How to Browse the Internet Anonymously

Linus Tech Tips
20 Aug 201912:32

Summary

TLDRThis video explains why incognito mode isn't enough to protect your online privacy and highlights the importance of tools like VPNs and the Tor browser. It discusses how advertisers and organizations track your online data, offering strategies for browsing anonymously, such as using VPNs, Tor, and the Tails operating system. Although these tools provide solid privacy protection, the video emphasizes that no method is perfect, especially with human habits involved. It ends by recommending Private Internet Access (PIA) as a reliable VPN service for enhanced privacy and security online.

Takeaways

  • ๐Ÿ”’ Simply using incognito mode isn't enough to keep your data private online.
  • ๐Ÿ•ต๏ธ Just because you're not doing anything illegal doesn't mean no one is after your personal data.
  • ๐Ÿ‘€ Companies and political organizations use your browsing data to target ads and messages.
  • ๐Ÿ›ก๏ธ Using a VPN (Virtual Private Network) encrypts your data and masks your location, making it harder for ISPs and advertisers to track you.
  • ๐ŸŒ The Onion Router (Tor) provides extra privacy by sending your internet traffic through multiple layers of encryption.
  • โš ๏ธ VPNs and Tor are not perfect; they can still leave traces, especially if you're being targeted by government agencies.
  • ๐Ÿ’ป Tails OS, a Linux-based system, is highly privacy-focused, running all internet traffic through Tor and forgetting all data once shut down.
  • ๐Ÿšซ While tools like VPNs, Tor, and Tails OS can significantly boost privacy, certain websites block these services (e.g., Expedia blocks Tor users).
  • ๐Ÿข Privacy tools can slow down your browsing experience due to added encryption layers, increasing latency.
  • ๐Ÿง  No matter how secure your setup is, human habits can still compromise your privacy, making complete anonymity difficult.

Q & A

  • What is the main takeaway from the video?

    -Switching on incognito mode or private browsing is not enough to keep your data safe online.

  • Why is it important to stay private online even if you're not doing anything illegal?

    -Because companies and organizations collect your data to target you with ads and other content, and your personal information can still be vulnerable.

  • How does a VPN help protect your online privacy?

    -A VPN encrypts your data and sends it through a network of servers, making it harder for your ISP and other parties to track your online activities.

  • What are the limitations of using a VPN for privacy?

    -While a VPN secures your data, it doesn't prevent all tracking, and when your data leaves the VPN, it can still be traced. Also, VPNs may not fully protect you if a government agency is targeting you.

  • What is Tor and how does it provide anonymity?

    -Tor is an internet networking protocol that anonymizes data by encrypting it and sending it through multiple nodes, making it hard for anyone to trace your activity.

  • Why is Tor combined with a VPN recommended in the video?

    -Combining Tor with a VPN provides additional protection, masking the initial jump and offering more anonymity for most users, even though it may not be foolproof.

  • What is Tails OS and why is it considered highly secure?

    -Tails OS is a Linux-based operating system that forgets all data after the session ends, ensuring no trace of your online activities remains. It also routes all traffic through the Tor network.

  • What are some of the disadvantages of using private browsing tools like Tor and Tails?

    -Using tools like Tor and Tails can slow down your internet browsing, and some modern conveniences like shopping carts and saved logins don't work well with these privacy setups.

  • Why do advertisers want your browsing data?

    -Advertisers use your browsing data to serve targeted ads, which increases the likelihood that you will engage with their products or services.

  • How does the video demonstrate the difference between private and non-private browsing?

    -The video compares browsing experiences with a standard setup and a fully anonymized setup using Tails OS and Tor, showing how location and ads differ between the two.

Outlines

00:00

๐Ÿ” Why Incognito Mode Isn't Enough

The paragraph explains that simply using incognito mode or private browsing isn't sufficient for protecting your data online. Despite not engaging in illegal activities, your personal information is still at risk as various organizations want your browsing data for targeted advertising. The good news is that safeguarding your privacy is easier than you might think, and using a VPN is one of the essential strategies to maintain privacy.

