3. How to reduce the traces left behind during navigation
Before discussing solutions, it's important to remember that there's no such thing as perfect anonymity. Moreover, being anonymous on the web doesn't mean you don't have to respect the rules of Internet use, or online intellectual property rights. In the event of an infringement, the judicial authorities may request the identification of the IP address in question, and launch in-depth investigations to try and trace it back to the main user.
3.1 Using the free Tor proxy
Tor (The Onion Router) is a free worldwide network of relays called Onion Routers, communicating via 128-bit AES-encrypted TCP tunnels. When connecting to a site via Tor, an encrypted random path is created between the server and the user. This path uses at least three relays. The IP address...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Management and innovation engineering
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
How to reduce the traces left behind during navigation
Websites
Google Analytics is a data analysis service offered by Google. It enables website and mobile app owners to collect information on user behavior, site traffic, traffic sources, conversions and much more.
XITI is a...
Legal references
Loi n° 2004-575 du 21 juin 2004 for confidence in the digital economy (article 6 II)
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference