How to reduce the traces left behind during navigation
Online stealth in an R&D monitoring environment
Practical sheet REF: FIC1272 V1
How to reduce the traces left behind during navigation
Online stealth in an R&D monitoring environment

Author : Xavier DELENGAIGNE

Publication date: August 10, 2023 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

3. How to reduce the traces left behind during navigation

Before discussing solutions, it's important to remember that there's no such thing as perfect anonymity. Moreover, being anonymous on the web doesn't mean you don't have to respect the rules of Internet use, or online intellectual property rights. In the event of an infringement, the judicial authorities may request the identification of the IP address in question, and launch in-depth investigations to try and trace it back to the main user.

3.1 Using the free Tor proxy

Tor (The Onion Router) is a free worldwide network of relays called Onion Routers, communicating via 128-bit AES-encrypted TCP tunnels. When connecting to a site via Tor, an encrypted random path is created between the server and the user. This path uses at least three relays. The IP address...

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Ongoing reading
How to reduce the traces left behind during navigation

Article included in this offer

"Management and innovation engineering"

( 434 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details
Contact us