05:01

๐ŸŒ How VPNs Work and Their Limitations

This paragraph discusses VPNs (Virtual Private Networks) and how they work. VPNs encrypt your data and route it through servers to mask your location and browsing activity. While VPNs are effective for basic privacy and circumventing firewalls, they don't offer complete protection. Once data leaves the VPN network, it can still be tracked, and VPNs may not be foolproof if you're targeted by government agencies.

10:01

๐Ÿง… The Onion Router (Tor) for Anonymity

The paragraph introduces the Onion Router, or Tor, as a tool for maintaining anonymity online. It explains how Tor encrypts traffic in layers, sending it through multiple nodes to obscure your online activity. While not perfect, Tor combined with a VPN provides a strong level of privacy protection. However, advanced threats like government surveillance can still track traffic at certain points.

๐Ÿ–ฅ๏ธ Tails OS: The Ultimate Privacy Solution

This paragraph describes Tails, a Linux-based operating system built around Tor for maximum privacy. Tails doesn't store any data, runs from RAM, and wipes all data upon shutdown, making it ideal for anonymous browsing. Itโ€™s portable and can be run on most computers via a USB port, making it a versatile solution for high-level privacy needs.

๐Ÿ” Privacy Settings for Your Browser

The paragraph covers key browser privacy configurations. It suggests disabling JavaScript, installing the Privacy Badger extension to block trackers, and using DuckDuckGo as a search engine to avoid being tracked by advertising networks. These steps are essential for enhancing privacy and preventing unwanted tracking online.

๐Ÿ’ป Comparing Browsing Experiences: Tails vs. Windows

A side-by-side test of two machines, one running Windows and another running Tails with the Tor browser, is conducted to demonstrate how anonymous browsing differs. Tails successfully anonymized the user's location, but some sites, like Expedia, block access when using Tor. The comparison shows the benefits of using privacy tools but also highlights potential usability issues with certain websites.

๐Ÿ“‰ Downsides of Private Browsing

This paragraph explores the downsides of using Tails and the Tor browser, such as slow browsing speeds due to multiple encryption hops. It also points out the lack of features like saved shopping carts and auto-login, which are common on modern websites but don't work with extreme privacy setups. It emphasizes that no system is perfect, and user habits can still expose personal information.

๐Ÿ“ข Conclusion and PIA VPN Promotion

The final paragraph wraps up the discussion, stating that while private browsing has limitations, the methods outlined can obscure your data from most advertisers and casual trackers. It then transitions into a promotion for Private Internet Access (PIA), a VPN provider, explaining its features and benefits, such as supporting multiple devices, leak protection, and the kill switch feature.

Mindmap

Keywords

๐Ÿ’กIncognito Mode

Incognito mode is a browser setting that prevents browsing history from being saved on the user's device. However, the video emphasizes that while it may hide local history, it is not sufficient for protecting data online from external entities such as advertisers or organizations tracking users.

๐Ÿ’กVPN (Virtual Private Network)

A VPN encrypts a user's internet data and routes it through remote servers to mask their IP address. The video highlights that using a VPN like 'Private Internet Access' helps users anonymize their activity by making it appear as though data is coming from a different location, providing an essential layer of privacy online.

๐Ÿ’กEncryption

Encryption is the process of encoding data to prevent unauthorized access. The video discusses how VPNs use encryption to protect the user's internet traffic before sending it through a network of servers, ensuring that their activity is hidden from prying eyes, such as ISPs and advertisers.

๐Ÿ’กTor (The Onion Router)

Tor is a privacy-focused browser that routes internet traffic through multiple layers of encryption and nodes, making it extremely difficult for anyone to trace a userโ€™s online activity. The video mentions that Tor is integrated into the Tails operating system and can help anonymize users even further, especially for those with heightened privacy concerns.

๐Ÿ’กTails OS

Tails OS is a privacy-focused operating system that runs entirely from a computerโ€™s RAM and erases all traces of the user's activity after shutdown. The video describes it as a powerful tool for complete anonymity, as it directs all internet traffic through the Tor network and forgets all data after the system is powered off.

๐Ÿ’กAdvertisers

Advertisers collect user data, often through tracking methods, to target them with personalized ads. The video points out that a major reason for protecting one's privacy online is to prevent advertisers from tracking and using personal data to influence behavior through targeted ads.

๐Ÿ’กData Tracking

Data tracking refers to the collection and analysis of a userโ€™s online behavior, including websites visited, clicks, and searches. The video highlights how organizations, including advertisers and political entities, use data tracking to better target their audiences, often compromising user privacy in the process.

๐Ÿ’กPrivacy Badger

Privacy Badger is a browser extension mentioned in the video that blocks online trackers and ads. It is suggested as part of a multi-layered strategy to ensure privacy while browsing by preventing websites from tracking users across the internet.

๐Ÿ’กDNS Leak Protection

DNS Leak Protection is a feature of VPNs that prevents DNS requests (which translate domain names into IP addresses) from being exposed outside the VPN, thus safeguarding user privacy. The video mentions this feature as part of the Private Internet Access VPN, which ensures that no traffic leaks from the encrypted VPN tunnel.

๐Ÿ’กKill Switch

A kill switch is a feature that automatically blocks all internet traffic if the VPN connection drops unexpectedly. In the video, it is highlighted as part of the Private Internet Access VPNโ€™s suite of security features, ensuring that no unencrypted data is exposed in case the VPN disconnects.

Highlights

Switching to incognito mode or private browsing is not enough to keep your data safe online.

Even if you're not doing anything illegal, your personal information can still be valuable to companies and political organizations.

Companies use online behavior data to serve targeted ads and maintain user engagement.

Staying private online is less difficult than it seems, and simple strategies like using a VPN can help.

A VPN (Virtual Private Network) encrypts your data and routes it through various servers to mask your identity and location.

While VPNs are useful for securing data, they have limitations when the traffic exits the VPN network, making full anonymity challenging.

Tor (The Onion Router) browser provides anonymity by relaying traffic through multiple encrypted layers and nodes, masking your identity further.

Tor has its limitations, especially during the initial connection before reaching the Tor network, and is vulnerable until fully connected.

Combining a VPN with Tor can offer more security, but government surveillance can still track predictable exit points from VPN networks.

The Tails operating system runs all internet traffic through the Tor network, and it is designed to forget everything once the system is shut down.

Tails offers a portable and secure browsing experience since the entire OS runs off the computer's RAM, erasing data after shutdown.

Tor browser looks similar to Firefox because it's based on it, making the user interface familiar for easy configuration.

For enhanced privacy, disable JavaScript, use Privacy Badger to block trackers, and set DuckDuckGo as the default search engine.

While private browsing can block ads and trackers, it can also slow down browsing and disable conveniences like shopping cart memory.

No privacy solution is bulletproof, and the weakest link in security is often the user, who may unintentionally reveal their habits.

