP, which is actually one of the most popular encryption softwares used worldwide. OpenPGP is used to encrypt data and create digital signatures and could be used to encrypt your personal files or to exchange encrypted communication. It protects all communication with a digital signature and is available for all operating platforms.

VPN (Virtual Private Network). Anyone who is taking their online security and privacy seriously, will use a VPN – a Virtual Private Network. A VPN encrypts all user’s Internet data into a secure tunnel and creates a secure connection between one’s device and a VPN server. All the information traveling between the  user’s Internet-enabled device and the secure server remains invisible to any third party. Those who want a guaranteed protection, will be disappointed that not all VPNs accept bitcoin as method of payment – but there are a few that do. NordVPN, for example, allows to pay by bitcoin and, most importantly, does not store any logs. It also offers an option to encrypt all the data twice for extra safety, which is a rare feature for a VPN. A helpful kill-switch feature allows a user to select Internet programs that would be terminated if the Internet connection dropped for any reason, to make sure that no unprotected Internet activity was exposed. Privacy issues have taken another shape completely over the past year. 31% of Internet users used a VPN in 2016, and VPNs will be increasingly popular in 2017 as online security issues grow to monumental proportions.

In addition to these super tough security measures, anonymity-minded Internet users should be more vigilant, use extra caution when sharing information or opening messages from unknown recipients, while making sure that their device’s Firewall is turned on and a reliable anti-virus program is installed and kept up to date.

To find out more, visit www.nordvpn.com

ABOUT NORDVPN

NordVPN is the world’s most advanced VPN service provider that is more security oriented than most VPN services. It offers double VPN encryption, anti DDoS & Tor Over VPN services. The product is very user friendly, offers one of the best prices on the market, has over 700 servers worldwide and is P2P friendly. One of the key features of NordVPN is zero log policy. www.nordvpn.com

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
AshadA063
50%
50%
AshadA063,
User Rank: Apprentice
2/26/2017 | 2:01:59 PM
Nice read, but is incomplete.
While pushing NordVPN too far, I'm surprised why other VPNs service are not being discussed?

Also, for the secure and private email part, I certainly would like to see Mailfence (https://www.mailfence.com) in that list, as it surely is one of the best candidate.
GeorgiaB272
100%
0%
GeorgiaB272,
User Rank: Apprentice
1/27/2017 | 2:44:18 AM
Interesting read.
I also recently grabbed a VPN (PureVPN) for my online transactions and privacy on public WiFi's. And I think all of us must take measures against cyber crimes. 
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.