Transcripts

play00:00

let's open with the most important thing

play00:01

to take away from this video simply

play00:03

switching on incognito mode or private

play00:06

browsing is not enough to keep your data

play00:08

safe online

play00:10

also

play00:11

just because you aren't doing anything

play00:12

illegal doesn't mean that no one is

play00:15

after your personal information and that

play00:16

there's no benefit to staying private

play00:19

thing is guys these days pretty much

play00:22

everyone and their dog is out to get

play00:24

your browsing data and that's not

play00:27

tinfoil hat paranoid delusional stuff

play00:30

the main reason is that companies and

play00:33

other organizations like political

play00:35

parties want your eyeballs glued to

play00:38

their message and the data that they get

play00:40

from your behavior online helps by

play00:43

giving them an advantage when they serve

play00:45

up those juicy ads everywhere that you

play00:48

frequent the good news is that staying

play00:50

private online is actually less

play00:52

difficult than you might think and

play00:54

pretty much anyone can do it so let's go

play00:57

through some easy strategies starting

play01:00

with one of our favorites using a vpn

play01:02

like private internet access

play01:05

for those of you new to vpns or virtual

play01:08

private networks they take in your data

play01:11

encrypt it then send it through their

play01:13

network of servers before forwarding it

play01:16

to the destination country of choice

play01:18

when the vpn sends your data out into

play01:21

the world towards the intended

play01:22

destination it decrypts the data and

play01:25

makes it look like the data originated

play01:27

from that exit point rather than your

play01:29

computer so whether you're torrenting or

play01:33

looking up content that might generate

play01:35

embarrassing ads in your browser the

play01:36

next time someone sits down at your

play01:38

computer we consider a vpn an essential

play01:41

part of staying safe online

play01:43

with that said while a vpn does secure

play01:46

your data in some ways making it so your

play01:48

isp can't tell what you're doing and

play01:50

allowing you to circumvent most firewall

play01:53

blocks when your information leaves the

play01:55

vpn network it's all still there and can

play01:59

be used to track you so a vpn is just

play02:02

one of the tools in our belt

play02:04

now let's talk about the onion router or

play02:07

tor as some of you know it we've

play02:10

actually covered tor before but the

play02:12

summary version goes a little something

play02:13

like this the onion router isn't a

play02:16

physical router like you'd think of

play02:18

plugging in in your home rather it's an

play02:21

internet networking protocol that's

play02:23

integrated into the tor web browser and

play02:26

it's designed to anonymize the data

play02:29

relayed across it

play02:30

so it keeps your online activity

play02:33

anonymous by encasing your traffic in

play02:36

multiple layers of encryption then

play02:39

sending it through a number of nodes

play02:41

that peel back those layers one at a

play02:44

time

play02:44

this makes it difficult if not

play02:47

impossible for snoops to see your

play02:48

webmail search history and other online

play02:52

activity

play02:53

now tor is also imperfect and leaves us

play02:57

vulnerable until our traffic reaches its

play03:00

network

play03:01

that's why we're using our pia vpn to

play03:04

mask that initial jump

play03:06

now thing is using a vpn can actually

play03:09

lead to issues if you are specifically

play03:11

being hunted by some government agency

play03:14

because your traffic will have a

play03:16

predictable exit point but for most

play03:18

people whose goal is to thwart more

play03:20

casual surveillance and advertisers this

play03:23

vulnerability isn't that important

play03:26

now incognito mode which by the way

play03:28

isn't useless plus a vpn and tor is

play03:32

pretty good and probably enough for most

play03:35

people but since we're going for the

play03:37

ultimate private setup we're going to

play03:39

take things a step further with our

play03:41

secret weapon

play03:43

the

play03:44

hey

play03:45

there it is

play03:47

super secure password the linux based

play03:49

tails is the operating system equivalent

play03:52

of your weird uncle after too many

play03:54

drinks it's designed to forget

play03:57

everything it ever heard or saw the

play04:00

entire os is built around the tor

play04:02

protocol and runs all internet traffic

play04:05

through the tor network not just your

play04:07

browser traffic one of the other key

play04:10

benefits of tails is that the os

play04:12

essentially runs off of your computer's

play04:14

ram so once you turn off the system poof

play04:18

any data that was lingering on it is

play04:20

gone and there's nothing to match your

play04:23

identity to the last browsing session

play04:26

another advantage of this solution is

play04:28

that you can take it with you and launch

play04:29

it on nearly any computer with a usb

play04:32

port

play04:33

so then now we are ready to browse the

play04:36

web

play04:37

anonymously

play04:40

almost the first thing you'll probably

play04:43

notice about the tor browser is how

play04:45

similar it looks to firefox and that's

play04:48

not by accident it's because it is

play04:50

firefox just set up to use the tor

play04:52

protocol and that's nice because it

play04:54

makes configuring all these little

play04:56

tweaks pretty familiar and

play04:58

straightforward so in no particular

play05:00

order regardless of our browser choice

play05:03

we want to make sure that javascript

play05:05

can't run we want to install the privacy

play05:07

badger extension to stop trackers and

play05:09

provide ad blocking and we want to set

play05:11

our default search engine to duckduckgo

play05:14

for what i hope would be fairly obvious

play05:16

reasons

play05:18

so then

play05:19

now

play05:20

we are fully ready to both browse the

play05:23

web and stick it to the man

play05:25

at the same time let's do a few tests

play05:28

here to see what that looks like so

play05:30

we've got two machines for our side by

play05:32

side test a completely vanilla one

play05:34

running windows and using google and

play05:37

then our tails linux one with the tor

play05:40

browser now something to note is that

play05:42

we're not actually using a vpn on either

play05:44

of these machines because here we're

play05:46

trying to get a representation of the

play05:48

worst case scenario and here

play05:51

pia actually doesn't recommend using

play05:53

their vpn from within tails although

play05:55

they do have a free proxy included with

play05:57

your account which they do say could be

play06:00

a good idea depending on what it is

play06:01

you're trying to achieve so let's go

play06:03

ahead and search for expedia

play06:06

um

play06:07

okay first hit is

play06:09

expedia.com

play06:11

this one expedia.ca

play06:13

so immediately our location has been

play06:16

anonymized and also

play06:18

expedia blocked us from even accessing

play06:20

their site

play06:21

that's cute

play06:23

did we know that was gonna happen no i

play06:25

didn't expect him to block tour expedia

play06:28

blocks tor

play06:30

let's try a different

play06:33

provider we can't tell if you're a human

play06:35

i'm human expedia dot co dot uk let me

play06:38

through it's like pretty sure i'm a bot

play06:40

hey taking it sweet time three freaking

play06:45

catches

play06:46

no we're good all right let's find a

play06:48

freaking flight here new york departing

play06:52

tomorrow

play06:53

okay

play06:54

let's do a quick search midirch

play06:57

now we haven't actually been researching

play06:59

flights and hotels so there may not be

play07:02

much benefit in terms of pricing to

play07:04

anonymizing any of this but

play07:06

there's only one way to find out all

play07:08

right so we're looking at 699

play07:11

canadian round trip

play07:13

and 304

play07:16

pounds

play07:18

let's do a quick conversion there

play07:21

556.

play07:22

i just saved 145 dollars

play07:25

this is the same damn flight

play07:28

and it's over hundred dollars cheaper

play07:30

includes taxes and fees and then same in

play07:32

canada too including taxes and fees yep

play07:34

yep yep apples to apples you have you

play07:37

heard it here first expedia hates

play07:38

canadians now let's do another fun

play07:40

little test let's go to whatismyip.com

play07:45

that is in fact r.i.p and over here my

play07:49

public ip is some nonsense i've never

play07:51

seen or heard of before and i'm

play07:52

apparently based in

play07:54

basel

play07:55

bsch where the devil is that

play07:58

switzerland now let's do another fun

play08:00

little test let's go on a popular

play08:03

shopping website like say newegg.com

play08:06

now let's shop for let's say video cards

play08:09

maybe an

play08:11

phantom radeon7 uh what's a site with

play08:15

really really obnoxious ads

play08:18

ah what's that one based in australia

play08:20

that's like super obnoxious tweektown

play08:23

tweak town

play08:25

that's it

play08:27

thanks luke

play08:29

all right and let's have a look at what

play08:31

kind of ads are lurking for us

play08:34

on the page

play08:36

what do we have here

play08:38

vancouver to london vancouver to new

play08:40

delhi vancouver to lima and vancouver to

play08:42

san salvador

play08:44

shockingly they didn't manage to come up

play08:47

with any graphics cards ads which was

play08:49

sort of what i was going for here but i

play08:51

think we've made our point

play08:53

as for this well it looks like they're

play08:56

not getting any ad revenue from us which

play08:57

of course we feel pretty badly about as

play08:59

an ad supported enterprise ourselves

play09:02

but at the very least we are not being

play09:05

tracked across the internet which is the

play09:07

only reason that we enabled the ad

play09:08

blocking on this particular one in the

play09:10

first place you can of course anonymize

play09:13

your browsing significantly without

play09:15

blocking ads altogether

play09:18

just saying

play09:19

so for fun we're going to disable both

play09:21

privacy badger and u-block origin

play09:23

and reload this page

play09:25

so there's our ads but as you can see

play09:28

they are completely

play09:30

irrelevant

play09:32

so we've got some scarlet audio

play09:34

interfaces in whatever language this is

play09:37

and add for the stream deck accel that's

play09:39

in english at least

play09:41

an ad for corsair's hydrox series liquid

play09:43

cooling

play09:44

so there you go

play09:47

so that was a pretty compelling

play09:48

demonstration of the benefits of private

play09:50

browsing but

play09:52

it has some clear disadvantages as well

play09:55

now this machine on the right is

play09:57

actually faster than the one on the left

play09:59

but you guys might have noticed that

play10:00

browsing from within tails using the tor

play10:03

browser was slow as hell

play10:06

that's because the more hops you go

play10:08

through the more latency you're adding

play10:10

to the connection

play10:12

also some of the creature comforts that

play10:14

we've gotten used to on the modern web

play10:16

things like shopping carts that remember

play10:19

all the things that you added to them or

play10:21

websites that remember that you logged

play10:23

into them so you don't have to enter

play10:24

your password every time

play10:26

that stuff

play10:28

ain't gonna work over here

play10:30

also something to bear in mind guys is

play10:33

that no matter what you do it is going

play10:35

to be imperfect

play10:38

this was a fairly basic guide and

play10:40

privacy browsing is a rabbit hole and a

play10:44

half furthermore even on a properly set

play10:47

up machine while you're browsing and

play10:50

searching and almost all of your

play10:51

internet usage might be basically

play10:53

invisible

play10:54

nothing is bulletproof because the

play10:57

weakest point in the entire chain exists

play11:00

between the keyboard and the chair

play11:03

you and i are human and we are nothing

play11:05

if not creatures of habit and if someone

play11:07

is trying to find you your habits are

play11:10

likely to end up being the thing that

play11:11

gives you away with all of that said

play11:14

though for the vast majority of use

play11:16

cases following either of the methods

play11:18

that we laid out here should obscure

play11:20

your data footprint enough to make it

play11:23

nearly useless for advertisers and other

play11:26

parties speaking of advertisers this

play11:29

video is brought to you by pia private

play11:32

internet

play11:34

private internet access supports a

play11:35

variety of vpn protocols and types of

play11:38

encryption and authentication allowing

play11:39

you to dial in the level of privacy that

play11:41

you need they've got apps for windows

play11:43

mac os android linux and google chrome

play11:46

and you can connect up to five devices

play11:48

at once using a single account their

play11:50

apps include dns leak protection and

play11:52

ipv6 leak protection as well as their

play11:55

internet kill switch feature which

play11:57

blocks all traffic if the vpn becomes

play11:59

disconnected unexpectedly so check it

play12:02

out today at lmg dot gg slash pia linus

play12:06

two we're gonna have that linked down

play12:08

below

play12:09

so thanks for watching guys if this

play12:10

video sucked you know what to do but if

play12:12

it was awesome hit like get subscribed

play12:14

or maybe consider checking out where to

play12:15

buy the stuff we featured at the video

play12:17

description link below also down there

play12:19

is our merch store it has cool shirts

play12:20

like this one

play12:22

join our community forum it looks like

play12:24

that

play12:25

or like that if you're in the tor

play12:27

browser

play12:29

well

Rate This
โ˜…
โ˜…
โ˜…
โ˜…
โ˜…

5.0 / 5 (0 votes)

Related Tags
Online PrivacyVPNTor BrowserData SecurityIncognito ModeDigital SafetyPrivate BrowsingCybersecurityAnonymityInternet Safety